2015
DOI: 10.1201/b19349
|View full text |Cite
|
Sign up to set email alerts
|

Face Detection and Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 0 publications
0
11
0
1
Order By: Relevance
“…(1) The database is fully replicated among servers. (2) The data is characterized as rapidly changing [3]; users oft>en query servers to remain up-todate. More specifically, they will often want to track every broadcast for their data item of interest.…”
Section: Introductionmentioning
confidence: 99%
“…(1) The database is fully replicated among servers. (2) The data is characterized as rapidly changing [3]; users oft>en query servers to remain up-todate. More specifically, they will often want to track every broadcast for their data item of interest.…”
Section: Introductionmentioning
confidence: 99%
“…(Chityala et al, 2014). The following figure shows the suitability of facial identification in comparison to other biometric methods (Datta et al, 2015). As a biometric system, a system of face recognition operates in two methods: face verification and face identification.…”
Section: Introductionmentioning
confidence: 99%
“…First of all there is a need for protecting personal sensitive information Which can be solve using face recognition systems [4]. Generally a password and user name is assigned to service consumers to be authenticated.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore some mission sensitive environments requires biometric authentication such as finger print, personal vain map, retina scan. One of the most widely used biometric authentication method is face recognition in which the photograph of an official ID card is matched with camera snapshot [4]. There are many face detection and recognition methods which can be implemented in software namely Eigenface, Fisherface, LBPHface and SURF algorithms.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation