Learn More
Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources until the initial user logs out. This situation is encountered when the logged in user takes a short break without(More)
We present a novel approach for estimating lighting sources from a single image of a scene that is illuminated by near point light sources, directional light sources and ambient light. We propose to employ a pair of reference spheres as light probes and introduce the difference sphere that we acquire by differencing the intensities of two image regions of(More)
One of the major challenges encountered by face recognition lies in the difficulty of handling arbitrary poses variations. While different approaches have been developed for face recognition across pose variations, many methods either require manual landmark annotations or assume the face poses to be known. These constraints prevent many face recognition(More)
  • S. Pravinth Raja, K. Umamaheswari, +35 authors Anil K. Jain
  • 2017
In the past few years, Continuous Authentication system is most widely used verification system for personal computers. Continuous Authentication (CA) system verifies the user continuously once a person is logged in. Continuous Authentication system prevents the intruders from invoking the system. It passively verifies the system without interrupting the(More)
  • 1