Guest Editorial Special Issue on Facial Biometrics in the Wild
Facial biometrics is a multidisciplinary field based on the methods and technologies of image analysis and machine learning, as applied to identifying people from facial information, and has progressed for over three decades in terms of theory, ...
Dynamic Image-to-Class Warping for Occluded Face Recognition
Face recognition (FR) systems in real-world applications need to deal with a wide range of interferences, such as occlusions and disguises in face images. Compared with other forms of interferences such as nonuniform illumination and pose changes, face ...
Learning Robust Face Representation With Classwise Block-Diagonal Structure
Face recognition has been widely studied due to its importance in various applications. However, the case that both training images and testing images are corrupted is not well solved. To address such a problem, this paper proposes a semisupervised ...
On the Use of Discriminative Cohort Score Normalization for Unconstrained Face Recognition
Facial imaging has been largely addressed for automatic personal identification, in a variety of different environments. However, automatic face recognition becomes very challenging whenever the acquisition conditions are unconstrained. In this paper, a ...
Ambiguously Labeled Learning Using Dictionaries
We propose a dictionary-based learning method for ambiguously labeled multiclass classification, where each training sample has multiple labels and only one of them is the correct label. The dictionary learning problem is solved using an iterative ...
Learning Person-Specific Representations From Faces in the Wild
Humans are natural face recognition experts, far out-performing current automated face recognition algorithms, especially in naturalistic, “in the wild” settings. However, a striking feature of human face recognition is that we are dramatically better ...
Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features
This paper addresses face verification in unconstrained settings. For this purpose, first, a nonlinear binary class-specific kernel discriminant analysis classifier (CS-KDA) based on spectral regression kernel discriminant analysis is proposed. By ...
RGB-D-Based Face Reconstruction and Recognition
Most RGB-D-based research focuses on scene reconstruction, gesture analysis, and simultaneous localization and mapping, but only a few study its impacts on face recognition. A common yet challenging scenario considered in face recognition takes a single ...
Reference Face Graph for Face Recognition
Face recognition has been studied extensively; however, real-world face recognition still remains a challenging task. The demand for unconstrained practical face recognition is rising with the explosion of online multimedia such as social networks, and ...
Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection
As face recognition applications progress from constrained sensing and cooperative subjects scenarios (e.g., driver’s license and passport photos) to unconstrained scenarios with uncooperative subjects (e.g., video surveillance), new challenges are ...
A 3D-Based Pose Invariant Face Recognition at a Distance Framework
Face recognition in the wild can be defined as recognizing individuals unabated by pose, illumination, expression, and uncertainties from the image acquisition. In this paper, we propose a framework recognizing human faces under such uncertainties by ...
Age and Gender Estimation of Unfiltered Faces
This paper concerns the estimation of facial attributes—namely, age and gender—from images of faces acquired in challenging, in the wild conditions. This problem has received far less attention than the related problem of face recognition, and in ...
Investigating the Periocular-Based Face Recognition Across Gender Transformation
This paper introduces a novel face recognition problem domain: the medically altered face for gender transformation. A data set of >1.2 million face images was constructed from wild videos obtained from You Tube of 38 subjects undergoing hormone ...
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints
Wireless bodyworn sensing devices are fast becoming popular for fitness, sports training, and personalized healthcare applications. Securing data generated by these devices is essential if they are to be integrated into the current health infrastructure ...
TM-Score: A Misuseability Weight Measure for Textual Content
In recent years, data leakage prevention solutions became an inherent component of the organizations' security suite. These solutions focus mainly on the data and its sensitivity level, and on preventing it from reaching an unauthorized entity. They ...
A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan Detection
The globalization of integrated circuits (ICs) design and fabrication has given rise to severe concerns on the devastating impact of subverted chip supply. Hardware Trojan (HT) is among the most dangerous threats to defend. The dormant circuit inserted ...
Kernelized Neighborhood Preserving Hashing for Social-Network-Oriented Digital Fingerprints
Digital fingerprinting is a promising approach to protect multimedia content from unauthorized redistribution. However, the existing fingerprints are unsuitable for social network tasks, because they fail to represent the social network structure, which ...
The FaceSketchID System: Matching Facial Composites to Mugshots
Facial composites are widely used by law enforcement agencies to assist in the identification and apprehension of suspects involved in criminal activities. These composites, generated from witness descriptions, are posted in public places and media with ...
Biometrics Evaluation Under Spoofing Attacks
While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, ...
Earprint: Transient Evoked Otoacoustic Emission for Biometrics
Biometrics is attracting increasing attention in privacy and security concerned issues, such as access control and remote financial transaction. However, advanced forgery and spoofing techniques are threatening the reliability of conventional biometric ...
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation
Remote authentication has been widely studied and adapted in distributed systems. The security of remote authentication mechanisms mostly relies on one of or the combination of three factors: 1) something users know—password; 2) something users have—...
Edit Detection in Speech Recordings via Instantaneous Electric Network Frequency Variations
In this paper, an edit detection method for forensic audio analysis is proposed. It develops and improves a previous method through changes in the signal processing chain and a novel detection criterion. As with the original method, electrical network ...
Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol
Existing anonymous remote authentication protocols to secure wireless body area networks (WBANs) raise challenges such as eliminating the need for distributing clients’ account information to the application providers and achieving forward security. ...
Resilience Analysis of Power Grids Under the Sequential Attack
The modern society increasingly relies on electrical service, which also brings risks of catastrophic consequences, e.g., large-scale blackouts. In the current literature, researchers reveal the vulnerability of power grids under the assumption that ...