Professional Documents
Culture Documents
I.
INTRODUCTION
978-1-908320-22/3/$25.002013 IEEE
A. Use Scenarios
In our participatory surveillance scheme [1], we identified
two possible scenarios in which the identity of a person can be
verified using a smartphone. Both scenarios assume that a
person has been enrolled into a system in which a picture of the
facial image is taken and stored both in a smartcard (used as
identity token), and in a remote database (employee database).
162
IV.
CONCLUSIONS
[2]
[3]
[4]
[5]
[6]
[7]
B. Matching Faces
Biometric match between the facial image stored on the
smartcard and a picture of the person taken for identity
verification is done on the smartcard. To preserve privacy,
images are stored in the internal memory of the phone only for
the time necessary for the matching operations.
We used embedded VeryLook SDK to implement face
recognition.
Figure 1: (a) Local matching scenario, (b) mobile identity verification
application architecture
978-1-908320-22/3/$25.002013 IEEE
163