2014
DOI: 10.14257/ijbsbt.2014.6.2.01
|View full text |Cite
|
Sign up to set email alerts
|

A Study on the Design and Implementation of Facial Recognition Application System

Abstract: Face recognition systems gain flexibility and cost efficiency while being integrated into a wireless network. In this paper, we describe a study on the implementation of facial recognition application system using wireless devices. The facial recognition system transmits the pictures photographed by wireless terminals or smart phones and recognizes/authenticates the faces. This system can be applied to several areas such as indolence management, access management and attendance management. The previous facial … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…There is no contact with each other, no effort is needed, and it will not affect people's normal living habits and behaviors. And due to the continuous innovation of Internet technology, the efficiency, function and accuracy of facial recognition application systems are getting better and better [3].…”
Section: Introductionmentioning
confidence: 99%
“…There is no contact with each other, no effort is needed, and it will not affect people's normal living habits and behaviors. And due to the continuous innovation of Internet technology, the efficiency, function and accuracy of facial recognition application systems are getting better and better [3].…”
Section: Introductionmentioning
confidence: 99%
“…The scheme can operate without user participation, but it has a significant drawback: if an adversary gains control of a lost or stolen device along with the necessary decryption information, they can access the encrypted data. Park et al 24 developed a user anonymity‐preserving authentication technique, but subsequent research 25 showed vulnerabilities to attacks such as password guessing, privileged insider, and known session‐specific transient information. Furthermore, the scheme does not guarantee user privacy, and the gateway node's private key is not secure.…”
Section: Related Workmentioning
confidence: 99%