The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Shape analysis is an active and important branch in computer vision research field. In recent years, many geometrical, topological, and statistical features have been proposed and widely used for shape-related applications. In this paper, based on the properties of Distance Transform, we present a new shape feature, weight of boundary point. By computing the shortest distances between boundary points...
We present a system to retrieve all clips from a meeting archive that show a particular individual speaking, using a single face or voice sample as the query. The system incorporates three novel ideas. One, rather than match the query to each individual sample in the archive, samples within a meeting are grouped first, generating a cluster of samples per individual. The query is then matched to the...
In surveillance situations, computer vision systems are often deployed to help humans perform their tasks more effectively. In a typical installation human observers are required to simultaneously monitor a number of video signals. Psychophysical research indicates that there are severe limitations in the ability of humans to monitor simultaneous signals. Do these same limitations extend to surveillance?...
In this paper, we propose a new edge-based text verification approach for video. Based on the investigation of the relation between candidate blocks and their neighbor areas, the proposed approach first detects background edges in candidate blocks, then erases them by an edge tracking technique, and finally the candidate blocks containing too few remaining edges are eliminated as false alarms. Three...
Regeneration of biometric templates from match scores has security and privacy implications related to any biometric based authentication system. In this paper, we propose a novel non-iterative scheme to reconstruct face templates from match scores. We use an affine transformation of the images to approximate the behavior of the given face recognition system based on an independent set of face templates...
Segmenting different individuals in a group meeting and their speech is an important first step for various tasks such as meeting transcription, automatic camera panning, multimedia retrieval and monologue detection. In this effort, given a meeting room video, we attempt to segment individual person's speech and localize them in the video, based on data from a single audio and video source. The segmentation...
We investigate methods to infer the best afine transformation based face recognition algorithm; which operates by projecting given images to a low-dimensional space, followed by distance computations. This category includes the following well known methods for recognition: the Principal Component Analysis (PCA), Linear Discriminant Analysis(LDA), and Independent Component Analysis (ICA). The desired...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.