Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

Presentation-level Privacy Protection Techniques for Automated Face Recognition—A Survey

Published: 13 July 2023 Publication History

Abstract

The use of Biometric Facial Recognition (FR) systems have become increasingly widespread, especially since the advent of deep neural network-based architectures. Although FR systems provide substantial benefits in terms of security and safety, the use of these systems also raises significant privacy concerns. This article discusses recent advances in facial identity hiding techniques, focusing on privacy protection approaches that hide or protect facial biometric data before camera devices capture the data. Moreover, we also discuss the state-of-the-art methods used to evaluate such privacy protection techniques. The primary motivation of this survey is to assess the relative performance of facial privacy protection methods and identify open challenges and future work that needs to be considered in this research area.

References

[1]
AVG. 2015. AVG reveals invisibility glasses at Pepcom Barcelona. Retrieved from https://www.avg.com/en/signal/avg-reveals-invisibility-glasses-at-pepcom-barcelona.
[2]
Big Brother Watch. 2018. “Dangerous and inaccurate” police facial recognition exposed in new Big Brother Watch report. Retrieved from https://bigbrotherwatch.org.uk/2018/05/dangerous-and-inaccurate-police-facial-recognition-exposed-in-new-big-brother-watch-report/.
[3]
Wikipedia. 2021. Avant-garde. Retrieved from https://en.wikipedia.org/w/index.php?title=Avant-garde&oldid=1045792145. Page Version ID: 1045792145.
[4]
Wikipedia. 2021. History of facial recognition technology. Retrieved from https://en.wikipedia.org/w/index.php?title=Facial_recognition_system&oldid=1038849154. Accessed: 2021-01-10.
[5]
Tom B. Brown, Dandelion Mané, Aurko Roy, Martín Abadi, and Justin Gilmer. 2018. Adversarial patch. Retrieved from http://arxiv.org/abs/1712.09665.
[6]
R. Brunelli and T. Poggio. 1993. Face recognition: Features versus templates. IEEE Trans. Pattern Anal. Mach. Intell. 15, 10 (Oct. 1993), 1042–1052. DOI:
[7]
Ankur Chattopadhyay and T. E. Boult. 2007. PrivacyCam: A privacy preserving camera using uCLinux on the blackfin DSP. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1–8. DOI:
[8]
Dong Chen, Gang Hua, Fang Wen, and Jian Sun. 2016. Supervised transformer network for efficient face detection. In Computer Vision (ECCV’16) (Lecture Notes in Computer Science), Bastian Leibe, Jiri Matas, Nicu Sebe, and Max Welling (Eds.). Springer International Publishing, Cham, 122–138. DOI:
[9]
Shang-Tse Chen, Cory Cornelius, Jason Martin, and Duen Horng (Polo) Chau. 2019. ShapeShifter: Robust physical adversarial attack on faster R-CNN object detector. In Proceedings of the Conference on Machine Learning and Knowledge Discovery in Databases (Lecture Notes in Computer Science), Michele Berlingerio, Francesco Bonchi, Thomas Gärtner, Neil Hurley, and Georgiana Ifrim (Eds.). Springer International Publishing, Cham, 52–68. DOI:
[10]
N. Dalal and B. Triggs. 2005. Histograms of oriented gradients for human detection. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), Vol. 1. 886–893 vol. 1. DOI:
[11]
Fahad Daniyal, Prathap Nair, and Andrea Cavallaro. 2009. Compact signatures for 3D face recognition under varying expressions. In Proceedings of the 6th IEEE International Conference on Advanced Video and Signal Based Surveillance. 302–307. DOI:
[12]
Debayan Deb, Jianbang Zhang, and Anil K. Jain. 2019. AdvFaces: Adversarial face synthesis. Retrieved from http://arxiv.org/abs/1908.05008.
[13]
Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. 2019. ArcFace: Additive angular margin loss for deep face recognition. Retrieved from http://arxiv.org/abs/1801.07698.
[14]
Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, and Jianguo Li. 2018. Boosting adversarial attacks with momentum. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR’18).IEEE Computer Society, 9185–9193. DOI:
[15]
Clément Feutry, Pablo Piantanida, Yoshua Bengio, and Pierre Duhamel. 2018. Learning anonymized representations with adversarial neural networks. Retrieved from http://arxiv.org/abs/1802.09386.
[16]
