Academic literature on the topic 'Face recognition. eng'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Face recognition. eng.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Face recognition. eng"

1

Ashok Kumar, M., and Sivaram Rajeyyagari. "Erratum to “A novel mechanism for dynamic multifarious and disturbed human face recognition using Advanced Stance Coalition (ASC)” [Comput Electr Eng 84 (June 2020) 106642]." Computers & Electrical Engineering 86 (September 2020): 106819. http://dx.doi.org/10.1016/j.compeleceng.2020.106819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Jian, Yu Cheng, Yi Cheng, Yang Yang, Fang Zhao, Jianshu Li, Hengzhu Liu, Shuicheng Yan, and Jiashi Feng. "Look across Elapse: Disentangled Representation Learning and Photorealistic Cross-Age Face Synthesis for Age-Invariant Face Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9251–58. http://dx.doi.org/10.1609/aaai.v33i01.33019251.

Full text
Abstract:
Despite the remarkable progress in face recognition related technologies, reliably recognizing faces across ages still remains a big challenge. The appearance of a human face changes substantially over time, resulting in significant intraclass variations. As opposed to current techniques for ageinvariant face recognition, which either directly extract ageinvariant features for recognition, or first synthesize a face that matches target age before feature extraction, we argue that it is more desirable to perform both tasks jointly so that they can leverage each other. To this end, we propose a deep Age-Invariant Model (AIM) for face recognition in the wild with three distinct novelties. First, AIM presents a novel unified deep architecture jointly performing cross-age face synthesis and recognition in a mutual boosting way. Second, AIM achieves continuous face rejuvenation/aging with remarkable photorealistic and identity-preserving properties, avoiding the requirement of paired data and the true age of testing samples. Third, we develop effective and novel training strategies for end-to-end learning the whole deep architecture, which generates powerful age-invariant face representations explicitly disentangled from the age variation. Extensive experiments on several cross-age datasets (MORPH, CACD and FG-NET) demonstrate the superiority of the proposed AIM model over the state-of-the-arts. Benchmarking our model on one of the most popular unconstrained face recognition datasets IJB-C additionally verifies the promising generalizability of AIM in recognizing faces in the wild.
APA, Harvard, Vancouver, ISO, and other styles
3

Ellis, Andrew W., Andrew W. Young, Brenda M. Flude, and Dennis C. Hay. "Repetition priming of face recognition." Quarterly Journal of Experimental Psychology Section A 39, no. 2 (May 1987): 193–210. http://dx.doi.org/10.1080/14640748708401784.

Full text
Abstract:
Three experiments investigating the priming of the recognition of familiar faces are reported. In Experiment 1, recognizing the face of a celebrity in an “Is this face familiar?” task was primed by exposure several minutes earlier to a different photograph of the same person, but not by exposure to the person's written name (a partial replication of Bruce and Valentine, 1985). In Experiment 2, recognizing the face of a personal acquaintance was again primed by recognizing a different photograph of their face, but not by recognizing the acquaintance from that person's body shape, clothes etc. Experiment 3 showed that maximum repetition priming is obtained from prior exposure to an identical photograph of a famous face, less from a similar photograph, and least (but still significant) from a dissimilar photograph. We argue that repetition priming is a function of the degree of physical similarity between two stimuli and that lack of priming between different stimulus types (e.g., written names and faces, or bodies and faces) may be attributable to lack of physical similarity between prime and test stimuli. Repetition priming effects may be best explained by some form of “instance-based” model such as that proposed by McClelland and Rumelhart (1985).
APA, Harvard, Vancouver, ISO, and other styles
4

Swain, Frank. "Egg donors paired by face recognition." New Scientist 239, no. 3189 (August 2018): 10. http://dx.doi.org/10.1016/s0262-4079(18)31375-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zimmermann, Friederike G. S., Xiaoqian Yan, and Bruno Rossion. "An objective, sensitive and ecologically valid neural measure of rapid human individual face recognition." Royal Society Open Science 6, no. 6 (June 2019): 181904. http://dx.doi.org/10.1098/rsos.181904.

Full text
Abstract:
Humans may be the only species able to rapidly and automatically recognize a familiar face identity in a crowd of unfamiliar faces, an important social skill. Here, by combining electroencephalography (EEG) and fast periodic visual stimulation (FPVS), we introduce an ecologically valid, objective and sensitive neural measure of this human individual face recognition function. Natural images of various unfamiliar faces are presented at a fast rate of 6 Hz, allowing one fixation per face, with variable natural images of a highly familiar face identity, a celebrity, appearing every seven images (0.86 Hz). Following a few minutes of stimulation, a high signal-to-noise ratio neural response reflecting the generalized discrimination of the familiar face identity from unfamiliar faces is observed over the occipito-temporal cortex at 0.86 Hz and harmonics. When face images are presented upside-down, the individual familiar face recognition response is negligible, being reduced by a factor of 5 over occipito-temporal regions. Differences in the magnitude of the individual face recognition response across different familiar face identities suggest that factors such as exposure, within-person variability and distinctiveness mediate this response. Our findings of a biological marker for fast and automatic recognition of individual familiar faces with ecological stimuli open an avenue for understanding this function, its development and neural basis in neurotypical individual brains along with its pathology. This should also have implications for the use of facial recognition measures in forensic science.
APA, Harvard, Vancouver, ISO, and other styles
6

Zheng, Siming, Rahmita Wirza OK Rahmat, Fatimah Khalid, and Nurul Amelina Nasharuddin. "3D texture-based face recognition system using fine-tuned deep residual networks." PeerJ Computer Science 5 (December 2, 2019): e236. http://dx.doi.org/10.7717/peerj-cs.236.

Full text
Abstract:
As the technology for 3D photography has developed rapidly in recent years, an enormous amount of 3D images has been produced, one of the directions of research for which is face recognition. Improving the accuracy of a number of data is crucial in 3D face recognition problems. Traditional machine learning methods can be used to recognize 3D faces, but the face recognition rate has declined rapidly with the increasing number of 3D images. As a result, classifying large amounts of 3D image data is time-consuming, expensive, and inefficient. The deep learning methods have become the focus of attention in the 3D face recognition research. In our experiment, the end-to-end face recognition system based on 3D face texture is proposed, combining the geometric invariants, histogram of oriented gradients and the fine-tuned residual neural networks. The research shows that when the performance is evaluated by the FRGC-v2 dataset, as the fine-tuned ResNet deep neural network layers are increased, the best Top-1 accuracy is up to 98.26% and the Top-2 accuracy is 99.40%. The framework proposed costs less iterations than traditional methods. The analysis suggests that a large number of 3D face data by the proposed recognition framework could significantly improve recognition decisions in realistic 3D face scenarios.
APA, Harvard, Vancouver, ISO, and other styles
7

Zarei, Shima. "Face recognition methods analysis." International Journal Artificial Intelligent and Informatics 1, no. 1 (July 10, 2018): 01. http://dx.doi.org/10.33292/ijarlit.v1i1.13.

Full text
Abstract:
Face Recognition is one of the most important issues in Image processing tasks. It is important because it uses for various purposes in real world such as Criminal detection or for detecting fraud in passport and visa check in airports. Face book is a nice example of Face recognition application, when it sends notification to one user’s friends who are recognized by their images that user uploaded in face book page. To solve Face Recognition problem different methods are introduced such as Principal Component Analysis (PCA), Independent Component Analysis (ICA), Support Vector Machine (SVM), Linear Discriminant Analysis (LDA), and Hidden Markov Models (HMM) which are explained and analyzed. Also algorithms like; Eigen face, Fisher face and Local Binary Pattern Histogram (LBPH) which are simplest and most accurate methods are implemented in this project for AT&T dataset to recognize the most similar face to other faces in this data set. To this end these algorithms are explained and advantages and disadvantages of each one are analyzed as well. Consequently, the best method is selected with comparison between the results of face reconstruction by Engine face, Fisher face and Local binary pattern histogram methods. In this project Eigen face method has best result. It should be noted that for implementing face recognition algorithms color map methods are used to distinguish the facial features more precisely. In this work Rainbow color map in Eigen Face algorithm and HSV color map in Fisher Face algorithm are utilized and results shows that HSV color map is more accurate than rainbow color map.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhong, Yuanyi, Jiansheng Chen, and Bo Huang. "Toward End-to-End Face Recognition Through Alignment Learning." IEEE Signal Processing Letters 24, no. 8 (August 2017): 1213–17. http://dx.doi.org/10.1109/lsp.2017.2715076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Hongxin, and Liying Chi. "End-to-End Spatial Transform Face Detection and Recognition." Virtual Reality & Intelligent Hardware 2, no. 2 (April 2020): 119–31. http://dx.doi.org/10.1016/j.vrih.2020.04.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Matsuda, Yoshi-Taka, Masako Myowa-Yamakoshi, and Satoshi Hirata. "Familiar face + novel face = familiar face? Representational bias in the perception of morphed faces in chimpanzees." PeerJ 4 (August 4, 2016): e2304. http://dx.doi.org/10.7717/peerj.2304.

Full text
Abstract:
Highly social animals possess a well-developed ability to distinguish the faces of familiar from novel conspecifics to induce distinct behaviors for maintaining society. However, the behaviors of animals when they encounter ambiguous faces of familiar yet novel conspecifics, e.g., strangers with faces resembling known individuals, have not been well characterised. Using a morphing technique and preferential-looking paradigm, we address this question via the chimpanzee’s facial–recognition abilities. We presented eight subjects with three types of stimuli: (1) familiar faces, (2) novel faces and (3) intermediate morphed faces that were 50% familiar and 50% novel faces of conspecifics. We found that chimpanzees spent more time looking at novel faces and scanned novel faces more extensively than familiar or intermediate faces. Interestingly, chimpanzees looked at intermediate faces in a manner similar to familiar faces with regards to the fixation duration, fixation count, and saccade length for facial scanning, even though the participant was encountering the intermediate faces for the first time. We excluded the possibility that subjects merely detected and avoided traces of morphing in the intermediate faces. These findings suggest a bias for a feeling-of-familiarity that chimpanzees perceive familiarity with an intermediate face by detecting traces of a known individual, as 50% alternation is sufficient to perceive familiarity.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Face recognition. eng"

1

Chiachia, Giovani. "Improving face recognition with multispectral fusion and support vector machines /." São José do Rio Preto : [s.n.], 2009. http://hdl.handle.net/11449/98661.

Full text
Abstract:
Orientador: Aparecido Nilceu Marana
Banca: Roberto Marcondes Cesar Junior
Banca: Ivan Rizzo Guilherme
Resumo: O reconhecimento facial é uma das principais formas de identificação humana. Apesar das pesquisas em reconhecimento facial automático terem crescido substancialmente ao longo dos últimos 35 anos, identificar pessoas a partir da face continua sendo um desafio para as áreas de Visão Computacional e Reconhecimento de Padrões. Em função dos cenários variarem desde a identificação a partir de fotografias até o reconhecimento baseado em vídeos sem nenhum tipo de controle ao serem gravados, os maiores desafios estão relacionados à independência contra diferentes tipos de iluminação, pose e expressão. O objetivo desta dissertação é propor técnicas que possam contribuir para a melhoria dos sistemas de reconhecimento facial. A primeira técnica endereça o problema da iluminação através da fusão dos espectros visível e infravermelho da face. Através desta abordagem, as taxas de reconhecimento foram melhoradas em 2.07% enquanto a taxa de erro igual (EER) foi reduzida em 45.47%. A segunda técnica trata do caso da extração e classificação de características faciais. Ela propõe um novo modelo para reconhecimento facial através do uso de características extraídas por Histogramas Census e de uma técnica de reconhecimento de padrões baseada em Máquinas de Vetores de Suporte (SVMs). Este outro grupo de experimentos nos possibilitou aumentar a precisão do reconhecimento no teste FERET fa/fb em 0.5%. Além destes resultados, algumas contribuições adicionais deste trabalho que merecem ser destacadas são a análise da dependência estatística entre classificadores de espectros diferentes e considerações sobre o comportamento de uma única C-SVC SVM para identificação de pessoas de forma eficaz.
Abstract: Face recognition is one of the primary ways of human identification. Although researches on automated face recognition have broadly increased along the last 35 years, it remains a challenging task in the fields of Computer Vision and Pattern Recognition. As the scenarios varies from static and constrained photographs to uncontrolled video images, the challenging issues on automatic face recognition are usually related with variations in illumination, pose and expressions. The goal of this master thesis is to propose techniques for the improvement of face recognition systems. The first technique addresses the problem of illumination by fusing the visible and the infrared spectra of the face. With this approach the recognition rates were improved in 2.07% while the Equal Error Rate (EER) were reduced in 45.47%. The second technique addresses the issue of face features extraction and classification. It proposes a new framework for face recognition by using features extracted by Census Histograms and a pattern recognition technique based on Support Vector Machines (SVMs). This other group of experiments enabled us to increase the recognition accuracy in the FERET fa/fb test in 0.5%. Beyond these results, additional contributions of this work that deserve to be highlighted are the statistical dependency analysis between face recognition systems based on different spectra and a better comprehension about the behavior of a single C-SVC SVM to reliably predict faces identities.
Mestre
APA, Harvard, Vancouver, ISO, and other styles
2

Penteado, Bruno Elias. "Autenticação biométrica de usuários em sistemas de E-learning baseada em reconhecimento de faces a partir de vídeo /." São José do Rio Preto : [s.n.], 2009. http://hdl.handle.net/11449/98692.

