Combining classifiers for face recognition

X Lu, Y Wang, AK Jain - … on Multimedia and Expo. ICME'03 …, 2003 - ieeexplore.ieee.org
Current two-dimensional face recognition approaches can obtain a good performance only
under constrained environments. However, in the real applications, face appearance …

[PDF][PDF] Information fusion and person verification using speech and face information

C Sanderson, KK Paliwal - Research Paper IDIAP-RR, 2002 - conradsanderson.id.au
This report first provides an overview of important concepts in the field of information fusion,
followed by a review of important milestones in audio-visual person identification and …

Taprint: Secure text input for commodity smart wristbands

W Chen, L Chen, Y Huang, X Zhang, L Wang… - The 25th Annual …, 2019 - dl.acm.org
Smart wristband has become a dominant device in the wearable ecosystem, providing
versatile functions such as fitness tracking, mobile payment, and transport ticketing …

HIAuth: A hierarchical implicit authentication system for IoT wearables using multiple biometrics

S Vhaduri, SV Dibbo, W Cheung - Ieee Access, 2021 - ieeexplore.ieee.org
Day-by-day wearable devices, such as smartwatches, are getting popular with their wide
range of services, including allowing financial transactions, unlocking cars, tracking health …

mmSignature: Semi-supervised human identification system based on millimeter wave radar

Y Yao, H Zhang, P Xia, C Liu, F Geng, Z Bai… - … Applications of Artificial …, 2023 - Elsevier
Human identification is vital in health monitoring, human-computer interaction, safety
detection, and other fields. Compared with traditional vision-based methods, millimeter wave …

Audiovisual information fusion in human–computer interfaces and intelligent environments: A survey

ST Shivappa, MM Trivedi, BD Rao - Proceedings of the IEEE, 2010 - ieeexplore.ieee.org
Microphones and cameras have been extensively used to observe and detect human
activity and to facilitate natural modes of interaction between humans and intelligent …

Personal authentication using digital retinal images

C Marino, MG Penedo, M Penas, MJ Carreira… - Pattern Analysis and …, 2006 - Springer
Traditional authentication (identity verification) systems, used to gain access to a private
area in a building or to data stored in a computer, are based on something the user has (an …

[图书][B] Reliable Face Recognition Methods: System Design, Impementation and Evaluation

H Wechsler - 2007 - Springer
Much of the existing face recognition systems operate in 2D. As the search for improved
recognition performance intensifies, alternative methods, eg, 3D, are under consideration …

Multibiometric fusion strategy and its applications: A review

SKS Modak, VK Jha - Information Fusion, 2019 - Elsevier
The unimodal biometric based system faced several inherent problems like lack of
uniqueness, intra-class variation, non-universality, noisy data (presence of dirt on the …

Multimodal facial gender and ethnicity identification

X Lu, H Chen, AK Jain - … in Biometrics: International Conference, ICB 2006 …, 2005 - Springer
Human faces provide demographic information, such as gender and ethnicity. Different
modalities of human faces, eg, range and intensity, provide different cues for gender and …