Leon A. Gatys, Alexander S. Ecker, and Matthias Bethge. 2016. Image style transfer using convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 2414–2423. DOI:. ISSN: 1063-6919.
[17]
Qiao Gu, Guanzhi Wang, Mang Tik Chiu, Yu-Wing Tai, and Chi-Keung Tang. 2019. LADN: Local adversarial disentangling network for facial makeup and de-makeup. Retrieved from http://arxiv.org/abs/1904.11272.
[18]
Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, and Yuval Elovici. 2021. Dodging attack using carefully crafted natural makeup. Retrieved from http://arxiv.org/abs/2109.06467.
[19]
Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron Courville. 2017. Improved training of wasserstein GANs. In Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS’17). Curran Associates, Red Hook, NY, 5769–5779.
[20]
Guodong Guo and Na Zhang. 2019. A survey on deep learning-based face recognition. Comput. Vision Image Understand. 189 (Dec. 2019), 102805. DOI:
[21]
Jia Guo, Jiankang Deng, Alexandros Lattas, and Stefanos Zafeiriou. 2021. Sample and computation redistribution for efficient face detection. Retrieved from http://arxiv.org/abs/2105.04714.
[22]
Yandong Guo, Lei Zhang, Yuxiao Hu, Xiaodong He, and Jianfeng Gao. 2016. MS-Celeb-1M: A dataset and benchmark for large-scale face recognition. Retrieved from http://arxiv.org/abs/1607.08221.
[23]
Shalini Gupta, Mia K. Markey, and Alan C. Bovik. 2010. Anthropometric 3D face recognition. Int. J. Comput. Vision 90, 3 (Dec. 2010), 331–349. DOI:
[24]
Adam Harvey. 2010. CV dazzle: Camouflage from face detection. Master’s Thesis.
[25]
Abul Hasnat, Julien Bohne, Jonathan Milgram, Stephane Gentric, and Liming Chen. 2017. DeepVisage: Making face recognition simple yet with powerful generalization skills. In Proceedings of the IEEE International Conference on Computer Vision Workshops (ICCVW’17).IEEE Computer Society, 1682–1691. DOI:
[26]
K. He, X. Zhang, S. Ren, and J. Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’16). 770–778. DOI:. ISSN: 1063-6919.
[27]
Kashmir Hill. 2020. Wrongfully accused by an algorithm. The New York Times (June 2020). Retrieved from https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.html.
[28]
Gary B. Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. Retrieved from https://hal.inria.fr/inria-00321923.
[29]
Max Jaderberg, Karen Simonyan, Andrew Zisserman, and Koray Kavukcuoglu. 2015. Spatial transformer networks. In Proceedings of the 28th International Conference on Neural Information Processing Systems (NIPS’15). MIT Press, Cambridge, MA, 2017–2025.
[30]
Liu Jing. 2017. Wearable Face Projector. Retrieved from http://jingcailiu.com/wearable-face-projector/.
[31]
Van Jip. 2017. Surveillance Exclusion Face Mask. Retrieved from http://www.jipvanleeuwenstein.nl/.
[32]
E. Kaziakhmedov, K. Kireev, G. Melnikov, M. Pautov, and A. Petiushko. 2019. Real-world attack on MTCNN face detection system. In Proceedings of the International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON’19). 0422–0427. DOI:
[33]
Stepan Komkov and Aleksandr Petiushko. 2019. AdvHat: Real-world adversarial attack on ArcFace face ID system. Retrieved from http://arxiv.org/abs/1908.08705.
[34]
Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2017. Adversarial examples in the physical world. In Proceedings of the ICLR Workshop. Retrieved from https://arxiv.org/abs/1607.02533.
[35]
Haoxiang Li, Zhe Lin, Xiaohui Shen, Jonathan Brandt, and Gang Hua. 2015. A convolutional neural network cascade for face detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’15). 5325–5334. DOI:
[36]
Tsung-Yi Lin, Piotr Dollár, Ross Girshick, Kaiming He, Bharath Hariharan, and Serge Belongie. 2017. Feature pyramid networks for object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’17). 936–944. DOI:
[37]
Weiyang Liu, Yandong Wen, Zhiding Yu, Ming Li, Bhiksha Raj, and Le Song. 2018. SphereFace: Deep hypersphere embedding for face recognition. Retrieved from http://arxiv.org/abs/1704.08063.
[38]
MEGVII. 2021. Face++ - (Online) face verification. Retrieved from https://www.faceplusplus.com.cn/.
[39]
Microsoft. 2021. Online face verification | Microsoft Azure. Retrieved from https://azure.microsoft.com/en-us/.
[40]
Shervin Minaee, Ping Luo, Zhe Lin, and Kevin Bowyer. 2021. Going deeper into face detection: A survey. Retrieved from http://arxiv.org/abs/2103.14983.
[41]