Full text
Abstract:
Orientador: Aparecido Nilceu Elias
Banca: Agma Juci Machado Traina
Banca: Wilson Massashiro Yonezawa
Resumo: Nos últimos anos tem sido observado um crescimento exponencial na oferta de cursos a distância realizados pela Internet, decorrente de suas vantagens e características (menores custos de distribuição e atualização de conteúdo, gerenciamento de grandes turmas, aprendizado assíncrono e geograficamente independente, etc.), bem como de sua regulamentação e apoio governamental. Entretanto, a falta de mecanismos eficazes para assegurar a autenticação dos alunos neste tipo de ambiente é apontada como uma séria deficiência, tanto no acesso ao sistema quanto durante a participação do usuário nas atividades do curso. Atualmente, a autenticação baseada em senhas continua predominante. Porém, estudos têm sido conduzidos sobre possíveis aplicações da Biometria para autenticação em ambientes Web. Com a popularização e conseqüente barateamento de hardware habilitado para coleta biométrica (como webcams, microfone e leitores de impressão digital embutidos), a Biometria passa a ser considerada uma forma segura e viável de autenticação remota de indivíduos em aplicações Web. Baseado nisso, este trabalho propõe uma arquitetura distribuída para um ambiente de e-Learning, explorando as propriedades de um sistema Web para a autenticação biométrica tanto no acesso ao sistema quanto de forma contínua, durante a realização do curso. Para análise desta arquitetura, é avaliada a performance de técnicas de reconhecimento de faces a partir de vídeo capturadas on-line por uma webcam em um ambiente de Internet, simulando a interação natural de um indivíduo em um sistema de e- Learning. Para este fim, foi criada uma base de dados de vídeos própria, contando com 43 indivíduos navegando e interagindo com páginas Web. Os resultados obtidos mostram que os métodos analisados, consolidados na literatura, podem ser aplicados com sucesso nesse tipo de aplicação... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: In the last years it has been observed an exponential growth in the offering of Internet-enabled distance courses, due to its advantages and features (decreased distribution and content updates costs, management of large groups of students, asynchronous and geographically independent learning) as well as its regulation and governmental support. However, the lack of effective mechanisms that assure user authentication in this sort of environment has been pointed out as a serious deficiency, both in the system logon and during user attendance in the course assignments. Currently, password based authentication still prevails. Nevertheless, studies have been carried out about possible biometric applications for Web authentication. With the popularization and resultant decreasing costs of biometric enabled devices, such as webcams, microphones and embedded fingerprint sensors, Biometrics is reconsidered as a secure and viable form of remote authentication of individuals for Web applications. Based on that, this work presents a distributed architecture for an e-Learning environment, by exploring the properties of a Web system for biometric authentication both in the system logon and in continuous monitoring, during the course attendance. For the analysis of this architecture, the performance of techniques for face recognition from video, captured on-line by a webcam in an Internet environment, is evaluated, simulating the natural interaction of an individual in an e-Learning system. For that, a private database was created, with 43 individuals browsing and interacting with Web pages. The results show that the methods analyzed, though consolidated in the literature, can be successfully applied in this kind of application, with recognition rates up to 97% in ideal conditions, with low execution times and with short amount of information transmitted between client and server, with templates sizes of about 30KB.
Mestre
APA, Harvard, Vancouver, ISO, and other styles
3

Gawrylowicz, Julie. "The construction of facial composites by witnesses with mild learning disabilities." Thesis, Abertay University, 2010. https://rke.abertay.ac.uk/en/studentTheses/4821765e-ab7f-480f-a0e1-65c9291bbc50.

Full text
Abstract:
In a criminal investigation, witnesses may get asked by the police to provide a perpetrator’s description or to generate a composite image of the perpetrator’s face. Due to their elevated vulnerability to victimisation people with a learning disability (LD) may be more likely than other members of the wider community to find themselves in such situations. Research regarding face recognition and description abilities of this group has been to some extent neglected in the eyewitness research literature. Consequently, guidance for practitioners on how to effectively generate facial composite images with LD witnesses is limited. The current research addresses this issue, by investigating basic and applied face recognition and description abilities in individuals with mild learning disabilities (mLD) during a series of experimental studies. Moreover, potential facilitating measures are introduced and assessed. Five studies were conducted during the course of this thesis. In the first study a survey was designed to collect information on currently used composite systems by UK law enforcement agencies and how operators perceive and treat witnesses with LD. The survey findings confirmed the initial assumption that individuals with LD may indeed find themselves in the situation of having to describe a perpetrator’s face to an investigative officer. Furthermore, the results emphasised the lack of guidance available to operators on how to best meet the special needs of this particular witness population. Study 2 investigated basic face recognition and description abilities in people with mLD and revealed that overall they performed at a lower level than the non-LD controls. Despite this finding, mLD individuals as a group performed above chance levels and they displayed variability in performance depending on the introduced measures. iv Studies 3 and 5 investigated these abilities in a more applied setting, namely during the construction of facial composites with contemporary facial composite systems. Study 3 revealed that composites generated with the E-FIT system, a featural system, were considerably poorer than those created by their non-LD counterparts. Studies 4 and 5 attempted to improve mLD individuals’ performance by applying visual prompts and by using a more holistic facial composite system, i.e. EvoFIT. There was little evidence of the former being advantageous for witnesses with mLD, however, EvoFIT significantly enhanced composite construction abilities in the mLD participants. Finally, the practical and theoretical implications of the main findings are discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Porubsky, Jakub. "Biometric Authentication in M-Payments : Analysing and improving end-users’ acceptability." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79221.

Full text
Abstract:
Traditional authentication methods like Personal Identification Number (PIN) are getting obsolete and insecure for electronic-payments while mobile-payments are becoming more and more popular. Biometrics such as fingerprint and face recognition authentication methods seem to be a solution to this security issue as they are becoming a regular and integrated part of an average smartphone end-users purchase. However, for mobile-payments to be authenticated by biometrics, end-users acceptability of both technologies must be high. In this research, fingerprint and face recognition authentication methods are being tested with end-users and their current acceptability level is being determined based on interviews which are conducted upon finishing each testing scenario. The interview is using 39 questions which are determining previous usage of the technologies, their likeability, positives, negatives, and feelings about various features biometrics provide such as ease-of-use, stress-free method of payment, security, and many others. Additionally, one more authentication method is tested, namely two factor authentication consisting of one biometric method (fingerprint) and one traditional method (PIN) of authentication. The main goal for testing this method is to find out whether implementing (as currently it is not available) such technology into mobile-payments would be beneficial and how it scored in user-acceptance next to fingerprint and face recognition authentication methods. Once the user-acceptance level is determined the main reasons for it are presented. Last but not least, suggestions for improvements in this domain are presented so that biometrics are even more accepted by end-users who are performing mobile-payments on their smartphones.
APA, Harvard, Vancouver, ISO, and other styles
5

MacKenzie, Graham. "Electrophysiological investigations of recognition memory : the role of pre-existing representations in recollection." Thesis, University of Stirling, 2007. http://hdl.handle.net/1893/324.

