{"title":"智能设备中人脸识别认证技术-比较研究","authors":"J. George, Tulasi B.","doi":"10.5120/IJAIS2017451671","DOIUrl":null,"url":null,"abstract":"With rapid development of technology there has been a surge in hand-held devices. These devices are looked upon as an alternative to the traditional devices like personal computer and laptop. As the storage and the processing capabilities of these devices are increasing they are been termed as smart devices. The amount of personal data stored in these devices has increased many folds. In order to ensure that the critical data that is stored in these devices is secured, it is essential to put in place authentication processes. Authentication can be done at multiple levels, ranging from a password to face recognition. Algorithms like Eigenfaces, Fisherfaces are being used as a part of authentication applications. This paper tries to provide a comparative study on most commonly used face recognition algorithms. General Terms Face Recognition, Smart Devices, Eigenfaces Algorithm, Fisherfaces Algorithm.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"16 1","pages":"33-37"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Face Recognition Techniques for Authentication in Smart Devices - Comparative Study\",\"authors\":\"J. George, Tulasi B.\",\"doi\":\"10.5120/IJAIS2017451671\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With rapid development of technology there has been a surge in hand-held devices. These devices are looked upon as an alternative to the traditional devices like personal computer and laptop. As the storage and the processing capabilities of these devices are increasing they are been termed as smart devices. The amount of personal data stored in these devices has increased many folds. In order to ensure that the critical data that is stored in these devices is secured, it is essential to put in place authentication processes. Authentication can be done at multiple levels, ranging from a password to face recognition. Algorithms like Eigenfaces, Fisherfaces are being used as a part of authentication applications. This paper tries to provide a comparative study on most commonly used face recognition algorithms. General Terms Face Recognition, Smart Devices, Eigenfaces Algorithm, Fisherfaces Algorithm.\",\"PeriodicalId\":92376,\"journal\":{\"name\":\"International journal of applied information systems\",\"volume\":\"16 1\",\"pages\":\"33-37\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International journal of applied information systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5120/IJAIS2017451671\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of applied information systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5120/IJAIS2017451671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Face Recognition Techniques for Authentication in Smart Devices - Comparative Study
With rapid development of technology there has been a surge in hand-held devices. These devices are looked upon as an alternative to the traditional devices like personal computer and laptop. As the storage and the processing capabilities of these devices are increasing they are been termed as smart devices. The amount of personal data stored in these devices has increased many folds. In order to ensure that the critical data that is stored in these devices is secured, it is essential to put in place authentication processes. Authentication can be done at multiple levels, ranging from a password to face recognition. Algorithms like Eigenfaces, Fisherfaces are being used as a part of authentication applications. This paper tries to provide a comparative study on most commonly used face recognition algorithms. General Terms Face Recognition, Smart Devices, Eigenfaces Algorithm, Fisherfaces Algorithm.