Skip to Content
Biometric Authentication: A Machine Learning Approach
book

Biometric Authentication: A Machine Learning Approach

by S. Y. Kung, M. W. Mak, S. H. Lin
September 2004
Intermediate to advanced
496 pages
13h 57m
English
Pearson
Content preview from Biometric Authentication: A Machine Learning Approach

7.6. Biometric Authentication Application Examples

In Lin et al. [211], the DBNN was applied to all three modules of face recognition systems: (1) face detector, (2) eye localizer, and (3) face recognizer. The face detector finds the location of a human face in an image, then the eye localizer determines the positions of both eyes in order to generate meaningful feature vectors. The facial region proposed contains eyebrows, eyes (eyeglasses allowed), and nose. The face recognition system was successfully applied to two public databases (FERET and ORL) and one in-house (SCR) database. Chapter 8 further describes how to apply the probabilistic DBNN to various face detection and recognition applications. In addition to automated face recognition, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Touchless Fingerprint Biometrics

Touchless Fingerprint Biometrics

Ruggero Donida Labati, Vincenzo Piuri, Fabio Scotti
Signal and Image Processing for Biometrics

Signal and Image Processing for Biometrics

Amine Naït-Ali, Régis Fournier
Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice

Abhijit Das, C. E. Veni Madhavan

Publisher Resources

ISBN: 0131478249Purchase book