Sciweavers

368 search results - page 17 / 74
» Computation of Cryptographic Keys from Face Biometrics
Sort
View
ICB
2009
Springer
190views Biometrics» more  ICB 2009»
14 years 2 months ago
Robust Human Detection under Occlusion by Integrating Face and Person Detectors
Human detection under occlusion is a challenging problem in computer vision. We address this problem through a framework which integrates face detection and person detection. We ...
William Robson Schwartz, Raghuraman Gopalan, Rama ...
ICB
2009
Springer
188views Biometrics» more  ICB 2009»
14 years 2 months ago
Pixelwise Local Binary Pattern Models of Faces Using Kernel Density Estimation
Local Binary Pattern (LBP) histograms have attained much attention in face image analysis. They have been successfully used in face detection, recognition, verification, facial ex...
Timo Ahonen, Matti Pietikäinen
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
14 years 1 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
FGR
2008
IEEE
147views Biometrics» more  FGR 2008»
14 years 2 months ago
Unsupervised clustering for google searches of celebrity images
How do we identify images of the same person in photo albums? How can we find images of a particular celebrity using web image search engines? These types of tasks require solvin...
Alex Holub, Pierre Moreels, Pietro Perona
FGR
2008
IEEE
269views Biometrics» more  FGR 2008»
14 years 2 months ago
Real-time facial expression recognition with illumination-corrected image sequences
We present a real-time user-independent computer vision system that processes a sequence of images of a front-facing human face and recognises a set of facial expressions at 30 fp...
He Li, José Miguel Buenaposada, Luis Baumel...