2011
DOI: 10.1002/cpe.1797
|View full text |Cite
|
Sign up to set email alerts
|

Mobile device access control: an improved correlation based face authentication scheme and its Java ME application

Abstract: SUMMARY This paper investigates face authentication based access control solutions for camera‐equipped mobile devices. A new hierarchical correlation based face authentication (HCFA) scheme is proposed, which suits resource‐constrained mobile devices such as mobile phones and personal digital assistants. The idea of HCFA is conducting a partial correlation output peak analysis (analyze the relationship between each cross‐correlation output peak generated from selected sub‐regions of a face), in conjunction wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
14
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 24 publications
0
14
0
Order By: Relevance
“…Indeed, longer human-generated passwords (answers to a series of questions, pass-phrases) can achieve higher level of security, but it is hard for people to memorize longer passwords precisely [14]. Although biometrics security is promising in addressing this issue [15] [16] [17] [18] [19] [20][21] [22][23] [24] [26], biometric readings may vary from time to time due to noise [24]]25] [26], feature extraction errors [15] [16], rotation [24] and so forth. Consequently, it is necessary for the system to be error-tolerated.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Indeed, longer human-generated passwords (answers to a series of questions, pass-phrases) can achieve higher level of security, but it is hard for people to memorize longer passwords precisely [14]. Although biometrics security is promising in addressing this issue [15] [16] [17] [18] [19] [20][21] [22][23] [24] [26], biometric readings may vary from time to time due to noise [24]]25] [26], feature extraction errors [15] [16], rotation [24] and so forth. Consequently, it is necessary for the system to be error-tolerated.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, suppose 2 W is uniformly distributed, we can get 16 r as large as possible and ensure the security. About entropy loss and remaining entropy of fuzzy vault, please refer to Appendix D in [14].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…An unauthorized person can gain access to a wealth of information stored on these devices or access to other services via them. So the authentication of the device or its user to the net bank, government system, or other applications is needed [1] [2].…”
Section: Introductionmentioning
confidence: 99%
“…In the third paper, ‘Mobile device access control: an improved correlation based face authentication scheme and its Java ME application’ , Xi et al investigate face authentication based access control solutions for camera‐equipped mobile devices. They propose a new hierarchical correlation based face authentication scheme by analyzing the relationship between each cross‐correlation output peak generated from selected subregions of a face, in conjunction with conventional direct cross‐correlation methods.…”
mentioning
confidence: 99%