2019
DOI: 10.3390/su12010085
|View full text |Cite
|
Sign up to set email alerts
|

Entropy-Based Face Recognition and Spoof Detection for Security Applications

Abstract: Nowadays, cyber attacks are becoming an extremely serious issue, which is particularly important to prevent in a smart city context. Among cyber attacks, spoofing is an action that is increasingly common in many areas, such as emails, geolocation services or social networks. Identity spoofing is defined as the action by which a person impersonates a third party to carry out a series of illegal activities such as committing fraud, cyberbullying, sextorsion, etc. In this work, a face recognition system is propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 62 publications
0
9
0
Order By: Relevance
“…Information entropy is derived from information theory [ 33 ], which was originally applied to assess the uncertainty of hydrological models [ 34 ]. The experiments show that the entropy information significantly improves the recognition rate and the robustness of the algorithm [ 35 ]. Analyzing the coordination relationship between economic development and investment potential with methods such as the entropy weight method, etc.…”
Section: Literature Review and Methodologymentioning
confidence: 99%
“…Information entropy is derived from information theory [ 33 ], which was originally applied to assess the uncertainty of hydrological models [ 34 ]. The experiments show that the entropy information significantly improves the recognition rate and the robustness of the algorithm [ 35 ]. Analyzing the coordination relationship between economic development and investment potential with methods such as the entropy weight method, etc.…”
Section: Literature Review and Methodologymentioning
confidence: 99%
“…Information entropy originates from information theory [ 34 ], which was initially used to evaluate the uncertainty of hydrological models [ 35 ]. The experimental results show that entropy information can significantly improve the robustness and recognition rate of the algorithm [ 36 ]. A research is based on TOPSIS technology and uses entropy weight information to calculate the weight of the criteria, in order to selecting suitable suppliers in a green environment [ 37 ].…”
Section: Literature Review and Methodologymentioning
confidence: 99%
“…Surinta et al [ 28 ] claimed that, in gender recognition domain, the Histogram of Oriented Gradient (HOG) descriptor outperforms the scale-invariant feature transform (SIFT) descriptor when combined with the support vector machine (SVM). A face recognition system is designed based on the entropy of each face region in HOG descriptor [ 29 ].…”
Section: State Of the Artmentioning
confidence: 99%