[1]REN Xiao-long,SU Guang-da,XIANG Yan.Face authentication system using the Chinese second generation identity card[J].CAAI Transactions on Intelligent Systems,2009,4(3):213-217.
Copy

Face authentication system using the Chinese second generation identity card

References:
[1]CLARKE R. Human identification in information systems: management challenges and public policy issues[J]. Information Technology & People, 1994, 7(4): 637.
[2]DAVIES S G. Touching big brother: how biometric technology will fuse flesh and machine[J]. Information Technology & People, 1994, 7(4): 6069.
 [3]NEWHAM E. The biometric report[R]. New York: SJB Services, 1995.
[4]JAIN A K, BOLLE R, PANKANTI S. Biometrics: personal identification in networked society[M]. Norwell, USA: Kluwer Academic Publishers, 1999.
[5]PHILLIPS P J, GROTHER P, MICHEALS R J, et al. FRVT 2002: Evaluation Report[EB/OL]. (20030315)[20080816]. http://www.frvt.org/FRVT2002/documents.htm
[6]SU Guangda, ZHANG Cuiping, DING Rong, et al. MMPPCA face recognition method[J]. Electronics Letters, 2002, 38(25): 16541656
[7]DU Cheng, SU Guangda. Eyeglasses removal from facial images[J]. Pattern Recognition Letters, 2005, 26(14): 22152220.
[8]章柏幸, 苏光大. 人脸成像特性研究及人脸归一化的目标[J]. 光电子?激光, 2003, 14(4): 406410.
ZHANG Baixing, SU Guangda. Research on characteristic of facial imaging and goals of facial image normalization[J]. Journal of Optoelectronics ? Laser, 2003, 14(4): 406410.
[9]PHILLIPS P J, SCRUGGS W T, O’TOOLE A J, et al. FRVT 2006 and ICE 2006 LargeScale Results[EB/OL]. (20070310)[20080816]. http://www.frvt.org/FRVT2006/docs/FRVT2006andICE2006LargeScaleReport.pdf.
Similar References:

Memo

-

Last Update: 2009-08-31

Copyright © CAAI Transactions on Intelligent Systems