Proceedings of the Design Automation &Amp;amp;amp; Test in Europe Conference 2006
DOI: 10.1109/date.2006.244155
|View full text |Cite
|
Sign up to set email alerts
|

Architectures for efficient face authentication in embedded systems

Abstract: Biometrics represent a promising approach for reliable and secure user authentication. However, they have not yet been widely adopted in embedded systems, particularly in resource-constrained devices such as cell phones and personal digital assistants (PDAs). In this paper, we investigate the challenges involved in using face-based biometrics for authenticating a user to an embedded system. To enable high authentication accuracy, we consider robust face verifiers based on principal component analysis/linear di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…This can be especially important for authentication on small mobile devices. Besides, the magnetic interaction does not suffer from illumination and occlusion problems faced by the computer vision based authentication methods such as iris, face recognition [1][2]. In addition, since the proposed approach relies on the magnetic field which can pass through obstructing materials, the interaction can be performed even if the device is not in the line of sight.…”
Section: D Magnetic Signaturementioning
confidence: 98%
See 1 more Smart Citation
“…This can be especially important for authentication on small mobile devices. Besides, the magnetic interaction does not suffer from illumination and occlusion problems faced by the computer vision based authentication methods such as iris, face recognition [1][2]. In addition, since the proposed approach relies on the magnetic field which can pass through obstructing materials, the interaction can be performed even if the device is not in the line of sight.…”
Section: D Magnetic Signaturementioning
confidence: 98%
“…face, iris, and fingerprint) [1][2][3] are recently adopted for mobile devices that can not be shared or copied since they rely on unique physical characteristics of the users. However, such authentication mechanisms can be computationally expensive, suffer from illumination and occlusion problems, and require changes in physical and hardware design of mobile devices.…”
Section: Introductionmentioning
confidence: 99%
“…personal appliances such as cell phones, PDAs, smart card, portable storage devices), or perform safety-critical functions (e.g. automotive and aviation electronics, medical appliances) (Aaraj et al, 2006).…”
Section: Hardware Platforms For Embedded Systemsmentioning
confidence: 99%
“…While password based mechanisms are the most used [1], they are insufficient. Therefore some researchers have proposed other techniques that rely on hardware or software enhancements for efficient authentication based on fingerprint [2], face recognition [3], and iris data [8]. Moon et al [7] implemented a Gaussian mixture model based speaker verification module on a mobile system.…”
Section: Related Workmentioning
confidence: 99%
“…Currently, the most widely used authentication method is explicit authentication, i.e., authentication is performed once at start-up by asking for a password [1], a fingerprint [2], a face profile [3], or a combination. However, all these approaches are intermittent and therefore susceptible to attack, e.g., an unauthorized user can access a portable computer either by stealing a password or exploiting an open account of an authorized user.…”
Section: Introductionmentioning
confidence: 99%