Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Face authentication with Gabor information on deformable graphs

Published: 01 April 1999 Publication History

Abstract

Elastic graph matching has been proposed as a practical implementation of dynamic link matching, which is a neural network with dynamically evolving links between a reference model and an input image. Each node of the graph contains features that characterize the neighborhood of its location in the image. The elastic graph matching usually consists of two consecutive steps, namely a matching with a rigid grid, followed by a deformation of the grid, which is actually the elastic part. The deformation step is introduced in order to allow for some deformation, rotation, and scaling of the object to be matched. This method is applied here to the authentication of human faces where candidates claim an identity that is to be checked. The matching error as originally suggested is not powerful enough to provide satisfying results in this case. We introduce an automatic weighting of the nodes according to their significance. We also explore the significance of the elastic deformation for an application of face-based person authentication. We compare performance results obtained with and without the second matching step. Results show that the deformation step slightly increases the performance, but has lower influence than the weighting of the nodes. The best results are obtained with the combination of both aspects. The results provided by the proposed method compare favorably with two methods that require a prior geometric face normalization, namely the synergetic and eigenface approaches

Cited By

View all
  • (2022)On increasing password security awareness using a serious game2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC49033.2022.9700539(82-87)Online publication date: 8-Jan-2022
  • (2022)A GAN Based Approach to Compare Identical Images with Generative NoiseImage Analysis and Processing – ICIAP 202210.1007/978-3-031-06430-2_19(225-236)Online publication date: 23-May-2022
  • (2021)WiFi-Enabled User Authentication through Deep Learning in Daily ActivitiesACM Transactions on Internet of Things10.1145/34487382:2(1-25)Online publication date: 4-May-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Image Processing
IEEE Transactions on Image Processing  Volume 8, Issue 4
April 1999
147 pages

Publisher

IEEE Press

Publication History

Published: 01 April 1999

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2022)On increasing password security awareness using a serious game2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC49033.2022.9700539(82-87)Online publication date: 8-Jan-2022
  • (2022)A GAN Based Approach to Compare Identical Images with Generative NoiseImage Analysis and Processing – ICIAP 202210.1007/978-3-031-06430-2_19(225-236)Online publication date: 23-May-2022
  • (2021)WiFi-Enabled User Authentication through Deep Learning in Daily ActivitiesACM Transactions on Internet of Things10.1145/34487382:2(1-25)Online publication date: 4-May-2021
  • (2021)Power Saving and Secure Text Input for Commodity Smart WatchesIEEE Transactions on Mobile Computing10.1109/TMC.2020.297600720:6(2281-2296)Online publication date: 1-Jun-2021
  • (2021)An Extensive Study on Traditional-to-Recent Transformation on Face Recognition SystemWireless Personal Communications: An International Journal10.1007/s11277-021-08170-3118:4(3075-3128)Online publication date: 1-Jun-2021
  • (2019)TaprintThe 25th Annual International Conference on Mobile Computing and Networking10.1145/3300061.3300124(1-16)Online publication date: 5-Aug-2019
  • (2019)PassGAN: A Deep Learning Approach for Password GuessingApplied Cryptography and Network Security10.1007/978-3-030-21568-2_11(217-237)Online publication date: 5-Jun-2019
  • (2017)Game Authentication Based on Behavior PatternProceedings of the 15th International Conference on Advances in Mobile Computing & Multimedia10.1145/3151848.3151878(151-156)Online publication date: 4-Dec-2017
  • (2017)VibWriteProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3133964(73-87)Online publication date: 30-Oct-2017
  • (2017)Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoTProceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing10.1145/3084041.3084061(1-10)Online publication date: 10-Jul-2017
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media