In this work, we propose a more realistic and efficient face-based mobile authentication technique using CNNs. This paper discusses and explores an inevitable problem of using face images for mobile authentication, taken from varying distances with a front/selfie camera of the mobile phone. Incidentally, once an individual comes towards a certain distance from the camera, the face images get large and appear over-sized. Simultaneously sharp features of some portions of the face, such as forehead, cheek, and chin are changed completely. As a result, the face features change and the impact increases exponentially once the individual crosses a certain distance and gradually approaches towards the front camera. This work proposes a solution (ac...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Mobile phones are rapidly becoming one of the most popular and powerful tools in our lives everywher...
Personal mobile devices currently have access to a significant portion of their user’s private sensi...
© 2018 IEEE. In this work, we propose a more realistic and efficient facebased mobile authentication...
Ubiquitous and real-time person authentication has become critical after the breakthrough of all kin...
As mobile devices are becoming more ubiquitous, it becomes impor-tant to continuously verify the ide...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...
Recent technological advancements have made face recognition a very viable identification and verif...
5In face recognition systems, the use of convolutional neural networks (CNNs) permits to achieve goo...
We address the use of selfie ocular images captured with smartphones to estimate age and gender. Par...
Smartphones continue to proliferate throughout our daily lives, not only in sheer quantity but also ...
Abstract: Modern mobile devices have become very powerful. All kinds of sensitive data are stored an...
Computer vision applications for mobile phones are gaining increasing attention due to several pract...
Today, we are facing the COVID-19 pandemic. Accordingly, properly wearing face masks has become vita...
Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An auth...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Mobile phones are rapidly becoming one of the most popular and powerful tools in our lives everywher...
Personal mobile devices currently have access to a significant portion of their user’s private sensi...
© 2018 IEEE. In this work, we propose a more realistic and efficient facebased mobile authentication...
Ubiquitous and real-time person authentication has become critical after the breakthrough of all kin...
As mobile devices are becoming more ubiquitous, it becomes impor-tant to continuously verify the ide...
With the widespread use of biometric authentication comes the exploitation of presentation attacks, ...
Recent technological advancements have made face recognition a very viable identification and verif...
5In face recognition systems, the use of convolutional neural networks (CNNs) permits to achieve goo...
We address the use of selfie ocular images captured with smartphones to estimate age and gender. Par...
Smartphones continue to proliferate throughout our daily lives, not only in sheer quantity but also ...
Abstract: Modern mobile devices have become very powerful. All kinds of sensitive data are stored an...
Computer vision applications for mobile phones are gaining increasing attention due to several pract...
Today, we are facing the COVID-19 pandemic. Accordingly, properly wearing face masks has become vita...
Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An auth...
The use of mobile devices is continuously growing, together with their ability to store and exchange...
Mobile phones are rapidly becoming one of the most popular and powerful tools in our lives everywher...
Personal mobile devices currently have access to a significant portion of their user’s private sensi...