No abstract available.
Hallucinating the Full Face from the Periocular Region via Dimensionally Weighted K-SVD
Identifying a suspect wearing a mask (where only the suspect's periocular region is visible) is one of the toughest real-world challenges in biometrics that exist. In this paper, we present a practical method to hallucinate the full frontal face given ...
Improving 3D Face Details Based on Normal Map of Hetero-source Images
For each person, there exist large unstructured photo collections in personal photo albums. We call these photos Hetero-source images, which imply abundant shape and texture information of the specific face. In this paper, we propose a novel 3D face ...
Globality-Locality Preserving Projections for Biometric Data Dimensionality Reduction
In a biometric recognition task, the manifold of data is the result of the interactions between the sub-manifold of dynamic factors of subjects and the sub-manifold of static factors of subjects. Therefore, instead of directly constructing the graph ...
Robust Low-Rank Regularized Regression for Face Recognition with Occlusion
Recently, regression analysis based classification methods are popular for robust face recognition. These methods use a pixel-based error model, which assumes that errors of pixels are independent. This assumption does not hold in the case of contiguous ...
Natural vs Artificial Face Classification Using Uniform Local Directional Patterns and Wavelet Uniform Local Directional Patterns
Face classification is a technique used in Biometrics to help distinguish between facial images. However, this technique has been applicable on human face images only. Online virtual worlds such as Second Life, Sims Online, etc. are gaining popularity ...
Landmark Based Facial Component Reconstruction for Recognition across Pose
Different from previous 3D face modeling approaches that consider the whole facial area, the proposed method reconstructs 3D facial components for handling cross-pose recognition. It has two phases, component reconstruction and component-based ...
Effect of Pupil Dilation and Constriction on the Distribution of Bit Errors within the Iris
Texture information in the iris image is not uniform in discriminatory information content for biometric identity verification. The bits in an iris code obtained from the image differ in their consistency from one sample to another for the same ...
Optimization of Iris Codes for Improved Recognition
The texture of the iris is commonly represented as an iris code in iris recognition systems. While several approaches have been presented for generating iris codes, relatively few comparison techniques have been proposed. In this paper, we take ...
Reliable Posterior Probability Estimation for Streaming Face Recognition
Increasing access to large, non-stationary face datasets and corresponding demands to process, analyze and learn from this data. This has lead to a new class of online/ incremental face recognition problems. While it is advantageous to build large scale ...
Learning Minutiae Neighborhoods: A New Binary Representation for Matching Fingerprints
Representation of fingerprints is one of the key factors that limits the accuracy and efficiency of matching algorithms. Most popular methods represent each fingerprint as an unordered set of minutiae with variable cardinality and the matching ...
Performance Improvement of Phase-Based Correspondence Matching for Palmprint Recognition
The use of phase-based correspondence matching for biometric recognition makes it possible to find corresponding point pairs between images having nonlinear deformation. On the other hand, the optimal recognition performance cannot be exhibited due to ...
A Robust Approach for Singular Point Extraction Based on Complex Polynomial Model
This paper focuses on a general framework for singular point extraction from vector field. We design a new index of singular point based on complex polynomial model. We test our method in the publicly available benchmark dataset of the singular point ...
Secure Fingerprint Matching with Generic Local Structures
- Matthew Morse,
- Jesse Hartloff,
- Thomas Effland,
- Jim Schuler,
- Jennifer Cordaro,
- Sergey Tulyakov,
- Atri Rudra,
- Venu Govindaraju
In this work we evaluate the performance of generic local structures as template points for secure fingerprint matching. We present a generic template structure called an n-gon that derives from a set of n neighboring minutiae points. We secure ...
The Value of Multiple Viewpoints in Gesture-Based User Authentication
Although traditionally used as a gesture recognition device, the Kinect has been recently leveraged for user entry control. In this context, a user admission decision is typically based on biometrics such as face, speech, gait and gestures. Despite ...
Context-Aware Active Authentication Using Smartphone Accelerometer Measurements
While body movement patterns recorded by a smartphone accelerometer are now well understood to be discriminative enough to separate users, little work has been done to address the question of if or how the position in which the phone is held affects ...
Can We Use Second Minor Finger Knuckle Patterns to Identify Humans?
Human hand possesses some of the most distinctive anatomical features which have been extensively used for the biometrics identification. However there are several hand features which results from complex interaction among bones, muscles, skin and ...
Face Biometrics Under Spoofing Attacks: Vulnerabilities, Countermeasures, Open Issues, and Research Directions
Among tangible threats and vulnerabilities facing current biometric systems are spoofing attacks. A spoofing attack occurs when a person tries to masquerade as someone else by falsifying data and thereby gaining illegitimate access and advantages. ...
Fast Target Recognition on Mobile Devices: Revisiting Gaussian Elimination for the Estimation of Planar Homographies
This work analyzes the problem of homography estimation for robust target matching in the context of real-time mobile vision. We present a device-friendly implementation of the Gaussian Elimination algorithm and show that our optimized approach can ...
Cascade of Box (CABOX) Filters for Optimal Scale Space Approximation
Local image features, such as blobs and corners, have proven to be very useful for several computer vision applications. However, for enabling applications such as visual search and augmented reality with near-realtime latency, blob detection can be ...
Real-Time Mobile Facial Expression Recognition System -- A Case Study
This paper presents a mobile application for real time facial expression recognition running on a smart phone with a camera. The proposed system uses a set of Support Vector Machines (SVMs) for classifying 6 basic emotions and neutral expression along ...
Dense View Interpolation on Mobile Devices Using Focal Stacks
Light field rendering is a widely used technique to generate novel views of a scene from novel viewpoints. Interpolative methods for light field rendering require a dense description of the scene in the form of closely spaced images. In this work, we ...
Dynamic Image Stacks
Traditionally, photography has been driven by a relatively fixed paradigm: capture, develop, and print. Even with the advent of digital photography, the photographic process still continues to focus on creating a single, final still image suitable for ...
Robust Three-View Triangulation Done Fast
Estimating the position of a 3-dimensional world point given its 2-dimensional projections in a set of images is a key component in numerous computer vision systems. There are several methods dealing with this problem, ranging from sub-optimal, linear ...
3D Hallway Modeling Using a Single Image
Real-time, low-resource corridor reconstruction using a single consumer grade RGB camera is a powerful tool for allowing a fast, inexpensive solution to indoor mobility of a visually impaired person or a robot. The perspective and known geometry of a ...
Estimating Gaze Direction of Vehicle Drivers Using a Smartphone Camera
Many automated driver monitoring technologies have been proposed to enhance vehicle and road safety. Most existing solutions involve the use of specialized embedded hardware, primarily in high-end automobiles. This paper explores driver assistance ...
Index Terms
- Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops