2016
DOI: 10.1016/j.cose.2016.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Automated border control e-gates and facial recognition systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
30
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 80 publications
(31 citation statements)
references
References 16 publications
0
30
0
1
Order By: Relevance
“…Besides that, some of the automated gate system in the market does not provide any monitoring tool or interface to monitor the gate system [11] [12]. Some of them are also unable to open the gate manually if there are any problems to www.ijacsa.thesai.org the system.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Besides that, some of the automated gate system in the market does not provide any monitoring tool or interface to monitor the gate system [11] [12]. Some of them are also unable to open the gate manually if there are any problems to www.ijacsa.thesai.org the system.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the existing gate systems also do not support online connection [11]. The gate system only trigger the alarm without sending out any notification/email to the relevant department.…”
Section: Related Workmentioning
confidence: 99%
“…A current application of face verification systems in real environments with considerable security constraints is ABC systems [ 1 , 2 ]. These are used to verify passenger identities automatically through biometrics [ 3 , 4 ]. Due to this technology, border guards are helped by ABC systems to carry out routine tasks such as passport control and face verification at the international border-crossing points (BCP) of several countries in shorter times and with standard and homogeneous results.…”
Section: Introductionmentioning
confidence: 99%
“…Automatic face recognition is an important field and has a tremendous impact on many domains of our life. For example, private images can be sorted by persons that appear on them (e.g., Apple Photos or Google Photos), or airports perform automatic face recognition as passport control [29]. As the latter has severe security implications, most face recognition challenges such as the Face Recognition Vendor Tests 1 evaluate algorithms that perform verification, i.e., where a pair of model and probe images is tested whether they contain the same identity.…”
Section: Introductionmentioning
confidence: 99%