In Chapter 1, I examine the errors and use of biometrics as an identifier by reviewing the state of independent testing of common biometric modalities and performing a gap analysis. This gap analysis is then discussed with regard to the requirements of typical applications (personal security, forensic/surveillance applications, watchlists, and large-scale ID systems).A different selection of faces typically reveals different clustering choices over the same face set. ... is minimal, and k-Same-EigenQ can have worse recognition results because of its additional loss of facial details. k-Same-PixelQ and k-Same -EigenQ do not always make optimal ... This work used MatLab to run experiments, with aquot;calcpca.maquot; version 2.4 written by Iain Matthews and edited by Ralph Gross.
|Title||:||Biometrics and Surveillance: Identification, De-identification, and Strategies for Protection of Personal Data|
|Publisher||:||ProQuest - 2009|