A robust face recognition system
This paper proposes a robust face recognition system, by providing a strong discrimination power and cancelable mechanism to biometrics data. Fisher's Linear Discriminant uses pseudo Zemike moments to derive an enhanced feature subset. On the other hand, the revocation capability is formed by t...
| Main Authors: | Pang, Ying Han, Ngo, David Chek Ling, Teoh, Andrew Ben Jin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer Berlin Heidelberg
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2347/ http://shdl.mmu.edu.my/2347/1/A%20robust%20face%20recognition%20system.pdf |
Similar Items
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Kernel Discriminant Embedding in face recognition
by: Han, Pang Ying, et al.
Published: (2011)
by: Han, Pang Ying, et al.
Published: (2011)
Regularized locality preserving discriminant embedding for face recognition
by: Pang, Ying Han, et al.
Published: (2012)
by: Pang, Ying Han, et al.
Published: (2012)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Neighbourhood Discriminant Locally Linear Embedding in Face Recognition
by: Han, Pang Ying, et al.
Published: (2008)
by: Han, Pang Ying, et al.
Published: (2008)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
Supervised Locally Linear Embedding in face recognition
by: Ying Han, Pang, et al.
Published: (2008)
by: Ying Han, Pang, et al.
Published: (2008)
Digital camera based fingerprint recognition
by: Hiew, Bee Yan, et al.
Published: (2007)
by: Hiew, Bee Yan, et al.
Published: (2007)
Touch-less Fingerprint Recognition System
by: Hiew, Bee Yan, et al.
Published: (2007)
by: Hiew, Bee Yan, et al.
Published: (2007)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
A study on partial face recognition of eye region
by: Teo, Chuan Chin, et al.
Published: (2007)
by: Teo, Chuan Chin, et al.
Published: (2007)
A Study on Optimal Face Ratio for Recognition Using Part-based Feature Extractor
by: Neo, Han Foon, et al.
Published: (2007)
by: Neo, Han Foon, et al.
Published: (2007)
Face recognition using wavelet transform and non-negative matrix factorization
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Fingerprint images segmentation using two stages coarse to fine discrimination technique
by: Ong, Teng Sian, et al.
Published: (2003)
by: Ong, Teng Sian, et al.
Published: (2003)
Automatic fingerprint center point determination by using modified directional field and morphology
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
Wavelet based illumination invariant preprocessing in face recognition
by: Y. Z., Goh, et al.
Published: (2008)
by: Y. Z., Goh, et al.
Published: (2008)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000)
by: Chek, David Ling Ngo, et al.
Published: (2000)
An automated palmprint recognition system
by: CONNIE, T, et al.
Published: (2005)
by: CONNIE, T, et al.
Published: (2005)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
Modelling interface aesthetics
by: Ngo, David Chek Ling, et al.
Published: (2003)
by: Ngo, David Chek Ling, et al.
Published: (2003)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Preprocessing of fingerprint images captured with a digital camera
by: Hiew,, B. Y, et al.
Published: (2006)
by: Hiew,, B. Y, et al.
Published: (2006)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
A face and speech biometric verification system using a simple Bayesian structure
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Artificial Visual System Algorithm applied on Face Recognition and Tracking
by: Lum, Mi-Fern, et al.
Published: (2008)
by: Lum, Mi-Fern, et al.
Published: (2008)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Remarks on BioHash and its mathematical foundation
by: TEOH, A, et al.
Published: (2006)
by: TEOH, A, et al.
Published: (2006)
Robust incremental growing multi-experts network
by: LOO, C, et al.
Published: (2006)
by: LOO, C, et al.
Published: (2006)
Robust And Imperceptible Digital Video
Watermarking Techniques
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Similar Items
-
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005) -
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006) -
Kernel Discriminant Embedding in face recognition
by: Han, Pang Ying, et al.
Published: (2011) -
Regularized locality preserving discriminant embedding for face recognition
by: Pang, Ying Han, et al.
Published: (2012) -
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)