[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2679599guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
CVPRW '14: Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops
2014 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
June 23 - 28, 2014
ISBN:
978-1-4799-4308-1
Published:
23 June 2014

Reflects downloads up to 11 Dec 2024Bibliometrics
Abstract

No abstract available.

Article
Article
Article
Article
Article
Hallucinating the Full Face from the Periocular Region via Dimensionally Weighted K-SVD

Identifying a suspect wearing a mask (where only the suspect's periocular region is visible) is one of the toughest real-world challenges in biometrics that exist. In this paper, we present a practical method to hallucinate the full frontal face given ...

Article
Improving 3D Face Details Based on Normal Map of Hetero-source Images

For each person, there exist large unstructured photo collections in personal photo albums. We call these photos Hetero-source images, which imply abundant shape and texture information of the specific face. In this paper, we propose a novel 3D face ...

Article
Globality-Locality Preserving Projections for Biometric Data Dimensionality Reduction

In a biometric recognition task, the manifold of data is the result of the interactions between the sub-manifold of dynamic factors of subjects and the sub-manifold of static factors of subjects. Therefore, instead of directly constructing the graph ...

Article
Robust Low-Rank Regularized Regression for Face Recognition with Occlusion

Recently, regression analysis based classification methods are popular for robust face recognition. These methods use a pixel-based error model, which assumes that errors of pixels are independent. This assumption does not hold in the case of contiguous ...

Article
Natural vs Artificial Face Classification Using Uniform Local Directional Patterns and Wavelet Uniform Local Directional Patterns

Face classification is a technique used in Biometrics to help distinguish between facial images. However, this technique has been applicable on human face images only. Online virtual worlds such as Second Life, Sims Online, etc. are gaining popularity ...

Article
Landmark Based Facial Component Reconstruction for Recognition across Pose

Different from previous 3D face modeling approaches that consider the whole facial area, the proposed method reconstructs 3D facial components for handling cross-pose recognition. It has two phases, component reconstruction and component-based ...

Article
Effect of Pupil Dilation and Constriction on the Distribution of Bit Errors within the Iris

Texture information in the iris image is not uniform in discriminatory information content for biometric identity verification. The bits in an iris code obtained from the image differ in their consistency from one sample to another for the same ...

Article
Optimization of Iris Codes for Improved Recognition

The texture of the iris is commonly represented as an iris code in iris recognition systems. While several approaches have been presented for generating iris codes, relatively few comparison techniques have been proposed. In this paper, we take ...

Article
Reliable Posterior Probability Estimation for Streaming Face Recognition

Increasing access to large, non-stationary face datasets and corresponding demands to process, analyze and learn from this data. This has lead to a new class of online/ incremental face recognition problems. While it is advantageous to build large scale ...

Article
Learning Minutiae Neighborhoods: A New Binary Representation for Matching Fingerprints

Representation of fingerprints is one of the key factors that limits the accuracy and efficiency of matching algorithms. Most popular methods represent each fingerprint as an unordered set of minutiae with variable cardinality and the matching ...

Article
Performance Improvement of Phase-Based Correspondence Matching for Palmprint Recognition

The use of phase-based correspondence matching for biometric recognition makes it possible to find corresponding point pairs between images having nonlinear deformation. On the other hand, the optimal recognition performance cannot be exhibited due to ...

Article
A Robust Approach for Singular Point Extraction Based on Complex Polynomial Model

This paper focuses on a general framework for singular point extraction from vector field. We design a new index of singular point based on complex polynomial model. We test our method in the publicly available benchmark dataset of the singular point ...

Article
Secure Fingerprint Matching with Generic Local Structures

In this work we evaluate the performance of generic local structures as template points for secure fingerprint matching. We present a generic template structure called an n-gon that derives from a set of n neighboring minutiae points. We secure ...

Article
The Value of Multiple Viewpoints in Gesture-Based User Authentication

Although traditionally used as a gesture recognition device, the Kinect has been recently leveraged for user entry control. In this context, a user admission decision is typically based on biometrics such as face, speech, gait and gestures. Despite ...

Article
Context-Aware Active Authentication Using Smartphone Accelerometer Measurements

While body movement patterns recorded by a smartphone accelerometer are now well understood to be discriminative enough to separate users, little work has been done to address the question of if or how the position in which the phone is held affects ...

Article
Can We Use Second Minor Finger Knuckle Patterns to Identify Humans?

Human hand possesses some of the most distinctive anatomical features which have been extensively used for the biometrics identification. However there are several hand features which results from complex interaction among bones, muscles, skin and ...

Article
Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions

Among tangible threats and vulnerabilities facing current biometric systems are spoofing attacks. A spoofing attack occurs when a person tries to masquerade as someone else by falsifying data and thereby gaining illegitimate access and advantages. ...

Article
Fast Target Recognition on Mobile Devices: Revisiting Gaussian Elimination for the Estimation of Planar Homographies

This work analyzes the problem of homography estimation for robust target matching in the context of real-time mobile vision. We present a device-friendly implementation of the Gaussian Elimination algorithm and show that our optimized approach can ...

Article
Cascade of Box (CABOX) Filters for Optimal Scale Space Approximation

Local image features, such as blobs and corners, have proven to be very useful for several computer vision applications. However, for enabling applications such as visual search and augmented reality with near-realtime latency, blob detection can be ...

Article
Real-Time Mobile Facial Expression Recognition System -- A Case Study

This paper presents a mobile application for real time facial expression recognition running on a smart phone with a camera. The proposed system uses a set of Support Vector Machines (SVMs) for classifying 6 basic emotions and neutral expression along ...

Article
Dense View Interpolation on Mobile Devices Using Focal Stacks

Light field rendering is a widely used technique to generate novel views of a scene from novel viewpoints. Interpolative methods for light field rendering require a dense description of the scene in the form of closely spaced images. In this work, we ...

Article
Dynamic Image Stacks

Traditionally, photography has been driven by a relatively fixed paradigm: capture, develop, and print. Even with the advent of digital photography, the photographic process still continues to focus on creating a single, final still image suitable for ...

Article
Robust Three-View Triangulation Done Fast

Estimating the position of a 3-dimensional world point given its 2-dimensional projections in a set of images is a key component in numerous computer vision systems. There are several methods dealing with this problem, ranging from sub-optimal, linear ...

Article
3D Hallway Modeling Using a Single Image

Real-time, low-resource corridor reconstruction using a single consumer grade RGB camera is a powerful tool for allowing a fast, inexpensive solution to indoor mobility of a visually impaired person or a robot. The perspective and known geometry of a ...

Article
Estimating Gaze Direction of Vehicle Drivers Using a Smartphone Camera

Many automated driver monitoring technologies have been proposed to enhance vehicle and road safety. Most existing solutions involve the use of specialized embedded hardware, primarily in high-end automobiles. This paper explores driver assistance ...

Index Terms

  1. Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops
    Index terms have been assigned to the content through auto-classification.
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations