Y Wang, Z Li, L Wang, M Wang - J. Inf. Hiding Multim. Signal …, 2013 - bit.nkust.edu.tw
In this paper, we propose a novel method for face recognition. Its basic idea is to use a coarse to fine strategy based on Scale Invariant Feature Transform (SIFT) feature. To …
Y Xu, Q Zhu, Z Fan, Y Wang, JS Pan - Neurocomputing, 2013 - Elsevier
Transformation methods have been widely used in biometrics such as face recognition, gait recognition and palmprint recognition. It seems that conventional transformation methods …
N Zhu, T Tang, S Tang, D Tang, F Yu - Optik, 2013 - Elsevier
To improve the classification accuracy of face recognition, a sparse representation method based on kernel and virtual samples is proposed in this paper. The proposed method has …
R Cheng, Y Zhao, Z Li, W Jiang… - Journal of Electronic …, 2013 - spiedigitallibrary.org
A panorama parking assistant system (PPAS) for the automotive aftermarket together with a practical improved particle swarm optimization method (IPSO) are proposed in this paper. In …
Z Li, N Yang, B Xie, J Zhang - Optik, 2013 - Elsevier
In this paper, we propose a two-phase face recognition method in frequency domain using discrete cosine transform (DCT) and discrete Fourier transform (DFT). The absolute values …
X Wang, Q Zhu, J Cui, Y Wang - Optik, 2013 - Elsevier
Sparse representation method (SRM) is a state-of-the-art face recognition method. Nevertheless, SRM exploits image samples rather than image features to perform …
Q Zhu, Z Li, J Liu, Z Fan, L Yu, Y Chen - Plos one, 2013 - journals.plos.org
Minimum squared error based classification (MSEC) method establishes a unique classification model for all the test samples. However, this classification model may be not …
S Kumaraswamy, SH Manjula, KR Venugopal… - Journal Impact …, 2013 - researchgate.net
Cryptographic approaches are traditional and preferred methodologies used to preserve the privacy of data released for analysis. Privacy Preserving Data Mining (PPDM) is a new trend …
Q Zhu, C Sun - Neural Computing and Applications, 2013 - Springer
In this paper, we propose a novel image-based identity verification method. This method first uses the training images of the claimed identity to represent the testing sample and then …