Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303)
DOI: 10.1109/ccst.1999.797956
|View full text |Cite
|
Sign up to set email alerts
|

On the use of outer ear images for personal identification in security applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
73
0
1

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 130 publications
(74 citation statements)
references
References 7 publications
0
73
0
1
Order By: Relevance
“…Therefore we do not overrule that our methods are able to identify humans better than any other biometrics. However, our algorithms tested for real-life medium-security access control system for limited number of users are satisfactory and comparable to 2D ear image recognition results close to 100% reported by other groups [12,14,15].…”
Section: Discussionmentioning
confidence: 74%
See 1 more Smart Citation
“…Therefore we do not overrule that our methods are able to identify humans better than any other biometrics. However, our algorithms tested for real-life medium-security access control system for limited number of users are satisfactory and comparable to 2D ear image recognition results close to 100% reported by other groups [12,14,15].…”
Section: Discussionmentioning
confidence: 74%
“…Their method, however, was not fully automated, since the reference points had to be manually inserted into images. Another approach to ear image feature extraction was presented by Moreno et al [15]. Their work was based on macrofeatures extracted by compression networks.…”
Section: Related Workmentioning
confidence: 99%
“…For ear recognition, they have proposed graph matching algorithm which was suitable only for passive identification. Moreno also proposed a new method for ear recognition based on outer ear contour's feature points and information that can be obtained from shape and wrinkles present in the ear [8]. In [1], Hurley proposed an approach based on force field transform in which the ear image is considered as an array of Gaussian attractors that act as a source of force field.…”
Section: Introductionmentioning
confidence: 99%
“…Yuizono et al [22] treated the problem as an optimization task, and proposed a specially-developed genetic local search. Moreno et al [16] used different combinations of several neural classifiers. Principal Components Analysis (PCA) approaches have also been applied in a number of studies [3], [20], [13].…”
Section: Introductionmentioning
confidence: 99%