A Face Recognition System for Mobile Phones

  • Paolo Abeni
  • Madalina Baltatu
  • Rosalia D’Alessandro


The present paper proposes a biometrics-based authentication system for mobile devices running the Symbian Operating System. Mobile devices are becoming more and more similar to personal computers, hence they are also becoming repositories for sensitive information. In this context a more powerful authentication mechanism than simple passwords becomes essential. The paper describes a face recognition approach for mobile devices, discusses some important issues related to the practical implementation of the authentication scheme, and gives some preliminary results outlining the performances and the limits of proposed recognition system.


Mobile Phone Mobile Device Face Recognition Authentication Scheme Face Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [PaBoJa]
    Pankanti, S., Bolle, R. M., Jam, A. K.: Biometrics: The Future of Identification. In: IEEE Computer, Vol. 21, No. 2, 2000.Google Scholar
  2. [TMCnet]
    TMCnet News: Oki Electric Releasess Image Processing Middleware that Supports Face Recognition for Use in Mobile Phones,, October 2005.
  3. [SKPHF]
    Saastamoinen, J., Karpov, W., Hautamäki, V, Fränti, P.: Accuracy of MFCC based speaker recognition in series 60 devices. In: EURASIP Journal on Applied Signal Processing, Issue 17, 2005, p. 2816-2827.Google Scholar
  4. [AuthenT]
    AuthenTec: The TruePrint® Technology for PDAs and mobile phones, http://www.authentec.comltechnology.cfm.
  5. [BiGoTi]
    Bicego, M., Grosso, E., Tistarelli, M.: Face authentication using One-Class Support Vector Machines, In: International Workshop on Biometric Recognition Systems, 2005.Google Scholar
  6. [DMJTax]
    Tax, D. M. J.: One-class classffication: Concept learning in the absence of counter examples, Ph.D. Thesis, University of Delft, 2001.Google Scholar
  7. [SPSTS]
    Scholkopf, B., Platt, J. C., Shawe-Taylor, J., Smola, A. J.: Estimating the Support of a high Dimensional Distribution. In: Neural Computation, MIT, No. 13, 2001, p. 1443.Google Scholar
  8. [JonVio]
    Jones M., Viola, P.: Rapid Object Detection using a Boosted Cascade of Simple Features. In: IEEE Conference on Computer Vision and Pattern Recognition, Vol. 1, 2001 pp. 511.Google Scholar
  9. [JiSatSa]
    Jin, L., Satoh, S., Sakauchi, M.: A Novel Adaptive Image Enhancement Algorithm for Face Detection. In: 17th International Conference on Pattern Recognition, 2004.Google Scholar
  10. [TanYes]
    Tankus, A., Yeshurun, Y.: Convexity-Based Visual Camouflage Breaking, In: Computer Vision and Image Understanding, Vol. 84, No.3, 2001, p. 234–778.Google Scholar
  11. [Digia]
    Digia Inc.: Programning for the Series60 Platforms and Symbian OS, Editor: John Wiley&Sons, Chichester, UK, 2003.Google Scholar
  12. [OpCV]
    OpenCV, The Open Computer Vision Library, /opencvlibrary/.
  13. [LSVM]
    LIBSVM, A Library for Support Vector Machines, /-cjlinllibsvml.
  14. [Portio]
    Portio Research, Mobile Factbook 2006,

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • Paolo Abeni
    • 1
  • Madalina Baltatu
    • 1
  • Rosalia D’Alessandro
    • 1
  1. 1.Security InnovationTelecom ItaliaTurinItaly

Personalised recommendations