2007
DOI: 10.1016/j.patrec.2006.12.005
|View full text |Cite
|
Sign up to set email alerts
|

An efficient face verification method in a transformed domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2008
2008
2010
2010

Publication Types

Select...
6
3

Relationship

4
5

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…Thus, for instance, it is possible to enhance a face recognition system [18] by means of data fusion between biometric classifiers performing on each kind of image [19]. In fact, experimental results of Table 2 reveal that the mutual information is low, between 0.89 and 1.55 bit when comparing a pair of images of the same person acquired with a different kinds of sensor and between 1.58 and 2.10 bit when acquired with same kind of sensor.…”
Section: Discussionmentioning
confidence: 99%
“…Thus, for instance, it is possible to enhance a face recognition system [18] by means of data fusion between biometric classifiers performing on each kind of image [19]. In fact, experimental results of Table 2 reveal that the mutual information is low, between 0.89 and 1.55 bit when comparing a pair of images of the same person acquired with a different kinds of sensor and between 1.58 and 2.10 bit when acquired with same kind of sensor.…”
Section: Discussionmentioning
confidence: 99%
“…They have the following main features: Figure 4 shows some snapshots of these three databases. Feature extraction from face images is based on Discrete Cosine Transform (DCT) and can be found in our previous work [16] and [17]. Tables 1 and 2 present the experimental results with different training and testing conditions.…”
Section: Experiments With Face Databasesmentioning
confidence: 99%
“…The core of this system is a hewlett-packard notebook with touch screen (suitable for online signature acquisition). The technological solutions behind each biometric trait are DCT-NN [11] for face recognition, SVM for hand-geometry, HMM for signature and GMM for speaker recognition. Figure 6 shows some snapshots of the screen and figure 7 shows a physical installation in a wall for door opening system.…”
Section: Proposed Approach (Step 2)mentioning
confidence: 99%