Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 17 Oct 2024Bibliometrics
Skip Table Of Content Section
opinion
Guest Editorial Special Issue on Facial Biometrics in the Wild

Facial biometrics is a multidisciplinary field based on the methods and technologies of image analysis and machine learning, as applied to identifying people from facial information, and has progressed for over three decades in terms of theory, ...

research-article
Active Orientation Models for Face Alignment In-the-Wild

We present Active Orientation Models (AOMs), generative models of facial shape and appearance, which extend the well-known paradigm of Active Appearance Models (AAMs) for the case of generic face alignment under unconstrained conditions. Robustness ...

research-article
Dynamic Image-to-Class Warping for Occluded Face Recognition

Face recognition (FR) systems in real-world applications need to deal with a wide range of interferences, such as occlusions and disguises in face images. Compared with other forms of interferences such as nonuniform illumination and pose changes, face ...

research-article
Learning Robust Face Representation With Classwise Block-Diagonal Structure

Face recognition has been widely studied due to its importance in various applications. However, the case that both training images and testing images are corrupted is not well solved. To address such a problem, this paper proposes a semisupervised ...

research-article
On the Use of Discriminative Cohort Score Normalization for Unconstrained Face Recognition

Facial imaging has been largely addressed for automatic personal identification, in a variety of different environments. However, automatic face recognition becomes very challenging whenever the acquisition conditions are unconstrained. In this paper, a ...

research-article
Ambiguously Labeled Learning Using Dictionaries

We propose a dictionary-based learning method for ambiguously labeled multiclass classification, where each training sample has multiple labels and only one of them is the correct label. The dictionary learning problem is solved using an iterative ...

research-article
Learning Person-Specific Representations From Faces in the Wild

Humans are natural face recognition experts, far out-performing current automated face recognition algorithms, especially in naturalistic, “in the wild” settings. However, a striking feature of human face recognition is that we are dramatically better ...

research-article
Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features

This paper addresses face verification in unconstrained settings. For this purpose, first, a nonlinear binary class-specific kernel discriminant analysis classifier (CS-KDA) based on spectral regression kernel discriminant analysis is proposed. By ...

research-article
RGB-D-Based Face Reconstruction and Recognition

Most RGB-D-based research focuses on scene reconstruction, gesture analysis, and simultaneous localization and mapping, but only a few study its impacts on face recognition. A common yet challenging scenario considered in face recognition takes a single ...

research-article
Face Detection on Distorted Images Augmented by Perceptual Quality-Aware Features

Motivated by the proliferation of low-cost digital cameras in mobile devices being deployed in automated surveillance networks, we study the interaction between perceptual image quality and a classic computer vision task of face detection. We quantify ...

research-article
Reference Face Graph for Face Recognition

Face recognition has been studied extensively; however, real-world face recognition still remains a challenging task. The demand for unconstrained practical face recognition is rising with the explosion of online multimedia such as social networks, and ...

research-article
Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection

As face recognition applications progress from constrained sensing and cooperative subjects scenarios (e.g., driver’s license and passport photos) to unconstrained scenarios with uncooperative subjects (e.g., video surveillance), new challenges are ...

research-article
A 3D-Based Pose Invariant Face Recognition at a Distance Framework

Face recognition in the wild can be defined as recognizing individuals unabated by pose, illumination, expression, and uncertainties from the image acquisition. In this paper, we propose a framework recognizing human faces under such uncertainties by ...

research-article
Age and Gender Estimation of Unfiltered Faces

This paper concerns the estimation of facial attributes—namely, age and gender—from images of faces acquired in challenging, in the wild conditions. This problem has received far less attention than the related problem of face recognition, and in ...

research-article
Investigating the Periocular-Based Face Recognition Across Gender Transformation

This paper introduces a novel face recognition problem domain: the medically altered face for gender transformation. A data set of >1.2 million face images was constructed from wild videos obtained from You Tube of 38 subjects undergoing hormone ...

research-article
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints

Wireless bodyworn sensing devices are fast becoming popular for fitness, sports training, and personalized healthcare applications. Securing data generated by these devices is essential if they are to be integrated into the current health infrastructure ...

research-article
TM-Score: A Misuseability Weight Measure for Textual Content

In recent years, data leakage prevention solutions became an inherent component of the organizations' security suite. These solutions focus mainly on the data and its sensitivity level, and on preventing it from reaching an unauthorized entity. They ...

research-article
A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan Detection

The globalization of integrated circuits (ICs) design and fabrication has given rise to severe concerns on the devastating impact of subverted chip supply. Hardware Trojan (HT) is among the most dangerous threats to defend. The dormant circuit inserted ...

research-article
Kernelized Neighborhood Preserving Hashing for Social-Network-Oriented Digital Fingerprints

Digital fingerprinting is a promising approach to protect multimedia content from unauthorized redistribution. However, the existing fingerprints are unsuitable for social network tasks, because they fail to represent the social network structure, which ...

research-article
The FaceSketchID System: Matching Facial Composites to Mugshots

Facial composites are widely used by law enforcement agencies to assist in the identification and apprehension of suspects involved in criminal activities. These composites, generated from witness descriptions, are posted in public places and media with ...

research-article
Biometrics Evaluation Under Spoofing Attacks

While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, ...

research-article
Analysis of Seam-Carving-Based Anonymization of Images Against PRNU Noise Pattern-Based Source Attribution

The availability of sophisticated source attribution techniques raises new concerns about privacy and anonymity of photographers, activists, and human right defenders who need to stay anonymous while spreading their images and videos. Recently, the use ...

research-article
Earprint: Transient Evoked Otoacoustic Emission for Biometrics

Biometrics is attracting increasing attention in privacy and security concerned issues, such as access control and remote financial transaction. However, advanced forgery and spoofing techniques are threatening the reliability of conventional biometric ...

research-article
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation

Remote authentication has been widely studied and adapted in distributed systems. The security of remote authentication mechanisms mostly relies on one of or the combination of three factors: 1) something users know—password; 2) something users have—...

research-article
Edit Detection in Speech Recordings via Instantaneous Electric Network Frequency Variations

In this paper, an edit detection method for forensic audio analysis is proposed. It develops and improves a previous method through changes in the signal processing chain and a novel detection criterion. As with the original method, electrical network ...

research-article
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol

Existing anonymous remote authentication protocols to secure wireless body area networks (WBANs) raise challenges such as eliminating the need for distributing clients’ account information to the application providers and achieving forward security. ...

research-article
Resilience Analysis of Power Grids Under the Sequential Attack

The modern society increasingly relies on electrical service, which also brings risks of catastrophic consequences, e.g., large-scale blackouts. In the current literature, researchers reveal the vulnerability of power grids under the assumption that ...

Comments