Corpus ID: 67822585

Face recognition as an airport and seaport security tool

  title={Face recognition as an airport and seaport security tool},
  author={Jyri Rajam{\"a}ki and Tuomas Turunen and Aki Harju and Miia Heikkil{\"a} and Maarit Hilakivi and Sami Rusanen},
  journal={WSEAS Transactions on Information Science and Applications archive},
The transportation industries have been subjected to unprecedented scrutiny and regulatory mandates in the post-9/11 era. On the other hand, the inner border inspections were closed down in Europe with the Schengen agreement. Freedom of movement has brought new challenges to the authorities and transportation companies. Effective camera surveillance with a facial recognition system (FRS) could be a realistic solution. FRS requires camera(s) and a control device; a computer with special software… Expand
4 Citations
Face Recognition using Face Alignment and PCA Techniques: A Literature Survey
The face is our key of attention in social communication, playing a main role in transmission identity and sentiment. Hence, Face recognition has become an important issue in many applications suchExpand
A broad review about face recognition – feature extraction and recognition techniques
A report of several feature extraction and recognition methods which find themselves employed in the method of FR and vividly establish the technique which has performed excellently yielding superior FR precision by detecting face images more exactly. Expand
Face recognition based on opposition particle swarm optimization and support vector machine
A new face recognition method based on Opposition based PSO with SVM (OPSO-SVM) is introduced and it is shown that the optimized parameters in SVM by OPSO efficiently perform the face recognition process. Expand
A modular system for tracking players in sports games
A modular system for tracking indoor and outdoor team games using computer vision is proposed and described and it can be said that overall system framework provides robustness of detection, recognition and tracking. Expand


Facial recognition system as a maritime security tool
The facial recognition system (FRS) requires camera(s) and a control device; a computer with special software. The computer processes the material, face images, collected by the cameras. FRS has beenExpand
Dynamic Vision - From Images to Face Recognition
Many of the issues raised are relevant to object recognition in general, and such visual learning machines have numerous potential applications in areas such as visual surveillance multimedia and visually mediated interaction. Expand
Handbook of Face Recognition, 2nd Edition
This highly anticipated new edition provides a comprehensive account of face recognition research and technology, spanning the full range of topics needed for designing operational face recognition systems, as well as offering challenges and future directions. Expand
Face Recognition Algorithms Surpass Humans Matching Faces Over Changes in Illumination
Seven state-of-the-art face recognition algorithms are compared with humans on a face-matching task and three algorithms surpassed human performance matching face pairs prescreened to be "difficult" and six algorithms surpassed humans on "easy" face pairs. Expand
Face recognition in the presence of age differences using holistic and subpattern-based approaches
The performance analysis of holistic and subpattern-based methods is presented on face recognition in the presence of age progression with specific preprocessing techniques to demonstrate the performance differences and similarities between these two types of approaches. Expand
Port Security Management
HISTORY AND ORGANIZATION OF PORT AND MARITIME SECURITY Introduction to Port Security Management Global Transportation System: The Context for Port Security A Renewed Security Concern about Threats toExpand
Computational methods for modeling facial aging: A survey
A thorough analysis of various approaches that have been proposed for problems such as age estimation, appearance prediction, face verification, etc. are offered and offer insights into future research on this topic. Expand
A mobile agent security management
  • Eung-Gu You, Keum-Suk Lee
  • Computer Science
  • 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.
  • 2004
This paper proposes and evaluates an efficient security model for a mobile agent using TDGM (trusted domain and guide manager), which provides three kinds of services: the trusted domain management, the security service and the travel plan guide that provides high security and mitigates the performance degradation. Expand
A machine learning approach for posture recognition based on simplified shock graph
Initial findings have proven that SSG is apt as feature vectors for posture recognition whilst ANN and SVM were apposite to perform the classification task. Expand
The interview of Major on 19.5.2008, Finnish Border Guard
  • 2008