Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection
IEEE Transactions on Pattern Analysis and Machine Intelligence
Face Recognition by Elastic Bunch Graph Matching
IEEE Transactions on Pattern Analysis and Machine Intelligence
Real-time face pose estimation
Real-Time Imaging - Special issue on real-time visual monitoring and inspection
Face Recognition: Features Versus Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
ECCV '98 Proceedings of the 5th European Conference on Computer Vision-Volume II - Volume II
The FERET September 1996 Database and Evaluation Procedure
AVBPA '97 Proceedings of the First International Conference on Audio- and Video-Based Biometric Person Authentication
One-shot 3D-shape and Texture Acquisition of Facial Data
AVBPA '97 Proceedings of the First International Conference on Audio- and Video-Based Biometric Person Authentication
Spiral topologies for biometric recognition
ASB'03 Proceedings of the 1st international conference on Advanced Studies in Biometrics
Hi-index | 0.00 |
In the last decade, many recognition and authentication systems based on biometric mesaurements have been proposed. Still algorithms based on face images are quite appealing for the possibility to easy adapt and taylor a system to many application domains.A system for personal identity verification and also recognition is presented. The core engine is a standard correlation-based matcher performed on iconic representations of face images. Two data sets are used to validate the performances of the whole system (from data acquisition to recognition): the former is a standard "academic" database (with known acquisition parameters) similar to the FERET image set, the latter is an "industrial" data set acquired in a real application scenario. Through standard statistical tests of the recognition results obtained from the two data sets the actual physical limits of the pattern matcher are clearly shown. Successively also other aspects are taken into account, related to the feature space, allowing to greatly improve the system performance reaching almost 100% correct recognition.Several hints for the development of new techniques for identity verification are also suggested.