Abstract—We propose a secure, robust, and low-cost biomet-ric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information fusion. For the complicated face authentication task on the devices with limited resources, the emphasis is largely on the reliability and applicability of the system. Both theoretical and practical consid-erations are taken. The final system is able to achieve an equal error rate of 2 % under challenging testing protocols. The low hardware and software cost makes the system well adaptable to a large range of security applications. Index ...
Mobile technology has been increased in demand in vanous applications, such as consumer and business...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Mobile devices have become indispensable tools nowadays. With growing technologies, applications and...
We propose a secure, robust, and low-cost biometric authentication system on the mobile personal dev...
Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An auth...
Abstract-Secure access is prerequisite for a Mobile Personal Device (MPD) in a Personal Network (PN)...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Information security and verify the user's identity has become one of the biggest concerns of i...
With the advances in Information Technology (IT) there has been an increase in threats to the commun...
Part 3: Biometrics and Biometrics ApplicationsInternational audienceThe paper is intended as a short...
Biometric systems are generally restricted to specialist deployments and require expensive equipment...
Mobile devices have become indispensable tools nowadays. With growing technologies, applications and...
Biometrics play an avid role in today’s mobile security realm. Security experts have attempted...
Biometrics are biological measurements of an individual that can be used to identify them. This is c...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Mobile technology has been increased in demand in vanous applications, such as consumer and business...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Mobile devices have become indispensable tools nowadays. With growing technologies, applications and...
We propose a secure, robust, and low-cost biometric authentication system on the mobile personal dev...
Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An auth...
Abstract-Secure access is prerequisite for a Mobile Personal Device (MPD) in a Personal Network (PN)...
Over the past few years, the usage of mobile devices to access data has becoming more frequent, and ...
Information security and verify the user's identity has become one of the biggest concerns of i...
With the advances in Information Technology (IT) there has been an increase in threats to the commun...
Part 3: Biometrics and Biometrics ApplicationsInternational audienceThe paper is intended as a short...
Biometric systems are generally restricted to specialist deployments and require expensive equipment...
Mobile devices have become indispensable tools nowadays. With growing technologies, applications and...
Biometrics play an avid role in today’s mobile security realm. Security experts have attempted...
Biometrics are biological measurements of an individual that can be used to identify them. This is c...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Mobile technology has been increased in demand in vanous applications, such as consumer and business...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Mobile devices have become indispensable tools nowadays. With growing technologies, applications and...