2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops) 2011
DOI: 10.1109/iccvw.2011.6130220
|View full text |Cite
|
Sign up to set email alerts
|

Face authentication using graph-based low-rank representation of facial local structures for mobile vision applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…x − V x slices) of the images in figure 1. Now the difference becomes visible: We observe that for the printed photo, all epipolar lines in a plane have the same gradient (slope 1 ). This is absolutely predictable if we recall that the gradient of an epipolar line is proportional to the depth of its corresponding point.…”
Section: Detecting Flat Surfaces Using the Epi Informationmentioning
confidence: 99%
See 1 more Smart Citation
“…x − V x slices) of the images in figure 1. Now the difference becomes visible: We observe that for the printed photo, all epipolar lines in a plane have the same gradient (slope 1 ). This is absolutely predictable if we recall that the gradient of an epipolar line is proportional to the depth of its corresponding point.…”
Section: Detecting Flat Surfaces Using the Epi Informationmentioning
confidence: 99%
“…Recently, in many modern digital devices such as smartphones or laptops, there is an authentication option to replace the password-based authentication with personal face detection-based authentication mechanisms [1]. However, most of such systems suffer from vulnerabilities to intrusion by using a printed photo of the authorized face.…”
Section: Introductionmentioning
confidence: 99%
“…For example, airports may use facial recognition technology to identify passengers as they go through security, or companies may use facial recognition to verify employee identities for access to secure areas or sensitive information. Facial recognition technology continues to evolve and improve, with developers working to address the technical and ethical challenges associated with its use [41].…”
Section: User Identificationmentioning
confidence: 99%
“…The idea of token identification is based on the use of a small electronic device that identifies the person who wears it. Biometric data can be targeted specifically towards authentication, e.g., [44]; or identification, e.g., [45]. The advantage of this type of data is that it can not be intercepted or lost.…”
Section: User Identificationmentioning
confidence: 99%