Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Souad Khellat-Kihel"'
Publikováno v:
Neural Computing and Applications. 33:11905-11922
Traditional local image descriptors such as SIFT and SURF are based on processings similar to those that take place in the early visual cortex. Nowadays, convolutional neural networks still draw inspiration from the human vision system, integrating c
Publikováno v:
Journal of Visual Communication and Image Representation. 88:103627
Publikováno v:
IWBF
Biometric technologies are now widely used in personal mobile devices. The technological improvements in mobile computing platforms make it possible to embed resource-intensive processes such as human faces recognition. The more the cooperation of th
Publikováno v:
Selfie Biometrics ISBN: 9783030269715
Selfie Biometrics
Selfie Biometrics
In everyday life whenever people observe, interact or speak to each other, visual attention is mostly directed toward the other person’s face, particularly to the eyes and the nearby periocular regions. This is naturally reflected when the user int
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::96a1ea8aaeaba230c1dfb0954cf34c9c
https://doi.org/10.1007/978-3-030-26972-2_6
https://doi.org/10.1007/978-3-030-26972-2_6
Publikováno v:
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications ISBN: 9783030339036
CIARP
CIARP
In the last decade deep learning techniques have strongly influenced many aspects of computational vision. Many difficult vision tasks can now be performed by deploying a properly tailored and trained deep network. The enthusiasm for deep learning is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3064b5075f79379c04a3c9a8a89222f9
https://doi.org/10.1007/978-3-030-33904-3_3
https://doi.org/10.1007/978-3-030-33904-3_3
Autor:
Souad Khellat-Kihel, Heydi Méndez-Vázquez, Katy Castillo-Rosado, Massimo Tistarelli, Nelson Mendez-Llanes
Publikováno v:
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications ISBN: 9783030339036
CIARP
CIARP
The easy image capture process on a phone, the ability to move the camera, the non-intrusive characteristic that allows the authentication without interaction of the user, make the face a suitable biometric trait to be used on mobile devices. During
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1c7c3f0738b17e175657b27dd4b27cf7
https://doi.org/10.1007/978-3-030-33904-3_29
https://doi.org/10.1007/978-3-030-33904-3_29
Publikováno v:
IWBF
Face recognition has a strong potential for identity verification on mobile devices, now embedding high resolution cameras and high-end computing hardware. Personal computing devices often also embed automatic face detection, thus facilitating the ex
Publikováno v:
Modelling and Implementation of Complex Systems ISBN: 9783319334097
In the computer networks explosion's time, the need to identify individuals increasingly becomes necessary to perform various operations, such as access control and secure payments. So far, inputting alphanumeric code remains the most used solution.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1eac1265d566eedbd06c64478bbe8b4c
https://doi.org/10.1007/978-3-319-33410-3_13
https://doi.org/10.1007/978-3-319-33410-3_13
Publikováno v:
Repositório Científico de Acesso Aberto de Portugal
Repositório Científico de Acesso Aberto de Portugal (RCAAP)
instacron:RCAAP
Repositório Científico de Acesso Aberto de Portugal (RCAAP)
instacron:RCAAP
Unimodal biometric have improved the possibility to establish systems capable of identifying and managing the flow of individuals according to the available intrinsic characteristics that we have. However, a reliable recognition system requires multi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b7658c0b7ad43b0635927f5993c5edd6
Publikováno v:
International Image Processing, Applications and Systems Conference.
Nowadays biometric identification systems are widely spread since the safety of those systems has been proven. They exhibit a large number of advantages when compared to other identification systems such as key and password that are subject to falsif