Mrityunjay and P. J. Narayanan. 2011. The De-identification camera. In Proceedings of the 3rd National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics. 192–195. DOI:
[42]
Mahyar Najibi, Pouya Samangouei, Rama Chellappa, and Larry S. Davis. 2017. SSH: Single stage headless face detector. In Proceedings of the IEEE International Conference on Computer Vision (ICCV’17). 4885–4894. DOI:
[43]
Omkar M. Parkhi, Andrea Vedaldi, and Andrew Zisserman. 2015. Deep face recognition. In Proceedings of the British Machine Vision Conference. British Machine Vision Association, Swansea, 41.1–41.12. DOI:
[44]
M. Pautov, G. Melnikov, E. Kaziakhmedov, K. Kireev, and A. Petiushko. 2019. On adversarial patches: Real-world attack on ArcFace-100 face recognition system. In Proceedings of the International Multi-Conference on Engineering, Computer and Information Sciences (SIBIRCON’19). 0391–0396. DOI:
[45]
Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud, and Scott Griffith. 2018. FacePET: Enhancing Bystanders’ facial privacy with smart wearables/internet of things. Electronics 7, 12 (Dec. 2018), 379. DOI:
[46]
Joseph Redmon and Ali Farhadi. 2017. YOLO9000: Better, faster, stronger. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’17). 6517–6525. DOI:
[47]
Antoaneta Roussi. 2020. Resisting the rise of facial recognition. Nature 587, 7834 (Nov. 2020), 350–353. DOI:
[48]
Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. 2015. ImageNet large-scale visual recognition challenge. Int. J. Comput. Vision 115, 3 (Dec. 2015), 211–252. DOI:
[49]
Toshiyuki Sakai, Takeo Kanade, Makoto Nagao, and Yu-ichi Ohta. 1973. Picture processing system using a computer complex. Comput. Graph. Image Process. 2, 3 (Dec. 1973), 207–215. DOI:
[50]
Weekers Sanne. 2017. Anonymous | Sanne Weekers. Retrieved from http://sanneweekers.nl/big-brother-is-watching-you/.
[51]
Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. FaceNet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’15) (June 2015), 815–823. DOI:
[52]
Ramprasaath R. Selvaraju, Michael Cogswell, Abhishek Das, Ramakrishna Vedantam, Devi Parikh, and Dhruv Batra. 2017. Grad-CAM: Visual explanations from deep networks via gradient-based localization. In Proceedings of the IEEE International Conference on Computer Vision (ICCV’17). 618–626. DOI:
[53]
Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. 2016. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). ACM, New York, NY, 1528–1540. DOI:
[54]
Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. 2019. A general framework for adversarial examples with objectives. ACM Trans. Priv. Secur. 22, 3 (June 2019), 16:1–16:30. DOI:
[55]
Meng Shen, Zelin Liao, Liehuang Zhu, Ke Xu, and Xiaojiang Du. 2019. VLA: A practical visible light-based attack on face recognition systems in physical world. In Proceedings of the ACM Conference on Interactive, Mobile, Wearable and Ubiquitous Technologies. 103:1–103:19. DOI:
[56]
Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, and Jiankun Hu. 2021. Effective and robust physical-world attacks on deep learning face recognition systems. IEEE Trans. Info. Forensics Secur. 16 (2021), 4063–4077. DOI:
[57]
J. Shi, A. Samal, and D. Marx. 2006. How effective are landmarks and their geometry for face recognition? Comput. Vision Image Understand. 102, 2 (May 2006), 117–133. DOI:
[58]
Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. Retrieved from http://arxiv.org/abs/1409.1556.
[59]
Yi Sun, Ding Liang, Xiaogang Wang, and Xiaoou Tang. 2015. DeepID3: Face recognition with very deep neural networks. Retrieved from http://arxiv.org/abs/1502.00873.
[60]
Yi Sun, Xiaogang Wang, and Xiaoou Tang. 2014. Deep learning face representation from predicting 10,000 classes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 1891–1898. DOI:
[61]
C. Szegedy, Wei Liu, Yangqing Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich. 2015. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’15). 1–9. DOI:. ISSN: 1063-6919.
[62]
Yaniv Taigman, Ming Yang, Marc’Aurelio Ranzato, and Lior Wolf. 2014. DeepFace: Closing the gap to human-level performance in face verification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 1701–1708. DOI:
[63]