Full text
Abstract:
Dual-process models of recognition memory propose that recognition memory can be supported by either a general sense of familiarity or the recollection of the encoding context. One source of evidence supporting dual-process models comes from event-related potential (ERP) studies of recognition memory, which have identified distinct patterns of neural activity associated with familiarity and recollection (the mid frontal and left parietal old/new effects, respectively). In this thesis, dual-process accounts of recognition memory were investigated in a series of ERP studies using three categories of stimulus: previously unknown faces, famous faces, and names. For previously unknown faces, familiarity was associated with activity over posterior scalp electrodes while recollection was associated with topographically dissociable activity over anterior electrodes. These dissociable patterns of activity support dual-process models. However, the typical pattern of old/new effects was only observed for stimuli associated with pre-existing representations (i.e., names and famous faces), suggesting that the presence/absence of pre-existing representations may determine the particular retrieval processes that support recognition memory. Furthermore, recollection was associated with two different patterns of activity (anterior and left parietal effects), suggesting that recollection is not a homogenous process. Dual-process theories may represent an important starting point for investigating recognition memory, but neither familiarity nor recollection appear to be functionally homogenous processes when theorizing is constrained by the analysis of scalp recorded electrophysiological activity.
APA, Harvard, Vancouver, ISO, and other styles
6

Bin, Mohd Isa Mohd Rizal. "Watermarked face recognition scheme : enhancing the security while maintaining the effectiveness of biometric authentication systems." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/watermarked-face-recognition-scheme(a242609e-ba02-4cca-bfae-3615793fd018).html.

Full text
Abstract:
Biometric authentication systems provide alternative solutions to traditional methods that are based on knowledge (e.g. password) or physical tokens (e.g., smart card). Many studies now focus on getting high accuracy rates for biometric verification. However,with advances in technology, biometric data (e.g. fingerprint, face, iris) can be captured/sniffed, duplicated, modified, and then resubmitted in the same or in other applications that utilize the same biometric features. Watermarking techniques can be used effectively to protect the genuine ownership of biometric data, either to accept or reject. This thesis presents a proposal for a suitable and viable combination of a face recognition algorithm and a watermarking technique, namely a Principal Component Analysis (PCA) and Discrete Cosine Transform (DCT) combination, that will ensure the authenticity of the data being transmitted in the face recognition system, which will then increase its level of security. The emphasis is on replay attack, which is recognizing and rejecting captured biometric data resubmitted into the system. The research begins with an analysis of biometric systems, with an emphasis on face recognition systems, and in particular with reference to the recorded threats on such systems. Biometric watermarking algorithms proposed by previous researchers within the face recognition environment are then studied, noting their proposed solutions to the said threats. This would then give a good idea towards a watermarking scheme to be proposed to enhance the security of face recognition systems, especially in terms of the authenticity of the data being transmitted. This proposed watermarking face recognition scheme is the main objective, which will be implemented in a PCA—DCT combination, followed by a check on all the 8 vulnerable positions where data may be captured and/or resubmitted. All the results produced are positive, apart from a few situations that will have to be left for future work. Non degradation of the individual PCA and DCT systems due to the combination is also checked and experimented on, again with positive results. Finally, the robustness of the watermarking scheme is experimented on to evaluate its resilience against attacks. The contributions from this research constitute a meaningful solution step to security problems associated with biometric techniques. The outcome of the research should also stimulate further research by opening up more research gaps in the area of combining biometric and watermarking techniques.
APA, Harvard, Vancouver, ISO, and other styles
7

Kami, Guilherme José da Costa. "Análise de técnicas de reconhecimento de padrões para a identificação biométrica de usuários em aplicações WEB Utilizando faces a partir de vídeos /." São José do Rio Preto : [s.n.], 2011. http://hdl.handle.net/11449/98674.

Full text
Abstract:
Orientador: Aparecido Nilceu Marana
Banca: Hélio Pedrini
Banca: Aledir Silveira Pereira
Resumo: As técnicas para identificação biométrica têm evoluído cada vez mais devido à necessidade que os seres humanos têm de identificar as pessoas em tempo real e de forma precisa para permitir o acesso a determinados recursos, como por exemplo, as aplicações e serviços WEB. O reconhecimento facial é uma técnica biométrica que apresenta várias vantagens em relação às demais, tais como: uso de equipamentos simples e baratos para a obtenção das amostras e a possibilidade de se realizar o reconhecimento em sigilo e à distância. O reconhecimento de faces a partir de vídeo é uma tendência recente na área de Biometria. Esta dissertação tem por objetivo principal comparar diferentes técnicas de reconhecimento facial a partir de vídeo para determinar as que apresentam um melhor compromisso entre tempo de processamento e precisão. Outro objetivo é a incorporação dessas melhores técnicas no sistema de autenticação biométrica em ambientes de E-Learning, proposto em um trabalho anterior. Foi comparado o classificador vizinho mais próximo usando as medidas de distância Euclidiana e Mahalanobis com os seguintes classificadores: Redes Neurais MLP e SOM, K Vizinhos mais Próximos, Classificador Bayesiano, Máquinas de Vetores de Suporte (SVM) e Floresta de Caminhos Ótimos (OPF). Também foi avaliada a técnica de Modelos Ocultos de Markov (HMM). Nos experimentos realizados com a base Recogna Video Database, criada especialmente para uso neste trabalho, e Honda/UCSD Video Database, os classificadores apresentaram os melhores resultados em termos de precisão, com destaque para o classificador SVM da biblioteca SVM Torch. A técnica HMM, que incorpora informações temporais, apresentou resultados melhores do que as funções de distância, em termos de precisão, mas inferiores aos classificadores
Abstract: The biometric identification techniques have evolved increasingly due to the need that humans have to identify people in real time to allow access to certain resources, such as applications and Web services. Facial recognition is a biometric technique that has several advantages over others. Some of these advantages are the use of simple and cheap equipment to obtain the samples and the ability to perform the recognition in covert mode. The face recognition from video is a recent approach in the area of Biometrics. The work in this dissertation aims at comparing different techniques for face recognition from video in order to find the best rates on processing time and accuracy. Another goal is the incorporation of these techniques in the biometric authentication system for E-Learning environments, proposed in an earlier work. We have compared the nearest neighbor classifier using the Euclidean and Mahalanobis distance measures with some other classifiers, such as neural networks (MLP and SOM), k-nearest neighbor, Bayesian classifier, Support Vector Machines (SVM), and Optimum Path Forest (OPF). We have also evaluated the Hidden Markov Model (HMM) approach, as a way of using the temporal information. In the experiments with Recogna Video Database, created especially for this study, and Honda/UCSD Video Database, the classifiers obtained the best accuracy, especially the SVM classifier from the SVM Torch library. HMM, which takes into account temporal information, presented better performance than the distance metrics, but worse than the classifiers
Mestre
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Won-Joon. "Cross-race effect on forensic facial reconstruction and recognition of reconstructed faces." Thesis, University of Dundee, 2012. https://discovery.dundee.ac.uk/en/studentTheses/72dcfcd8-e538-4d3b-98d3-b2c3425c8043.

