A complete and fully automated face verification system on mobile devices
نویسندگان
چکیده
Mobile devices have been widely used not only as a communication tool, but also a digital assistance to our daily life, which imposes high security concern on mobile devices. In this paper we present a natural and non-intrusive way to secure mobile devices, i.e. a complete and fully automated face verification system. It consists of three sub-systems: face detection, alignment and verification. The proposed subspace face/eye detector locates the eyes at a much higher precision than Adaboost face/ eye detector. By utilizing attentional cascade strategy, the proposed face/eye detector achieves a comparable speed to Adaboost face/eye detector in this ‘‘close-range’’ application. The proposed approach that determines the class-specific threshold without sacrificing the training data for the validation data further boosts the performance. The proposed system is systematically evaluated on O2FN, AR and CAS-PEAL databases, and compared with many different approaches. Compared to the best competitive system, which is built upon Adaboost face/eye detector and ERE approach for face recognition, the proposed system reduces the overall equal error rate from 8.49% to 3.88% on the O2FN database, from 7.64% to 1.90% on the AR database and from 9.30% to 5.60% on the CAS-PEAL database. The proposed system is implemented on O2 XDA Flame and on average it takes 1.03 s for the whole process, including face detection, eye detection and face verification. & 2012 Elsevier Ltd. All rights reserved.
منابع مشابه
Face Detection with methods based on color by using Artificial Neural Network
The face Detection methodsis used in order to provide security. The mentioned methods problems are that it cannot be categorized because of the great differences and varieties in the face of individuals. In this paper, face Detection methods has been presented for overcoming upon these problems based on skin color datum. The researcher gathered a face database of 30 individuals consisting of ov...
متن کاملAlgorithms and VLSI Architectures for Low-Power Mobile Face Verification
Among the biometric modalities suitable for mobile applications, face verification is definitely an interesting one, because of its low level of invasiveness, and because it is easily applicable from the user viewpoint. Additionally, a reduced cost of the identity verification device is possible when sharing the imaging device between different applications. This is for instance not possible wi...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Pattern Recognition
دوره 46 شماره
صفحات -
تاریخ انتشار 2013