P. Terhörst. 2021. Mitigating Soft-Biometric Driven Bias and Privacy Concerns in Face Recognition Systems | Fraunhofer IGD. Ph.D. Dissertation. Technische Universität Darmtadt. Retrieved from https://www.igd.fraunhofer.de/en/press/news/mitigating-soft-biometric-driven-bias-and-privacy-concerns-face-recognition-systems.
[64]
Philipp Terhörst, Kevin Riehl, Naser Damer, Peter Rot, Blaz Bortolato, Florian Kirchbuchner, Vitomir Struc, and Arjan Kuijper. 2020. PE-MIU: A training-free privacy-enhancing face recognition approach based on minimum information units. IEEE Access 8 (2020), 93635–93647. DOI:
[65]
S. Thys, W. V. Ranst, and T. Goedemé. 2019. Fooling automated surveillance cameras: Adversarial patches to attack person detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW’19). 49–55. DOI:
[66]
Fatemeh Vakhshiteh, Ahmad Nickabadi, and Raghavendra Ramachandra. 2021. Adversarial attacks against face recognition: A comprehensive study. Retrieved from http://arxiv.org/abs/2007.11709.
[67]
Paul Viola and Michael J. Jones. 2004. Robust real-time face detection. Int. J. Comput. Vision 57, 2 (May 2004), 137–154. DOI:
[68]
H. Wang, Y. Wang, Z. Zhou, X. Ji, D. Gong, J. Zhou, Z. Li, and W. Liu. 2018. CosFace: Large margin cosine loss for deep face recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 5265–5274. DOI:
[69]
Mei Wang and Weihong Deng. 2021. Deep face recognition: A survey. Neurocomputing 429 (Mar. 2021), 215–244. DOI:
[70]
Yandong Wen, Kaipeng Zhang, Zhifeng Li, and Yu Qiao. 2016. A discriminative feature learning approach for deep face recognition. In Proceedings of the European Conference on Computer Vision (ECCV’16), Bastian Leibe, Jiri Matas, Nicu Sebe, and Max Welling (Eds.). Vol. 9911. Springer International Publishing, Cham, 499–515. DOI:
[71]
Thomas Winkler and Bernhard Rinner. 2010. TrustCAM: Security and privacy-protection for an embedded smart camera based on trusted computing. In Proceedings of the 7th IEEE International Conference on Advanced Video and Signal Based Surveillance. 593–600. DOI:
[72]
T. Yamada, S. Gohshi, and I. Echizen. 2013. Privacy visor: Method based on light absorbing and reflecting properties for preventing face image detection. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. 1572–1577. DOI:. ISSN: 1062-922X.
[73]
Yoshihiro Yamada, Masakazu Iwamura, and Koichi Kise. 2016. Deep pyramidal residual networks with separated stochastic depth. Retrieved from http://adsabs.harvard.edu/abs/2016arXiv161201230Y.
[74]
Shuo Yang, Ping Luo, Chen Change Loy, and Xiaoou Tang. 2015. Wider face: A face detection benchmark. Retrieved from http://arxiv.org/abs/1511.06523.
[75]
Dong Yi, Zhen Lei, Shengcai Liao, and Stan Z. Li. 2014. Learning face representation from scratch. Retrieved from http://arxiv.org/abs/1411.7923.
[76]
Bangjie Yin, Wenxuan Wang, Taiping Yao, Junfeng Guo, Zelun Kong, Shouhong Ding, Jilin Li, and Cong Liu. 2021. Adv-makeup: A new imperceptible and transferable attack on face recognition. Retrieved from https://arxiv.org/abs/2105.03162v1.
[77]
Mengyao Zhai, Lei Chen, Fred Tung, Jiawei He, Megha Nawhal, and Greg Mori. 2019. Lifelong GAN: Continual learning for conditional image generation. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV’19). 2759–2768. DOI:
[78]
Cha Zhang and Zhengyou Zhang. 2010. A survey of recent advances in face detection. Retrieved from https://www.microsoft.com/en-us/research/publication/a-survey-of-recent-advances-in-face-detection/.
[79]
Kaipeng Zhang, Zhanpeng Zhang, Zhifeng Li, and Yu Qiao. 2016. Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23, 10 (Oct. 2016), 1499–1503. DOI:
[80]
Yupeng Zhang, Yuheng Lu, Hajime Nagahara, and Rin-ichiro Taniguchi. 2014. Anonymous camera for privacy protection. In Proceedings of the 22nd International Conference on Pattern Recognition. 4170–4175. DOI:
[81]
Zhe Zhou, Di Tang, Xiaofeng Wang, Weili Han, Xiangyu Liu, and Kehuan Zhang. 2018. Invisible mask: Practical attacks on face recognition with infrared. Retrieved from http://arxiv.org/abs/1803.04683.
[82]
M. R. Hasan, S. M. H. Mahmud, and X. Y. Li. 2019. Face Anti-Spoofing Using Texture-Based Techniques and Filtering Methods. J. Phys. Conf. Ser. 1229, (2019), 012044.
[83]
S. Pan, S. Hoque, and F. Deravi. 2022. An Attention-Guided Framework for Explainable Biometric Presentation Attack Detection. Sensors 22 (2022), 3365

