-
1
-
-
33947499205
-
Continuous verification using multimodal biometrics
-
DOI 10.1109/TPAMI.2007.1010, Special issue on Biometrics: Progress and Directions
-
T. Sim, S. Zhang, R. Janakiraman, and S. Kumar, "Continuous Verification Using Multimodal Biometrics," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, Apr. 2007, pp. 687-700, doi: 10.1109/TPAMI.2007.1010. (Pubitemid 46464408)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 687-700
-
-
Sim, T.1
Zhang, S.2
Janakiraman, R.3
Kumar, S.4
-
2
-
-
78649427215
-
Soft Biometric Traits for Continuous User Authentication
-
Dec. doi: 10.1109/TIFS.2010.2075927
-
K. Niinuma, U. Park, and A. K. Jain, "Soft Biometric Traits for Continuous User Authentication," IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, Dec. 2010, pp. 771-780, doi: 10.1109/TIFS.2010. 2075927.
-
(2010)
IEEE Transactions on Information Forensics and Security
, vol.5
, Issue.4
, pp. 771-780
-
-
Niinuma, K.1
Park, U.2
Jain, A.K.3
-
3
-
-
77952499329
-
Facial Recognition in Uncontrolled Conditions for Information Security
-
Feb. doi: 10.1155/2010/345743
-
Q. Xiao and X.-D. Yang, "Facial Recognition in Uncontrolled Conditions for Information Security," EURASIP Journal on Advances in Signal Processing, vol. 2010, pp. 1-9, Feb. 2010, doi: 10.1155/2010/345743.
-
(2010)
EURASIP Journal on Advances in Signal Processing
, vol.2010
, pp. 1-9
-
-
Xiao, Q.1
Yang, X.-D.2
-
4
-
-
27644547776
-
Real-time face detection and recognition using hybrid-information extracted from face space and facial features
-
DOI 10.1016/j.imavis.2005.07.017, PII S0262885605001253
-
H. Bae and S. Kim, "Real-time Face Detection and Recognition Using Hybrid-information Extracted from Face Space and Facial Features," Image and Vision Computing, vol. 23, Jul. 2005, pp. 1181-1191, doi:10.1016/j.imavis. 2005.07.017. (Pubitemid 41562999)
-
(2005)
Image and Vision Computing
, vol.23
, Issue.13
, pp. 1181-1191
-
-
Bae, H.1
Kim, S.2
-
5
-
-
2942630102
-
A Robust Skin Color Based Face Detection Algorithm
-
Sep.
-
S. Kr. Singh, D. S. Chauhan, M. Vtsa, and R. Singh, "A Robust Skin Color Based Face Detection Algorithm," Tamkang Journal of Science and Engineering, vol. 6, no. 4, Sep. 2003, pp. 227-234.
-
(2003)
Tamkang Journal of Science and Engineering
, vol.6
, Issue.4
, pp. 227-234
-
-
Singh, S.Kr.1
Chauhan, D.S.2
Vtsa, M.3
Singh, R.4
-
6
-
-
33846314386
-
Using Continuous Biometric Verification to Protect Interactive Login Sessions
-
IEEE Press, Dec. doi: 10.1109/CSAC.2005.61
-
S. Kumar, T. Sim, R. Janakiraman, and S. Zhang, "Using Continuous Biometric Verification to Protect Interactive Login Sessions," Proc. 21st Annual. Computer Security Applications, IEEE Press, Dec. 2005, doi: 10.1109/CSAC.2005.61.
-
(2005)
Proc. 21st Annual. Computer Security Applications
-
-
Kumar, S.1
Sim, T.2
Janakiraman, R.3
Zhang, S.4
-
7
-
-
79952565803
-
A Framework for Continuous Authentication in Ubiquitous Environments
-
IEEE Press, Dec. doi:10.1109/WCSN.2010.5712289
-
M. A. Chowdhury, J. Light, and W. McIver Jr., "A Framework for Continuous Authentication in Ubiquitous Environments," Proc. Wireless Communication and Sensor Networks (WCSN), IEEE Press, Dec. 2010, doi:10.1109/WCSN.2010.5712289.
-
(2010)
Proc. Wireless Communication and Sensor Networks (WCSN)
-
-
Chowdhury, M.A.1
Light, J.2
McIver Jr., W.3
-
8
-
-
35348918183
-
Using Continuous Face Verification to Improve Desktop Security
-
IEEE Press, Jan. doi: 10.1109/ACVMOT.2005.120
-
R. Janakiraman, S. Kumar, S. Zhang, and T. Sim, "Using Continuous Face Verification to Improve Desktop Security," Proc. IEEE Workshop. Application of Computer Vision, IEEE Press, Jan. 2005, pp. 501-507, doi: 10.1109/ACVMOT.2005.120.
-
(2005)
Proc. IEEE Workshop. Application of Computer Vision
, pp. 501-507
-
-
Janakiraman, R.1
Kumar, S.2
Zhang, S.3
Sim, T.4
-
9
-
-
77955295969
-
Continuous Biometric User Authentication in Online Examinations
-
IEEE Press, Apr. doi: 10.1109/ITNG.2010.250
-
E. Flior and K. Kowalski, "Continuous Biometric User Authentication in Online Examinations," Proc. Information Technology: New Generations (ITNG), IEEE Press, Apr. 2010, pp. 488-492, doi: 10.1109/ITNG.2010.250.
-
(2010)
Proc. Information Technology: New Generations (ITNG)
, pp. 488-492
-
-
Flior, E.1
Kowalski, K.2
-
10
-
-
2342498322
-
A Real-time Security Surveillance System for Personal Authentication
-
IEEE Press, Oct. doi: 10.1109/CCST.2003.1297558
-
th Annual 2003. Security Technology, IEEE Press, Oct. 2003, pp. 190-195, doi: 10.1109/CCST.2003.1297558.
-
(2003)
th Annual 2003. Security Technology
, pp. 190-195
-
-
Chien, Y.-T.1
Huang, Y.-S.2
Jeng, S.-W.3
Tsai, Y.-H.4
Zhao, H.-X.5
-
11
-
-
0035680116
-
Rapid Object Detection Using a Boosted Cascade of Simple Features
-
IEEE Press, Dec. doi:10.1109/CVPR.2011.990517
-
P. Viola and M. Jones, "Rapid Object Detection Using a Boosted Cascade of Simple Features," Proc. 2011 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, IEEE Press, Dec. 2011, pp. I511-I518, doi:10.1109/CVPR.2011.990517.
-
(2011)
Proc. 2011 IEEE Computer Society Conference on Computer Vision and Pattern Recognition
, vol.1
-
-
Viola, P.1
Jones, M.2
-
13
-
-
0029218795
-
Continuous Authentication by Analysis of Keyboard Typing Characteristics
-
IEEE Press, May, doi:10.1049/cp:19950480
-
S. J. Shepherd, "Continuous Authentication by Analysis of Keyboard Typing Characteristics," Proc. European Convention on Security and Detection. IEEE Press, May, 1995, pp. 111-114, doi:10.1049/cp:19950480.
-
(1995)
Proc. European Convention on Security and Detection
, pp. 111-114
-
-
Shepherd, S.J.1
|