Automatic extraction of face-features
Pattern Recognition Letters
Active shape models—their training and application
Computer Vision and Image Understanding
An anthropometric face model using variational techniques
Proceedings of the 25th annual conference on Computer graphics and interactive techniques
IEEE Transactions on Pattern Analysis and Machine Intelligence
Detecting Faces in Images: A Survey
IEEE Transactions on Pattern Analysis and Machine Intelligence
Algorithms for Image Processing and Computer Vision
Algorithms for Image Processing and Computer Vision
Face Recognition: Features Versus Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns
IEEE Transactions on Pattern Analysis and Machine Intelligence
Real-Time Face Recognition Using Feature Combination
FG '98 Proceedings of the 3rd. International Conference on Face & Gesture Recognition
Face recognition: A literature survey
ACM Computing Surveys (CSUR)
Robust Real-Time Face Detection
International Journal of Computer Vision
Boosting Local Feature Based Classifiers for Face Recognition
CVPRW '04 Proceedings of the 2004 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'04) Volume 5 - Volume 05
Handbook of Face Recognition
Face Description with Local Binary Patterns: Application to Face Recognition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Static topographic modeling for facial expression recognition and analysis
Computer Vision and Image Understanding
Bio-Inspired Electronic-Mutation with genetic properties for Secured Identification
BLISS '07 Proceedings of the 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security
Diffeomorphic statistical shape models
Image and Vision Computing
Identity theft in the USA: evidence from 2002 to 2006
International Journal of Mobile Communications
Anonymous authentication scheme for wireless communications
International Journal of Mobile Communications
International Journal of Mobile Communications
Key management in ad hoc networks using self-certified public key system
International Journal of Mobile Communications
Anonymous authentication for mobile Single Sign-On to protect user privacy
International Journal of Mobile Communications
Clone-Resistant DNA-Like Secured Dynamic Identity
BLISS '08 Proceedings of the 2008 Bio-inspired, Learning and Intelligent Systems for Security
Comparison of MLP and GMM classifiers for face verification on XM2VTS
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
A discriminative feature space for detecting and recognizing faces
CVPR'04 Proceedings of the 2004 IEEE computer society conference on Computer vision and pattern recognition
Face detection with the modified census transform
FGR' 04 Proceedings of the Sixth IEEE international conference on Automatic face and gesture recognition
Face recognition using ada-boosted gabor features
FGR' 04 Proceedings of the Sixth IEEE international conference on Automatic face and gesture recognition
SaaS-model-based approach for mobile government security
International Journal of Mobile Communications
Hi-index | 0.00 |
This paper describes a joint biometric-cryptographic authentication system for mobile e-government transactions. The system can be used to verify, prove, and enforce 'mobile contracts'. The proposed system offers a cryptographical mutually-authenticated image exchange and face identification scheme, as well as remote signing of documents by transferring an authenticated image for personal face and signature operation. The system integrates two physically secured entities, a mobile device camera and a smart-card, both certified by some authority to enable undeniable visualised 'mobile signature'. The result is a secured, traceable e-government infeasible-to-clone virtual person in a form that can be seen as a trustable 'e-officer'.