Biometric-Based Physical and Cybersecurity Systems 2018
DOI: 10.1007/978-3-319-98734-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Fundamentals and Advances in 3D Face Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 64 publications
0
3
0
Order By: Relevance
“…Traits that can establish the unique identify a person must be capable of matching without being limited to the size of the pool ( i.e., 1: n matching ) [ 7 ]. They adhere to certain criteria that define their value as a biometric identifier: Universality, permanence or persistence (describing the stability of a trait over time), distinctiveness (as a measure of or uniqueness) and moreover includes the possibility to capture and measure it with the technology available [ [8] , [9] , [10] , [11] ].…”
Section: Review Of Existing Researchmentioning
confidence: 99%
“…Traits that can establish the unique identify a person must be capable of matching without being limited to the size of the pool ( i.e., 1: n matching ) [ 7 ]. They adhere to certain criteria that define their value as a biometric identifier: Universality, permanence or persistence (describing the stability of a trait over time), distinctiveness (as a measure of or uniqueness) and moreover includes the possibility to capture and measure it with the technology available [ [8] , [9] , [10] , [11] ].…”
Section: Review Of Existing Researchmentioning
confidence: 99%
“…The firstgeneration biometric systems were focused on uniquely identifying or authenticating specific individuals. It was not until the late 1990s that the first cases of widespread use of such systems began in the US, followed by a significantly increased spread after the 2001 terrorist attacks with the introduction of biometric passports, which contain fingerprints and facial data (Wolf, 2017;Ramalingam et al 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Apps using fingerprint and facial recognition technologies have even reached the private sector, being used for unlocking smartphones or recognizing customers. These techniques replace traditional security measure (such as text-based passwords) due to the latest facial recognition technology, which allows for an individual to be identified in less than a second (Ramalingam et al 2018).…”
Section: Introductionmentioning
confidence: 99%