Full text
Abstract:
Research studies into the reliability of forensic facial reconstruction have focused mainly on the accuracy of facial reconstruction from European or African ancestry skulls. Additionally the recognition of the human face by different racial groups and its effect on practitioners in facial reconstruction has not been considered in those studies. As a result, there is a paucity of research addressing the systemic approach to the accuracy of reconstructed faces produced by practitioners of a ‘different race’ (from the origin of the skull) or the cross-race recognition of the reconstructed faces. The aims of this research are; to investigate whether the ‘cross-race effect’ has any influence on the accuracy of facial reconstruction using both experienced and inexperienced practitioners (‘cross-race effect on reconstructing faces’); to evaluate how much the recognition rate of the facial reconstructions is affected by the cross-race effect (‘cross-race effect on recognizing reconstructed faces’). Fifteen facial reconstructions from three racial type skulls were produced by experienced or trained practitioners who had different racial backgrounds in order to explore the aims. The results demonstrated that the reconstructions from the same race skulls to the practitioners were recognised more accurately by the assessors from three racial groups, and that training and experience in recognising and reconstructing the face from other race can reduce the cross-race effect.
APA, Harvard, Vancouver, ISO, and other styles
9

Ferguson, Eilidh Louise. "Facial identification of children : a test of automated facial recognition and manual facial comparison techniques on juvenile face images." Thesis, University of Dundee, 2015. https://discovery.dundee.ac.uk/en/studentTheses/03679266-9552-45da-9c6d-0f062c4893c8.

Full text
Abstract:
The accurate identification of children from facial photographs could provide a great attribute in the fight against child sexual exploitation, and may also aid in the detection of missing juveniles where comparative material is available. The European Commission is actively pursuing a global alliance for the identification of the victims of child sexual abuse; a task which is considered to be of the utmost importance. Images of child sexual abuse are shared, copied, and distributed online and their origin can be difficult to trace. Current investigations attempting to identify the children within such images appear to focus on the determination of places or geographical regions depicted in these images, from which victims can subsequently be tracked down and identified. Cutting edge technology is also used to detect duplicate images in order to decrease the workload of human operators and dedicate more time to the identification of new victims. Present investigations do not appear to focus on facial information for victim identification. Methods of facial identification already exist for adult individuals, consisting of both automated facial recognition algorithms and manual facial comparison techniques carried out by human operators. Human operator image comparison is presently the only method considered accurate enough to verify a face identity. It is only recently that researchers involved in automated facial recognition have begun to concern themselves with identification spanning childhood. Methods focus on age simulation to match query images with the age of the target database, rather than discrimination of individual faces over age progression. As far as can be determined, this is the first attempt to assess the manual comparison of juvenile faces. This study aimed to create a database of children’s faces from which identification accuracy could be tested using both automated facial recognition and manual facial comparison methods, which already exist for the identification of adults. A state-of-the-art facial recognition algorithm was employed and manual facial comparison was based on current recommendations by the Facial Identification Scientific Working Group (FISWG). It was not known if methods based on adult faces could be successfully extrapolated to juvenile faces, particularly as facial identification is highly susceptible to errors when there is an age difference between images of an individual. In children, the face changes much more rapidly than adults over ageing, due to the rapid growth and development of the juvenile face. The results of this study are in agreement with comparisons of automated and human performance in the identification of adult faces. Overall the automated facial recognition algorithm superseded human ability for identification of juvenile faces, however human performance was higher for the most difficult face pairs. The average accuracy for human image comparison was 61%. There was no significant difference in juvenile identification between individuals with prior experience of adult facial comparison and those with no prior experience. For automated facial recognition a correct identification rate of 71% was achieved at a false acceptance rate of 9%. Despite using methods created for adult facial identification, the results of this study are promising, particularly as they are based on a set of images acquired under uncontrolled conditions, which is known to increase error rates. With further augmentation of the database and investigation into child-specific identification techniques, the ability to accurately identify children from facial images is certainly a future possibility.
APA, Harvard, Vancouver, ISO, and other styles
10

Shostak, Lisa. "Social information processing, emotional face recognition and emotional response style in offending and non-offending adolescents." Thesis, King's College London (University of London), 2007. https://kclpure.kcl.ac.uk/portal/en/theses/social-information-processing-emotional-face-recognition-and-emotional-response-style-in-offending-and-nonoffending-adolescents(15ff1b2d-1e52-46b7-be1a-736098263ce1).html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Face recognition. eng"

1

Andreev, Anatoliy. Personocentrism in classical Russian literature of the XIX century. Dialectics of Artistic Consciousness. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1095050.

Full text
Abstract:
The monograph is devoted to the study of the brightest phenomenon of the world art culture — Russian literature of the "golden age", which was formed as an aristocratic, personocentric literature. Russian Russian literature began to realize its "cultural code", its purpose, which was close to it in spirit; moreover, it unconsciously formed a program for its development, immediately finding its "gold mine": elitist personocentrism as a highly promising vector of culture, which became a decisive factor in the world recognition of Russian literature. The end-to-end plot of the book was the spiritual biography of the" extra person", a person, a personality. The author suggests that the starting point in the Russian cultural identification of the modern type is "Eugene Onegin" by A. S. Pushkin. This novel in verse, which embodied the type of "superfluous", determined not only the specifics and strategy of the development of Russian literature (which is proved by the analysis of the key classical works of the XIX century-from Griboyedov to Chekhov); in fact, it formed a program for the development of modern world literature. For specialists in literature, teachers and students of philological faculties of universities. It will also be useful for cultural scientists, specialists in literary and artistic creativity.
APA, Harvard, Vancouver, ISO, and other styles
2

Buhlmann, Ulrike, and Andrea S. Hartmann. Cognitive and Emotional Processing in Body Dysmorphic Disorder. Edited by Katharine A. Phillips. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190254131.003.0022.

Full text
Abstract:
According to current cognitive-behavioral models, body dysmorphic disorder (BDD) is characterized by a vicious cycle between maladaptive appearance-related thoughts and information-processing biases, as well as maladaptive behaviors and negative emotions such as feelings of shame, disgust, anxiety, and depression. This chapter provides an overview of findings on cognitive characteristics such as dysfunctional beliefs, information-processing biases for threat (e.g., selective attention, interpretation), and implicit associations (e.g., low self-esteem, strong physical attractiveness stereotype, and high importance of attractiveness). The chapter also reviews face recognition abnormalities and emotion recognition deficits and biases (e.g., misinterpreting neutral faces as angry) as well as facial discrimination ability. These studies suggest that BDD is associated with dysfunctional beliefs about one’s own appearance, information-processing biases, emotion recognition deficits and biases, and selective processing of appearance-related information. Future steps to stimulate more research and clinical implications are discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Songster, E. Elena. Panda Diplomacy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199393671.003.0006.

