Biometrical Processing of Faces in Security and Forensics
نویسنده
چکیده
The recognition of faces is one of the easiest and the most frequently used by adult human method of distinction between known and unknown persons and identification of these familiar. Usually we benefit from it even without the awareness of this process and similarly another people can recognize our identity basing only on the quick observation. Often such recognition is done even without our knowledge or our permission to do it, and moreover, usually we ignore the most of looks given us. It is not meaningless, that recognition of faces, along with the recognition of voice, is the most common in the nature method of identification of individuals for a number of species. Automatic processing of faces has found a number of applications in several specific fields: in security, forensic and commercial solutions. The neutrality and non-intrusiveness are the main reasons AbsTRACT
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملNetwork externalities in biometrical identification
Biometrical identification has not been adopted to be a key technology in computer security as was hoped for, or to the extent the sophistication of the technology would promise. One reason for this might be that the application of biometrical identification has not yet gained wide enough scale, which leads to missing positive network externalities.In this paper the concepts of biometrical iden...
متن کاملEvent-Related Potentials of Bottom-Up and Top-Down Processing of Emotional Faces
Introduction: Emotional stimulus is processed automatically in a bottom-up way or can be processed voluntarily in a top-down way. Imaging studies have indicated that bottom-up and top-down processing are mediated through different neural systems. However, temporal differentiation of top-down versus bottom-up processing of facial emotional expressions has remained to be clarified. The present st...
متن کاملCounter-Forensics: Attacking Image Forensics
This chapter discusses counter-forensics, the art and science of impeding or misleading forensic analyses of digital images. Research on counter-forensics is motivated by the need to assess and improve the reliability of forensic methods in situations where intelligent adversaries make efforts to induce a certain outcome of forensic analyses. Counter-forensics is first defined in a formal decis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010