Cited By

View all
  • (2024)YSAF: Yolo with Spatial Attention and FFT to Detect Face Spoofing Attacks2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)10.1109/ICAIC60265.2024.10433802(1-6)Online publication date: 7-Feb-2024
  • (2024)MPLDP: Multi-Level Personalized Local Differential Privacy MethodIEEE Access10.1109/ACCESS.2024.343086312(99739-99754)Online publication date: 2024
  • (2024)Research on Fingerprint Image Differential Privacy Protection Publishing Method Based on Wavelet Transform and Singular Value Decomposition TechnologyIEEE Access10.1109/ACCESS.2024.336799612(28417-28436)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 55, Issue 13s
December 2023
1367 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3606252
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 July 2023
Online AM: 09 February 2023
Accepted: 30 January 2023
Revised: 24 January 2023
Received: 09 February 2022
Published in CSUR Volume 55, Issue 13s

Check for updates

Author Tags

  1. Biometrics
  2. privacy protection techniques
  3. facial identity hiding
  4. face detection-recognition

Qualifiers

  • Survey

Funding Sources

  • European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)571
  • Downloads (Last 6 weeks)57
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)YSAF: Yolo with Spatial Attention and FFT to Detect Face Spoofing Attacks2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)10.1109/ICAIC60265.2024.10433802(1-6)Online publication date: 7-Feb-2024
  • (2024)MPLDP: Multi-Level Personalized Local Differential Privacy MethodIEEE Access10.1109/ACCESS.2024.343086312(99739-99754)Online publication date: 2024
  • (2024)Research on Fingerprint Image Differential Privacy Protection Publishing Method Based on Wavelet Transform and Singular Value Decomposition TechnologyIEEE Access10.1109/ACCESS.2024.336799612(28417-28436)Online publication date: 2024
  • (2024)OCIE: Augmenting model interpretability via Deconfounded Explanation-Guided LearningKnowledge-Based Systems10.1016/j.knosys.2024.112390302(112390)Online publication date: Oct-2024
  • (2024)Leveraging saliency priors and explanations for enhanced consistent interpretabilityExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.123518249:PAOnline publication date: 1-Sep-2024
  • (2024)Cybersecurity in neural interfacesComputers in Biology and Medicine10.1016/j.compbiomed.2023.107604167:COnline publication date: 1-Feb-2024
  • (2023)Signature Verification System: Using Big Transfer (BiT-M-R50x1) for Accurate AuthenticationJournal of Image Processing and Intelligent Remote Sensing10.55529/jipirs.35.10.19(10-19)Online publication date: 7-Sep-2023
  • (2023)Multi-Object Multi-Camera Tracking Based on Deep Learning for Intelligent Transportation: A ReviewSensors10.3390/s2308385223:8(3852)Online publication date: 10-Apr-2023
  • (2023)Rapid and Efficient Facial Landmark Identification by Light and High Resolution Network using Artificial Intelligence2023 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET)10.1109/ICRAMET60171.2023.10366566(320-324)Online publication date: 15-Nov-2023

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media