The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic object recognition in digital satellite images is not a simple task due to several variations present in the capture process and object appearance and pose, consequently, different general purpose techniques have been proposed. In this paper, an approach with LBP boosted cascade classifier for automatic runway detection in high resolution satellite imagery is analyzed. Promising results...
Face recognition in video is becoming increasingly important due to the abundance of video data captured by surveillance cameras, mobile devices, Internet uploads, and other sources. Given the aggregate of facial information contained in a video (i.e., a sequence of face images or frames), video-based face recognition solutions can potentially alleviate classic challenges caused by variations in pose,...
The widespread use of digital video surveillance systems has also increased the concerns for violation of privacy rights. Since video surveillance systems are invasive, it is a challenge to find an acceptable balance between privacy of the public under surveillance and the functionalities of the systems. Tools for protection of visual privacy available today lack either all or some of the important...
The non-negative matrix factorization (NMF) is a part-Based image representation method which allows only additive combinations of non-negative basis components. NMF has been widely used as a dimensionality reduction technique to solve problems in computer vision and pattern recognition fields. The sparse representation and spatial information of image are also important, however, existing NMF methods...
In this paper, multi-scale bandlet and local binary pattern (LBP) based method for gender recognition from faces is proposed. Bandlet is one of the multi-resolution techniques that can adapt the orientation of the edges of the face images, and thereby can better capture the texture of a face image. After extracting bandlet coefficients from face images at different scales, LBP is applied to create...
The widespread use of digital video surveillance systems has also increased the concerns for violation of privacy rights. Since video surveillance systems are invasive, it is a challenge to find an acceptable balance between privacy of the public under surveillance and the functionalities of the systems. Tools for protection of visual privacy available today lack either all or some of the important...
Face recognition has attracted considerable concerns in recent years. In practical applications, there are generally a small amount of labeled face images and a lot of unlabeled ones can be available. In this paper, we introduce a semi-supervised face recognition method where semi-supervised LDA (SDA) and Affinity Propagation (AP) are integrated into Self-training. SDA is employed to update the face...
This paper presents a novel approach for improving the accuracy of existing 3D face recognition algorithms via the dimensionality reduction of the feature space. In particular, two feature selection methods based on information criteria are selected and benchmarked herein (i.e. the minimum Redundancy — Maximum Relevance (mRMR) and the Conditional Mutual Information with Nearest Neighbors estimate...
The paper presents some experiments investigating the applicability of the Principal Component Analysis method for solving several concept learning tasks defined on images of faces. The results have shown that, in most cases, the applied transformation improves the classification accuracy of used concept learning algorithms. In addition the experiments have confirmed a possible relation between the...
Facial sketches are widely used by law enforcement agencies to assist in the identification and apprehension of suspects involved in criminal activities. Sketches used in forensic investigations are either drawn by forensic artists (forensic sketches) or created with computer software (composite sketches) following the verbal description provided by an eyewitness or the victim. These sketches are...
The idea of category specific face recognition is first to categorize facial images into categories based on visual cues like gender and race and then to perform face recognition using features specific to a category. One main problem in this approach is to find category specific features. We addressed category specific face recognition based on gender and explored which feature descriptor is more...
This paper presents a new face gender recognition scheme by enjoying the benefit from the dot diffusion among weak classifiers in recognition phase for a low resolution and non-aligned thumbnail image. The main problem of the former Adaboost approaches is that each weak classifier simply offers a binary decision, which fails to compensate the decision error by diffusing it to the rest weak classifiers...
The periocular region has recently emerged as a promising trait for unconstrained biometric recognition, specially on cases where neither the iris and a full facial picture can be obtained. Previous studies concluded that the regions in the vicinity of the human eye - the periocular region- have surprisingly high discriminating ability between individuals, are relatively permanent and easily acquired...
In this paper, we propose to construct a deep architecture, AU-aware Deep Networks (AUDN), for facial expression recognition by elaborately utilizing the prior knowledge that the appearance variations caused by expression can be decomposed into a batch of local facial Action Units (AUs). The proposed AUDN is composed of three sequential modules: the first module consists of two layers, i.e., a convolution...
In this paper, we propose a new multiview discriminative learning (MDL) method for age-invariant face recognition, which is a challenging and important problem in many practical face recognition systems. Motivated by the fact that local appearance features are more robust to age variations, we first extract three different local feature descriptors including scale invariant feature transform (SIFT),...
In this paper, a 3D surface representation defined around several reference points taken on the surface is introduced. Such representation is obtained from the superposition of a set of indexed levels of geodesic curves and radial lines. A sampling criterion through a generalized version of the Shannon theorem allows the determination of the minimum resolution of both curves that describes faithfully...
Identical twins pose a great challenge to face recognition due to high similarities in their appearances. Motivated by the psychological findings that facial motion contains identity signatures and the observation that twins may look alike but behave differently, we develop a talking profile to use the identity signatures in the facial motion to distinguish between identical twins. The talking profile...
Objects were better recognized in consistent scenes (where objects appeared frequently) than inconsistent scenes (where objects appeared rarely). This consistency effect also was found in the facial expressional recognition in scenes. However, the underlying mechanisms of expressional recognition in scenes were not clear. In the present study, we addressed the question of whether emotional scenes...
In real-life scenarios where pose variation is up to side-view positions, face recognition becomes a challenging task. In this paper we propose an automatic side-view face recognition system designed for home-safety applications. Our goal is to recognize people as they pass through doors in order to determine their location in the house. Here, we introduce a recognition method, where we detect facial...
Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biometric traits, face is the one that is exposed to the most serious threat, since it is exceptionally easy to access. The limited work on fraud detection capabilities for face mainly shapes around 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices. A significant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.