Renata Rybárová, Juraj Kačur, Ondrej Lábaj, Gregor Rozinaj
User identification, authorization and authentication assure that the system is only used by certain users and only commands which are properly authorized are performed. The speaker identification tends to provide basic identification of the possible users located in the system installation area. This would be suitable for identification tasks, such as loading personal profile. The face detection approach aims to provide more reliable user identification based on users’ faces which contain far more characteristics that can be parameterized in comparison to the voice identification approach. Additionally, the 3D face recognition further extends the possibilities of feature extraction in order to more precisely identify particular persons and can be thus used for the highest level authentication (and authorization) for the most demanding applications (e.g. bank account login, etc.).
Creative Commons BY-SA 4.0
created with support of
This project has been funded with support from the European Commission. This publication [communication] reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.