Full text
Abstract:
One of the most salient examples of the giant panda as a national symbol, the phenomenon of offering state-gift pandas to other countries, grew out of the end of the Cultural Revolution era. State-gift pandas were among the most successful efforts by China to paint for itself a new international face as it strove for greater international recognition and integration. These high-profile gifts had a profound effect on the wild panda population. The impact of “panda diplomacy” on China’s wild pandas inspired new protection policies during the 1970s.
APA, Harvard, Vancouver, ISO, and other styles
4

Blandón-Gitlin, Iris, and Amelia Mindthoff. Do Video Recordings Help Jurors Recognize Coercive Influences in Interrogations? Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190658113.003.0010.

Full text
Abstract:
In recognition of the role that false confessions play in wrongful convictions, it is recommended that criminal interrogations be video recorded from beginning to end to document the process by which suspects decide to confess. With a full video recording, it is assumed that jurors can see for themselves whether the defendant was coerced to confess to a crime he or she did not commit. Yet research suggests that video recording may in fact induce bias in interpretations of coercion and confession reliability, as factors like camera angles and close-ups can make confession evidence too vivid and persuasive. Without proper interpretation, even seemingly neutral recordings may unduly influence jurors’ decisions about confessions. This chapter reviews the literature on the usefulness of video-recorded interrogations in assisting jury decision-making, as well as the potential for procedural safeguards (e.g., expert testimony) to improve jurors’ understanding of the issues at hand.
APA, Harvard, Vancouver, ISO, and other styles
5

Bix, Brian H. Private Ordering in Family Law. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198786429.003.0013.

Full text
Abstract:
The chapter begins by clarifying what is meant by ‘private ordering’ in family law—where the primary focus is usually not on the fact of private ordering, but the question of state recognition or enforcement of private choices. Additionally, the analysis considers the distinction between agreements regarding substantive outcomes (e.g. who should have parental rights), and agreements regarding procedure (e.g. having a dispute settled by arbitration). The chapter offers an overview of the moral and policy arguments that had been raised when private ordering had been strongly discouraged (e.g. various social goods, and the protection of vulnerable parties), and the changing arguments being offered now that private ordering is more frequently encouraged, or at least condoned. Finally, the chapter will consider why some forms of private ordering (e.g. separation agreements at divorce) are encouraged, while others (e.g. co-parenting and surrogacy agreements) continue to be treated with suspicion.
APA, Harvard, Vancouver, ISO, and other styles
6

Siklos, Pierre L. Central Banks into the Breach. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190228835.001.0001.

Full text
Abstract:
The book covers the global economy and the various pressures faced by central banks. It also provides some ideas for reforming existing monetary policy strategies. The events of the past fifteen years in monetary policy are essentially the story of two mistakes, one triumph, and the real possibility of another mistake to come. Prior to the global financial crisis, many central bankers were glib about the connection between finance and the real economy. This is partly because the last three decades saw many financial crises with apparently little lasting impact on the global economy. Another mistake was the failure to adequately appreciate how interconnected the world’s financial systems had become. The triumph was the recognition that price stability is a desirable objective. Whether low and stable inflation is the cause or the consequence of economic performance during the past three decades remains hotly debated, however. There is also the prospect of another financial shock to come. The outlook at the end of 2016 is clouded by at least three sets of forces. On the domestic front, central banks face a difficult and protracted exit from ultra-loose monetary policies; it is largely a problem of their own making. There is also an unwillingness to implement needed structural economic reforms that lie outside the scope of monetary policy. On the international front, there is limited appetite for cooperation and differences in views about the proper role and function of central banks. Central banking is not broken, but it is in need of repair.
APA, Harvard, Vancouver, ISO, and other styles
7

Clark, David. Palliative medicine: Historical record and challenges that remain. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780199674282.003.0007.

Full text
Abstract:
With its growing recognition by the early decades of the twentieth century, palliative medicine was moving from the margins to a more central place within medicine. Much had been achieved and there was growing evidence of palliative care’s successes around the world. At the same time, there were ongoing concerns about the quality of the evidence base to support its practices. There were questions about the relationship between palliative care and end-of-life care. There was also the challenge of delivering good care to all who might need it in the face of serious and life-threatening illness in an era of population growth and ageing. There seemed to be many ways to conceptualize and deliver palliative care. Would this lead to global coverage and spread, and what would be the particular role of palliative medicine within the process? This chapter concludes with reflections on progress to date and challenges for the future.
APA, Harvard, Vancouver, ISO, and other styles
8

Waldman, Elisha, and Marcia Glass, eds. A Field Manual for Palliative Care in Humanitarian Crises. Oxford University Press, 2019. http://dx.doi.org/10.1093/med/9780190066529.001.0001.

Full text
Abstract:
For years, humanitarian relief efforts have focused primarily on saving lives. Traditional methods of triage have been employed, and those thought likely to die have been placed in an “expectant” tent or area. Recently however there has been increasing recognition that palliative care should play an essential role in relief efforts. The goal of humanitarian aid really shouldn’t just be saving lives, but should also include management of suffering, regardless of expected outcome. Humanitarian crises come in many forms, each with their own unique set of challenges. The challenges faced in dealing with high-mortality infectious disease outbreaks may differ significantly from those faced dealing with the movement of massive refugee populations or those faced in environmental disasters. In each of these situations, there may be many patients who could potentially benefit from palliative care. In addition to those facing death or disability as a result of the crisis itself (e.g. Ebola) there may be others with preexisting conditions, chronic illnesses, or new injuries who would benefit from incorporation of palliative care. And, of course, there are the psychological, spiritual, and psychosocial wounds that many bear because of these crises, all of which could be helped by incorporation of principles of palliative care into relief efforts. There are simply not enough palliative care specialty-trained clinicians to staff every humanitarian aid mission. To that end we have collaborated with a group of clinicians from around the globe in creating this field manual of palliative care in humanitarian crises, a focused, easy to use guide for incorporating palliative care into international humanitarian aid operations of all sorts. This guide may be used in the field for on-site planning and management, for education of local personnel, and for training purposes in advance of deployment. There remains much work to be done. We hope to someday see more comprehensive textbooks and more formalized training programs to optimize integration of palliative care into humanitarian relief efforts. In the meanwhile, we hope that this manual provides some useful, practical guidance for those undertaking this incredibly important work.
APA, Harvard, Vancouver, ISO, and other styles
9

Quint, David. Getting What You Wish For: A Reading of the Fall. Princeton University Press, 2017. http://dx.doi.org/10.23943/princeton/9780691161914.003.0007.

