Verifying a user in a personal face space

被引:0
|
作者
Tao, Q. [1 ]
Veldhuis, R. N. J. [1 ]
机构
[1] Univ Twente, Signals & Syst Grp, POB 217, NL-7500 AE Enschede, Netherlands
关键词
user verification; Viola-Jones method; face space; PCA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For user verification on a personal digital assistant (PDA), a fast and simple system is developed. In the enrollment phase, face detection and registration are done by a Viola-Jones based method, taking advantage of its accuracy and speed. The face feature vectors obtained this way are then used to build up a face space specific to the user by principal component analysis (PCA). Furthermore, the face variations caused by small registration shifts are also modeled, in order to better capture the variation in the face space, and simplify the enrollment. Current experiments show that this system is fast, efficient, and accurate.
引用
收藏
页码:2344 / +
页数:2
相关论文
共 50 条
  • [1] Intra-personal kernel space for face recognition
    Zhou, SHK
    Chellappa, R
    Moghaddam, B
    [J]. SIXTH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION, PROCEEDINGS, 2004, : 235 - 240
  • [2] Verifying the safety of user pointer dereferences
    Bugrara, Suhabe
    Aiken, Alex
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 325 - 338
  • [3] Non-Finito Products: A New Design Space of User Creativity for Personal User Experience
    Seok, Jin-min
    Woo, Jong-bum
    Lim, Youn-kyung
    [J]. 32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 693 - 702
  • [4] Personal Smart Space : IoT based User recognition and Device control
    Chae, Seungho
    Yang, Yoonsik
    Byun, Junghyun
    Han, Tack-Don
    [J]. 2016 IEEE TENTH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2016, : 180 - 181
  • [5] Verifying Liveness by Multiple Experts in Face Biometrics
    Kollreider, K.
    Fronthaler, H.
    Bigun, J.
    [J]. 2008 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, VOLS 1-3, 2008, : 1200 - 1205
  • [6] State Space Reduction for Verifying Noninterference
    Zhou, Conghua
    Chen, Li
    Ju, Shiguang
    Liu, Zhifeng
    [J]. 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 132 - 138
  • [7] Verifying the independence of partitions of a probability space
    Mulay, SB
    Wagner, CG
    [J]. BULLETIN OF THE AUSTRALIAN MATHEMATICAL SOCIETY, 2000, 61 (02) : 263 - 266
  • [8] SEAVE - A MECHANISM FOR VERIFYING USER PRESUPPOSITIONS IN QUERY SYSTEMS
    MOTRO, A
    [J]. ACM TRANSACTIONS ON OFFICE INFORMATION SYSTEMS, 1986, 4 (04): : 312 - 330
  • [9] A method for formalizing, analyzing, and verifying secure user interfaces
    Beckert, Bernhard
    Beuster, Gerd
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2006, 4260 : 55 - +
  • [10] A method for formalizing, analyzing, and verifying secure user interfaces
    Beckert, Bernhard
    Beuster, Gerd
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, 4260 LNCS : 55 - 73