2015
DOI: 10.1049/el.2015.0767
|View full text |Cite
|
Sign up to set email alerts
|

Access control based on gait analysis and face recognition

Abstract: According to a new market research report, electronic access control system is expected to be worth $16.3 billion by 2017. Vision-based biometric authentication systems have received much attention with increasing demands for long distance surveillance applications and access control to the security area. Such visual application is mainly focused on face recognition. Nevertheless, small size or poor quality images with varying poses, illumination, expressions, glasses or hats and so on can perturb the recognit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Compared to these contact-based solutions, continuous authentication using non-contact, unobtrusive techniques, such as Doppler radar, can further improve system usability and expand the range of applications into domains with known privacy concerns [43,44]. For example, various visible and thermal-based cameras are employed to acquire face and gait features for user verification [45][46][47]. However, image-based approaches suffer from several irreconcilable dilemmas, including a lack of privacy and degraded performance under a low light ambient conditions [48,49].…”
Section: Introductionmentioning
confidence: 99%
“…Compared to these contact-based solutions, continuous authentication using non-contact, unobtrusive techniques, such as Doppler radar, can further improve system usability and expand the range of applications into domains with known privacy concerns [43,44]. For example, various visible and thermal-based cameras are employed to acquire face and gait features for user verification [45][46][47]. However, image-based approaches suffer from several irreconcilable dilemmas, including a lack of privacy and degraded performance under a low light ambient conditions [48,49].…”
Section: Introductionmentioning
confidence: 99%
“…Face recognition (FR) is one of the most crucial tasks in computer vision and pattern recognition, and is widely used in practical applications, such as access control, e-passport, and criminal recognition [1][2][3]. Many classical algorithms have been proposed to address this issue, such as nearest neighbour classification (NN) [4], linear support vector machine (SVM) [5], and linear regression classification (LRC) [6].…”
Section: Introductionmentioning
confidence: 99%
“…From the perspective of the degree of cooperation of the subjects in the phase of feature acquisition, the existing systems can be categorized into constrained and unconstrained manners [ 9 , 10 ]. In the constrained sensing-based systems, the capture of physiological traits such as fingerprint [ 11 ], palm print [ 12 ], and iris [ 13 ] depends on high-quality and short-range sensors.…”
Section: Introductionmentioning
confidence: 99%
“…In unconstrained biometric capture, the physiological and behavioral traits are collected far away from the sensor. Various visible and thermal camera-based vision techniques have been applied to the acquisition of face and gait features [ 9 ]. The rapid developments of face identification systems are capable of recognizing and verifying personal identity in a passive and non-intrusive manner [ 17 ].…”
Section: Introductionmentioning
confidence: 99%