Full text
Abstract:
This chapter relates the separate falls of Eve and Adam in book 9, respectively, to deeply held wishes that Milton reveals in other writings throughout his career. The fall of Eve grows out of the desire to make trial of an otherwise cloistered virtue and to stand approved in the eyes of God: individual recognition, which Milton uneasily assimilates with the wish for fame. Adam, on the other hand, falls in the name of marital love. Both Eve and Adam have good reasons that go wrong when they disobey God, and their respective wishes—the proof, in Eve's case, of one's solitary spiritual worth and sufficiency, the remedying, in Adam's, of one's social deficiency through human love and companionship—survive and are ratified after the Fall when the couple appear to have switched positions. Adam at the poem's end asserts his vertical dependence on the only God, while Eve declares her love for and inseparability from Adam.
APA, Harvard, Vancouver, ISO, and other styles
10

Wright, Emily M., and Calli M. Cain. Women in Prison. Edited by John Wooldredge and Paula Smith. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199948154.013.9.

Full text
Abstract:
This essay provides some of the general profiles of female inmates across the United States and how they differ from those for male inmates. The unique problems faced by women in prisons that can interfere with their adaptation to confinement (e.g., pregnancies, recent births, separation from children) are described. How histories of physical and sexual abuse can impact institutional adjustment is also discussed in conjunction with a review of “gender-responsive” programs and why some programs should not be used for both men and women. Possible reasons for the rising incarceration rates of women are also considered. Prison administrators should consider making changes to their policies, management styles, and programming or service provisions in order to better respond to women’s unique needs. The future of gender-responsiveness in corrections will likely entail an expanded recognition of gender-responsive needs and, eventually, the implementation of a wide range of services across all correctional systems.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Face recognition. eng"

1

Karasugi, I. Putu Agi, and Williem. "Face Mask Invariant End-to-End Face Recognition." In Computer Vision – ECCV 2020 Workshops, 261–76. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-68238-5_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Reddy, Bhargava, Ye-Hoon Kim, Sojung Yun, Junik Jang, and Soonhyuk Hong. "End to End Deep Learning for Single Step Real-Time Facial Expression Recognition." In Video Analytics. Face and Facial Expression Recognition and Audience Measurement, 88–97. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56687-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Neylan, Christopher A., and Andrea Salgian. "Using Multiple Masks to Improve End-to-End Face Recognition Performance." In Advances in Visual Computing, 329–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89646-3_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Duan, Lijuan, Xuebin Wang, Zhen Yang, Haiyan Zhou, Chunpeng Wu, Qi Zhang, and Jun Miao. "An Emotional Face Evoked EEG Signal Recognition Method Based on Optimal EEG Feature and Electrodes Selection." In Neural Information Processing, 296–305. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24955-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Troeger, Sabine. "Just Societal Transformation: Perspectives of Pastoralists in the Lower Omo Valley in Ethiopia." In African Handbook of Climate Change Adaptation, 1–21. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-42091-8_265-1.

Full text
Abstract:
AbstractPastoralists’ livelihoods in Africa are highly endangered by adverse forces – the climate change being one among those. Against this background, climate change adaptation is conceptualized as strategic agency in the field of risk-laden livelihood environments, that is, agency in the face of risky options and non-calculable uncertainties.The chapter conceptualizes pastoralists’ livelihoods exposed to a four-fold hierarchy of environmental risks and forces defining the actors’ arena of strategic decision making: From the global scale of ever extending impacts by the climate change imperative, to the national scale of government policies in terms of decentralization, challenging people to govern and define their communal efforts in terms of climate change adaptation, and down to the regional scale, which in the presented case is dominated by a large-scale investment, the Kuraz Sugar Development Project, which again confronts local actors with adverse forces toward villagization and eviction from pasture grounds. Right at the end of this hierarchy and in accordance with discourses on “climate services,” the end-users and local actors, the pastoralists, are confronted with and offered a product that they can input into their decision making: cattle feed from the residues of the irrigated sugar cane. The question remains whether substantive aspects of processes turning into true environmental and social justice in terms of recognition, procedures, and distribution will be paid attention to.
APA, Harvard, Vancouver, ISO, and other styles
6

Troeger, Sabine. "Just Societal Transformation: Perspectives of Pastoralists in the Lower Omo Valley in Ethiopia." In African Handbook of Climate Change Adaptation, 1–21. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-42091-8_265-2.

Full text
Abstract:
AbstractPastoralists’ livelihoods in Africa are highly endangered by adverse forces – the climate change being one among those. Against this background, climate change adaptation is conceptualized as strategic agency in the field of risk-laden livelihood environments, that is, agency in the face of risky options and non-calculable uncertainties.The chapter conceptualizes pastoralists’ livelihoods exposed to a four-fold hierarchy of environmental risks and forces defining the actors’ arena of strategic decision making: From the global scale of ever extending impacts by the climate change imperative, to the national scale of government policies in terms of decentralization, challenging people to govern and define their communal efforts in terms of climate change adaptation, and down to the regional scale, which in the presented case is dominated by a large-scale investment, the Kuraz Sugar Development Project, which again confronts local actors with adverse forces toward villagization and eviction from pasture grounds. Right at the end of this hierarchy and in accordance with discourses on “climate services,” the end-users and local actors, the pastoralists, are confronted with and offered a product that they can input into their decision making: cattle feed from the residues of the irrigated sugar cane. The question remains whether substantive aspects of processes turning into true environmental and social justice in terms of recognition, procedures, and distribution will be paid attention to.
APA, Harvard, Vancouver, ISO, and other styles
7

Troeger, Sabine. "Just Societal Transformation: Perspectives of Pastoralists in the Lower Omo Valley in Ethiopia." In African Handbook of Climate Change Adaptation, 2447–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-45106-6_265.

Full text
Abstract:
AbstractPastoralists’ livelihoods in Africa are highly endangered by adverse forces – the climate change being one among those. Against this background, climate change adaptation is conceptualized as strategic agency in the field of risk-laden livelihood environments, that is, agency in the face of risky options and non-calculable uncertainties.The chapter conceptualizes pastoralists’ livelihoods exposed to a four-fold hierarchy of environmental risks and forces defining the actors’ arena of strategic decision making: From the global scale of ever extending impacts by the climate change imperative, to the national scale of government policies in terms of decentralization, challenging people to govern and define their communal efforts in terms of climate change adaptation, and down to the regional scale, which in the presented case is dominated by a large-scale investment, the Kuraz Sugar Development Project, which again confronts local actors with adverse forces toward villagization and eviction from pasture grounds. Right at the end of this hierarchy and in accordance with discourses on “climate services,” the end-users and local actors, the pastoralists, are confronted with and offered a product that they can input into their decision making: cattle feed from the residues of the irrigated sugar cane. The question remains whether substantive aspects of processes turning into true environmental and social justice in terms of recognition, procedures, and distribution will be paid attention to.
APA, Harvard, Vancouver, ISO, and other styles
8

Rodrigues, J. M. F., R. Lam, K. Terzić, and J. M. H. du Buf. "Face and Object Recognition Using Biological Features and Few Views." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 58–77. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-6252-0.ch004.

