Identity Verification of Ticket Holders at Large-scale Events Using Face Recognition

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity verification using speech and face information

This article first provides an overview of important concepts in the field of information fusion, followed by a review of milestones in audio-visual person identification and verification. Several recent adaptive and non-adaptive techniques for reaching the verification decision (i.e., to accept or reject the claimant), based on speech and face information, are then evaluated in clean and noisy...

متن کامل

Use of Rfid at Large-scale Events

Radio Frequency Identification (RFID) devices and related technologies have received a great deal of attention for their ability to perform noncontact object identification. Systems incorporating RFID have been evaluated from a variety of perspectives. The authors constructed a networked RFID system to support event management at NetWorld+Interop 2004 Tokyo, an event that received 150,000 visit...

متن کامل

Robust face-voice based speaker identity verification using multilevel fusion

In this paper, we propose a robust multilevel fusion strategy involving cascaded multimodal fusion of audio–lip–face motion, correlation and depth features for biometric person authentication. The proposed approach combines the information from different audio–video based modules, namely: audio–lip motion module, audio–lip correlation module, 2D + 3D motion-depth fusion module, and performs a h...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

Features for robust face-based identity verification

In this paper we propose the discrete cosine transform (DCT) mod 2 feature set, which utilizes polynomial coe2cients derived from 2D DCT coe2cients obtained from spatially neighboring blocks. Face veri%cation results on the multi-session VidTIMIT database suggest that the DCT-mod 2 feature set is superior (in terms of robustness to illumination direction changes and discrimination ability) to f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Processing

سال: 2017

ISSN: 1882-6652

DOI: 10.2197/ipsjjip.25.448