Unconstrained Face Recognition Using Cell Phone Devices: Faces in the Wild
The ever growing field of face recognition is constantly expanding to tackle new and more challenging, problems as the advances in algorithms yield higher accuracy results. The most recent advances have opened up the possibility of conducting high accurac
- PDF / 9,684,404 Bytes
- 269 Pages / 439.42 x 683.15 pts Page_size
- 97 Downloads / 151 Views
Thirimachos Bourlai Panagiotis Karampelas Vishal M. Patel Editors
Securing Social Identity in Mobile Platforms Technologies for Security, Privacy and Identity Management
Advanced Sciences and Technologies for Security Applications Series Editor Anthony J. Masys, Associate Professor, Director of Global Disaster Management, Humanitarian Assistance and Homeland Security, University of South Florida, Tampa, USA Advisory Editors Gisela Bichler, California State University, San Bernardino, CA, USA Thirimachos Bourlai, Lane Department of Computer Science and Electrical Engineering, Multispectral Imagery Lab (MILab), West Virginia University, Morgantown, WV, USA Chris Johnson, University of Glasgow, Glasgow, UK Panagiotis Karampelas, Hellenic Air Force Academy, Attica, Greece Christian Leuprecht, Royal Military College of Canada, Kingston, ON, Canada Edward C. Morse, University of California, Berkeley, CA, USA David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental Studies, Tsukuba, Ibaraki, Japan
Indexed by SCOPUS The series Advanced Sciences and Technologies for Security Applications comprises interdisciplinary research covering the theory, foundations and domainspecific topics pertaining to security. Publications within the series are peerreviewed monographs and edited works in the areas of: – biological and chemical threat recognition and detection (e.g., biosensors, aerosols, forensics) – crisis and disaster management – terrorism – cyber security and secure information systems (e.g., encryption, optical and photonic systems) – traditional and non-traditional security – energy, food and resource security – economic security and securitization (including associated infrastructures) – transnational crime – human security and health security – social, political and psychological aspects of security – recognition and identification (e.g., optical imaging, biometrics, authentication and verification) – smart surveillance systems – applications of theoretical frameworks and methodologies (e.g., grounded theory, complexity, network sciences, modelling and simulation) Together, the high-quality contributions to this series provide a cross-disciplinary overview of forefront research endeavours aiming to make the world a safer place. The editors encourage prospective authors to correspond with them in advance of submitting a manuscript. Submission of manuscripts should be made to the Editorin-Chief or one of the Editors.
More information about this series at http://www.springer.com/series/5540
Thirimachos Bourlai • Panagiotis Karampelas Vishal M. Patel Editors
Securing Social Identity in Mobile Platforms Technologies for Security, Privacy and Identity Management
Editors Thirimachos Bourlai Lane Department of Computer Science and Electrical Engineering Multispectral Imagery Lab (MILab) West Virginia University Morgantown, WV, USA
Panagiotis Karampelas Department of Informatics and Computers Hellenic Air Force Academy Acharnes Attica, Greece
Vishal M. Patel D
Data Loading...