Full text
Abstract:
In recent years, a large number of impressive face and object recognition algorithms have surfaced, both computational and biologically inspired. Only a few of these can detect face and object views. Empirical studies concerning face and object recognition suggest that faces and objects may be stored in our memory by a few canonical representations. In cortical area V1 exist double-opponent colour blobs, also simple, complex, and end-stopped cells that provide input for a multiscale line and edge representation, keypoints for dynamic feature routing, and saliency maps for Focus-of-Attention. All these combined allow us to segregate faces. Events of different facial views are stored in memory and combined in order to identify the view and recognise a face, including its expression. The authors show that with five 2D views and their cortical representations it is possible to determine the left-right and frontal-lateral-profile views, achieving view-invariant recognition. They also show that the same principle with eight views can be applied to 3D object recognition when they are mainly rotated about the vertical axis. Although object recognition is here explored as a special case of face recognition, it should be stressed that faces and general objects are processed in different ways in the cortex.
APA, Harvard, Vancouver, ISO, and other styles
9

Berretti, Stefano, Alberto del Bimbo, and Pietro Pala. "3D Face Recognition Using Spatial Relations." In Computer Vision, 679–706. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5204-8.ch026.

Full text
Abstract:
Identity recognition using 3D scans of the face has been recently proposed as an alternative or complementary solution to conventional 2D face recognition approaches based on still images or videos. In fact, face representations based on 3D data are expected to be more robust to pose changes and illumination variations than 2D images, thus allowing accurate face recognition in real-world applications with unconstrained acquisition. Based on these premises, in this chapter, the authors first introduce the general and main methodologies for 3D face recognition, shortly reviewing the related literature by distinguishing between global and local approaches. Then, the authors present and discuss two 3D face recognition approaches that are robust to facial expression variations and share the common idea of accounting for the spatial relations between local facial features. In the first approach, the face is partitioned into iso-geodesic stripes and spatial relations are computed by integral measures that capture the relative displacement between the sets of 3D points in each pair of stripes. In the second solution, the face is described by detecting keypoints in the depth map of the face and locally describing them. Then, facial curves on the surface are considered between each pair of keypoints, so as to capture the shape of the face along the curve as well as the relational information between keypoints. Future research directions and conclusions are drawn at the end of the chapter.
APA, Harvard, Vancouver, ISO, and other styles
10

Sanders, Jet G., and Rob Jenkins. "Realistic Masks in the Real World." In Forensic Face Matching, 216–36. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198837749.003.0010.

Full text
Abstract:
Security and crime prevention often rely on facial appearance to connect individuals to behaviours. Hyper-realistic face masks can potentially frustrate this connection by allowing the wearer to look like someone else. In this chapter, we review the evidence that hyper-realistic masks are truly realistic, in the sense that they are accepted as real faces. We begin by outlining relevant experimental studies of face identification and disguise. We then tabulate all criminal cases known to involve hyper-realistic face masks (41 cases between 2009 and 2019). Experimental tests suggest that failures to detect such masks can be attributed to the realism of the masks, without invoking inattention or incompetence on the part of observers. We end with eight proposals for improving mask detection, encompassing training, personnel selection, and machine vision. If the misuse of hyper-realistic masks becomes widespread, our inability to detect them will compromise face recognition infrastructure.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Face recognition. eng"

1

Vazquez, Roberto A., and Humberto Sossa. "Random Features Applied to Face Recognition." In Eighth Mexican International Conference on Current Trends in Computer Science (ENC 2007). IEEE, 2007. http://dx.doi.org/10.1109/enc.2007.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vazquez, Roberto A., and Humberto Sossa. "Random Features Applied to Face Recognition." In Eighth Mexican International Conference on Current Trends in Computer Science (ENC 2007). IEEE, 2007. http://dx.doi.org/10.1109/enc.2007.4351424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Decheng, Nannan Wang, Chunlei Peng, Jie Li, and Xinbo Gao. "Deep Attribute Guided Representation for Heterogeneous Face Recognition." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/116.

Full text
Abstract:
Heterogeneous face recognition (HFR) is a challenging problem in face recognition, subject to large texture and spatial structure differences of face images. Different from conventional face recognition in homogeneous environments, there exist many face images taken from different sources (including different sensors or different mechanisms) in reality. Motivated by human cognitive mechanism, we naturally utilize the explicit invariant semantic information (face attributes) to help address the gap of different modalities. Existing related face recognition methods mostly regard attributes as the high level feature integrated with other engineering features enhancing recognition performance, ignoring the inherent relationship between face attributes and identities. In this paper, we propose a novel deep attribute guided representation based heterogeneous face recognition method (DAG-HFR) without labeling attributes manually. Deep convolutional networks are employed to directly map face images in heterogeneous scenarios to a compact common space where distances mean similarities of pairs. An attribute guided triplet loss (AGTL) is designed to train an end-to-end HFR network which could effectively eliminate defects of incorrectly detected attributes. Extensive experiments on multiple heterogeneous scenarios (composite sketches, resident ID cards) demonstrate that the proposed method achieves superior performances compared with state-of-the-art methods.
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Kai, Dawei Li, Nick Cassimatis, and Xiaolong Wang. "LCANet: End-to-End Lipreading with Cascaded Attention-CTC." In 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018). IEEE, 2018. http://dx.doi.org/10.1109/fg.2018.00088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

He, Zhenliang, Meina Kan, Jie Zhang, Xilin Chen, and Shiguang Shan. "A Fully End-to-End Cascaded CNN for Facial Landmark Detection." In 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017). IEEE, 2017. http://dx.doi.org/10.1109/fg.2017.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cai, Jiancheng, Han Hu, Shiguang Shan, and Xilin Chen. "FCSR-GAN: End-to-end Learning for Joint Face Completion and Super-resolution." In 2019 14th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2019). IEEE, 2019. http://dx.doi.org/10.1109/fg.2019.8756607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aspandi, Decky, Oriol Martinez, Federico Sukno, and Xavier Binefa. "Fully End-to-End Composite Recurrent Convolution Network for Deformable Facial Tracking In The Wild." In 2019 14th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2019). IEEE, 2019. http://dx.doi.org/10.1109/fg.2019.8756630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dou, Pengfei, Shishir K. Shah, and Ioannis A. Kakadiaris. "End-to-End 3D Face Reconstruction with Deep Neural Networks." In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2017. http://dx.doi.org/10.1109/cvpr.2017.164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Comas, Joaquim, Decky Aspandi, and Xavier Binefa. "End-to-end Facial and Physiological Model for Affective Computing and Applications." In 2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020). IEEE, 2020. http://dx.doi.org/10.1109/fg47880.2020.00001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Junjie, Yuntao Liu, RongChun Li, and Yong Dou. "End-to-end Spatial Attention Network with Feature Mimicking for Head Detection." In 2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020). IEEE, 2020. http://dx.doi.org/10.1109/fg47880.2020.00072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography