Improving Alignment of Faces for Recognition
|
|
- Jennifer Jefferson
- 6 years ago
- Views:
Transcription
1 Improving Alignment o Faces or Recognition Md. Kamrul Hasan Département de génie inormatique et génie logiciel École Polytechnique de Montréal, Québec, Canada md-kamrul.hasan@polymtl.ca Christopher J. Pal Département de génie inormatique et génie logiciel École Polytechnique de Montréal, Québec, Canada christopher.pal@polymtl.ca Abstract Face recognition systems or uncontrolled environments oten work through an alignment, eature extraction, and recognition pipeline. Eective alignment o aces is thus crucial as can be an entry point in the process and poor alignments can greatly aect recognition perormance. The task o alignment is particularly diicult when a ace comes rom highly unconstrained environments or so called aces in the wild. A lot o recent research activity has ocused on aces in the wild and even simple similarity or aine transormations have proven both eective and essential to achieving state o the art perormance. In this paper we explore a straightorward, ast and eective approach to aligning aces based on detecting acial landmarks using Haarlike image eatures and a cascade o boosted classiiers. Our approach is reminiscent o widely used ace detection approaches, but ocused on much more detailed eatures o a ace such eye centres, the nose tip and corners o the mouth. This process generates multiple candidates or each landmark and we present a ast and eective iltering strategy allowing us to ind sets o landmarks that are consistent. Our experiments show that this approach can outperorm contemporary methods and easily its into popular processing pipelines or aces in the wild. I. INTRODUCTION The human ace is an important source o biometric inormation. Face recognition is a well studied problem with many practical applications including: document control (digital chip in passports, drivers licenses), transactional authentication (credit cards, ATMs), physical access control (smart doors), law enorcement and police investigations (identiying suspects in security camera video) and security (user access veriication). Given a query or test ace (rom a still image or a video rame) and a database o stored aces, the ace recognition problem can be ormulated in or two dierent scenarios: Identiication: Identiy the person (i they are present) within a database o aces, or Veriication: For a second ace image (rom inside or outside o a database), decide whether these two aces represent the same person or not. The experiments we present in Section III ocus on veriication, the second scenario above; however, our approach should be well suited to improve identiication results as well. In the long history o ace recognition research, numerous evaluation benchmarks have been produced - some o the most important ones are compiled in table I. O particular note is the Face Recognition Vendor Tests (FRVT) [1], which were a set o independent evaluations o commercially available TABLE I IMPORTANT FACE DATABASES Name no o subjects Variations and images FERET 1199; p,il,e,i,o,t AR Face 126; 4000 il,e,o,t Database CMU-PIE 68; 61,368 p,il,e FRGC Database 466; 50,000 il,e,i Caltech ; natural web aces LFW 5749; 13,233 natural PubFig 200; 59,476 natural p: pose, il: illumination, e: expression, i: indoor, o: outdoor, t: time, -: unknown TABLE II THE REDUCTION OF ERROR RATE FOR FERET, AND THE FRVT [1] Year o Evaluation FRR at FAR= (Turk and Pentland 0.79 [2](Partially automatic)) 1997 (FERET 1996) (FRVT 2002) (FRVT 2006) 0.01 and prototype ace recognition technologies conducted by the US government in the years 2000, 2002 and The FRVT is considered to be a very important milestone in ace recognition evaluations; it also includes three previous ace recognition evaluations the FERET evaluations o 1994, 1995 and Table II quantiies the improvement at our key milestones, where, or each milestone, the FRR (False Rejection Rate) at a FAR (False Acceptance Rate) o (1 in 1000) is given or a representative state-o-the-art algorithm [1]. The lowest error rate o 0.01 was achieved by the NV1-norm algorithm (Neven Vision Corporation) on the very high-resolution still images and by V-3D-n algorithm (L-1 Identity Solutions) on the 3D images among. These results were impressive, however, the problem is that the FRVT benchmarks were generated rom controlled environments, and hence are limited in their applicability to natural environments.
2 One might imagine two dierent strategies or obtaining a more realistic assessment o the perormance o a ace recognition system: (i) Test the models independently on dierent subtasks like pose, illumination, expression recognitions, and deduce some collective perormance metric as a sum ; or (ii) Build a dataset that accumulates the possible maximal variability o (pose, expression, aging, illumination, race, occlusion etc.) in the same benchmark, and perormance evaluations are done on it. Labeled Faces in the Wild (LFW)[3] is a dataset that was constructed rom the second view point. Table III(a) shows a set o LFW George W. Bush images rom this benchmark. The inherent natural variability o aces can be veriied rom the examples there. Generally, a ace recognition pipeline or the in the wild setting [4], [5], [6] works through an (1) alignment, (2) eature extraction, and (3) recognition pipeline. Table III (b,c) shows the aligned images o table III (a) with two popular ace aligner: (b) the congealing and unneling [4], and (c) a iducial point based commercial aligner (LFWa dataset) by L. Wol [7]. It can be veriied rom the LFW results site [8] that the best recognition results were achieved on the aligned dataset, compared to the raw images. The eature extraction step o a aces in the wild recognition pipeline typically selects (i) the whole image, or (ii) the ace detection bounding box area (table IV(a)), or (iii) a smaller central patch cut our o aligned images (table IV (b) and (c)). Features are then computed using one o these underlying representations. Examples o the best ace veriication results reported so ar include Descriptor Based Methods in the Wild (DBMW) [9], Cosine Similarity Metric Learning (CSML)[5], and Probabilistic LDA [6]. Most o these methods use the center patch strategy. Top perorming methods on the LFW benchmark have used simple image transormations based on aine or similarity transorms. For example, the LFW benchmark website itsel provides aces that have been aligned using Learned-Miller s congealing algorithm [10]. Most groups posting results to the LFW evaluation have been using aces that have been aligned using congealing as it produces higher perormance results. Some recent work such as [7], has replace the congealing based alignment step with a commercial system and other work such as the CSML approach in [5] use this commercially aligned variant o the LFW data known as LFWa. Irrespective o the alignment method it is common to then simply cut out a central rectangle rom the aligned image orm a rectangular patch used to build eature descriptors. In particular, the DBMW strategy takes LFW-unneled (or congealed) images and crops out a pixel rom the center o the image. The CSML strategy crops a pixel image rom the LFWa commercially aligned imagery. Some example patches or the DBWM and CSML setup are shown in table IV (b,c). We also show the ace bounding box produced by the OpenCV 2.1 ace detector in table IV (a) and some results using our complete method in (c). It is evident TABLE III A SET OF LFW ORIGINAL, CONGEALLED, AND ALIGNED IMAGES (a) (b) (c) (d) LFW image LFW LFWa ours (congealled) (aligned) rom these examples that the center patches sometime miss important ace inormation; one can think o this as noise maniesting as translation and scaling artiacts. The concrete impact o these errors in the alignment is that the central patch o the image can be poorly centred on the ace. In this paper we test our hypothesis that i the alignment step prior to cutting out a central rectangle could be improved, a better eature descriptor could be computed, and thus the recognition perormance could be improved. We also explore what happens we simply do a better job o cutting out the inal rectangle. The remainder o this paper is structured as ollows. In section II, we will briely describe our proposed model. Section III is a compilation o some experiments and the corresponding results. Finally, section IV concludes the paper with some uture research ideas. II. OUR APPROACH Our approach begins by detecting a set o landmarks or iducial points on a ace image using a Viola-Jones style boosted cascade o Haar-like image eatures. This procedure
3 TABLE IV IMAGE PATCHES, USE BY DIFFERENT ALGORITHMS (a) (b) (c) (d) bbox DBMW CSML ours the detected ace is then deined and used to crop the ace out o the original image into a slightly smaller image. We then search within this smaller image or ive acial landmarks : the let eye, the right eye, the nose tip and the two corners o the mouth. To detect these landmarks we have trained ive dierent boosted cascade based classiiers using Haar-like eatures (again using the Viola-Jones inspired implementation ound in OpenCV) using two data sets o labelled iducial points: the BioID database and the PUT [11] database. Previous work using Haar cascade classiiers trained on PUT was able to properly detect and localize eyes 94% o the time with a alse positive rate o 13% using a heuristic procedure or inding eye pairs [12]. In our approach as well the Haar cascade classiiers produce a number o candidates or each o our ive dierent landmarks. We ilter these candidate landmarks and identiy a set o two to three geometrically consistent acial landmarks using the ollowing procedure. A. Fiducial point iltering The iltering pipeline works in two steps. First, a list o easy alse positives are removed through a heuristic rule ilter. A set o simple rules, or example: (i) points within the border area o certain width are discarded, (ii) the nose must not be within the upper 1/3 area o the ace, (iii) The let eye must be within a certain region in the upper let corner, right eye in the top right, (iv) The mouth should be in the lower hal o the ace region are used a rules or this iltering step. The points that make it past the heuristic iltering become the candidate points that which are evaluated under simple probabilistic model or the spatial positions o all points. We estimate the parameters o a diagonal covariance Gaussian model in 2D or the spatial iducial point distributions o points in the PUT database. Figure 1 illustrates the positions o our ive landmarks within the PUT database. Images were scaled to a size o pixels ollowing the LFW ace benchmarking process[13]. will produce multiple candidates or each landmark. We thus need to ilter detections and identiying a set o landmarks that are consistent with a ace. We describe our procedure or doing this in more detail below. Once we have a set o consistent landmarks we can transorm or register the ace into a common coordinate system using a simple aine, similarity or simpler transormation such that when a central patch is cut out o a larger image, this patch is well centred on the ace. When processing new images we use the Viola-Jones ace detector ound in OpenCV to ind aces. In our experiments here multiple ace detections are iltered by selecting the largest ace. A border o approximately one third the height o Fig. 1. The spatial distribution o the ive landmarks used here within the aces o the PUT database. The let eye, right eye, nose tip, let mouth corner and right mouth corner x,y coordinates are shown as black, blue, green, red and yellow markers respectively. Let, the shape o a ace, x (j) be deined through a set o points {x i, y i } n i=1, where (x i, y i ) is the location o a iducial point, and n is the number o points deining the ace. Let, a subset o m points rom those n points constitute a spatial coniguration, (A 1 A 2... A m ). The probability o observing
4 this coniguration is P (A 1 A 2... A m ) = m P (A i ), (1) i=1 where, P (A i ) = N(µ i, Σ i ). I only one category o landmark is detected, our system does nothing. I we detect candidates or our or ewer categories o landmark, we enumerate all candidates and ind the coniguration with maximal probability under our model. I candidates are detected or 5 categories o landmarks, we use a procedure o randomly selecting three dierent landmark categories and enumerate all possible combinations. For each combination o points in the coniguration we compute its probability under our model. The process is repeated a number o times depending on our time constraints (or our experiments here we randomly identiy 10 combinations o three points and enumerate all possible candidates), and identiy the most probable combination. Table V shows the noisy output points, while table VI shows the points that passed the rule ilter, and the white dots are the model outputs. B. Similarity Transormation We use a similarity transormation to register aces and we thus need at least two landmarks to register a ace to a common coordinate rame. Let, [x y] T be the coordinates o a iducial point detected on a ace, and [u v] T be the corresponding reerence point position on a reerence ace that we have computed by taking the average or each landmarks coordinates over the BioID database. A similarity transormation can be represented as [ [ ] [ ] [ ] u m1 m = 2 x tx + (2) v] m 1 y t y m 2 where, [t x t y ] T is the translation parameter vector, m 1 = s cos θ and m 2 = s sin θ, are two other parameters which contain the traditional parameters o rotation, θ and scale, s. This deines the transormation parameter vector, T = [m 1, m 2, t x, t y ] T. To solve or the transormation parameters the problem can be re-ormulated as a system o linear equations x 1 y u 1 y 1 x m 1 v 1 x 2 y y 2 x m 2 t x ty = u 2 v where, (x i, y i ) is a eature point on the observed ace, {x i, y i } n i=1, while (u i, v i ) is the corresponding target point on the latent ace {u i, v i } n i=1. This re-ormulation o a similarity transormation is similar to the commonly used reormulation o an aine transormation as discussed in [14]. We can write the system in matrix notation as Ax = b, such that x = A 1 b. This approach provides the transormation parameters or a correspondance iducial point set between an (3) observed ace and our average or latent ace. These parameters are used to register the unaligned ace to a common coordinate rame. For two reerence points placed in correspondence with a reerence ace one can solve or x exactly; however, or three points (or more), one can obtain a least squares estimate through computing a pseudo inverse, x = (A T A) 1 A T b. Ater transorming the image the inal pixel values in the aligned image are calculated through bi-linear interpolation. Table III (d) shows the aligned George W. Bush images through this methodology. C. Cutting out the central patch This is the inal step o the piple line where, irst, the ace detector is run again on the aligned image. The eye pair locations are used to estimate a reerence point, (x c, y c ). Let, (x le, y le ) and (x re, y re ) be the let and the right eye locations, and W and H be the width and height o the ace window, returned by the ace detector. Then, the ace patch, selected by the model is: {(x c r w W, y c r hu H), (x c + r w W, y c + r hb H)}, where, x c = (x re x le )/2 is the x axis location o the reerence point and y c = (y re y le )/2 is the y axis value, r w is the width actor and r hu and r hb are the height actors. Finally, the selected area is rescaled to a constant size, say, m n. III. EXPERIMENTS AND RESULTS We used Bio-id [15] and PUT[11] datasets or local iducial point classiiers learning, while spatial point distributions were learned rom the PUT[11] dataset. The models were tested or the ace veriication task on the challenging LFW dataset[13]. In addition, the iducial point localization accuracies were tested on an unseen Bio-id dataset. A. Dataset 1) Bio-Id:: This dataset consists o 1521 gray level images o resolution or 23 dierent subjects. The dataset also includes 20 manually marked iducial points on each ace. 2) LFW: LFW dataset comes with three dierent versions: LFW (ununneled): The raw images, as collected. LFW (unneled) : The images were aligned through a pipeline called congealing and unnelling [4]. LFWa : A dataset by L. Wold [7], aligned through a commercial aligner. Each version has two settings: View 1: This data set is or model development, and it comes with a a precise training test split. The training data contains 1100 positive pairs and 1100 negative pairs, while the test data is with 500 positive and 500 negative pairs. Training and test data are mutually exclusive. Although provided in this strict setting, this data could be used as one likes, however the perormance reporting should strictly ollow the ollowing view 2 set up. View 2: This data is is compiled or any perormance reporting. The data contains 10 olded splits, each with 300 positive and 300 negative pairs.
5 TABLE V INITIALLY DETECTED LANDMARKS TABLE VII LOCALIZATION ACCURACIES point accuracy Light eye.081 ±.04 Right eye.086 ±.05 Nose tip.104 ±.06 Let mouth corner.28 ±.2 Right mouth corner.28 ±.2 TABLE VI DETECTED LANDMARKS AFTER FILTERING B. Fiducial point localization For each o the ive iducial points, 1000 positive patches rom the Bio-id dataset and 9000 rom the PUT dataset (centered on each point) were extracted. For each training image, three negative patches rom random locations, exclusive to the positive patch area were extracted rom the same training set. For each o the cases the patch size was set to The iducial point detection model was tested on an unseen dataset o 200 Bio-id images. The euclidean distance between the model output and the actual point normalized by the eye pair distance (reerred to as normalized distance) was used as the eiciency measure, and the results are compiled in table VII. For table III(a) George W. Bush images table VI shows the iducial point outputs (white dots) o the model. The output patches, computed rom these points are shown in table IV(d). For a patch selection, the parameters were used as: {r w = W/4, r hu = W/4, r hb = W/1.75}. C. Face veriication task For the ace veriication task, we implemented the Cosine Similarity Metric Learning Model (CSML)[5]. The basic idea o the CSML model is to calculate the cosine distance (equation 4) between a given pair o aces (x, y ) by irst projecting them to a lower dimensional space through a linear map A, and using a pre-learned threshold, θ to decide whether they are a positive pair or not. CS(x, y, A) = (Ax ) T (Ay ) Ax Ay To learn A, rom n labeled examples, {x (i), y(i), l i} n i=1, where (x (i), y(i) ) is data instance with label l i {+1, 1}, CSML ormulated it as a maximization problem, arg A max (A), and the objective unction (A) is deined as equation (5). The basic idea is to push the positive and negative samples towards the direction +1 and 1 respectively, and maximize the class distance in the Cosine space. The model also added a quadratic regularizer A A 0 2 to control the over itting artiacts. (A) = i P os CS(x (i), y(i), A) α i Neg (4) CS(x (i), y(i), A) β A A 0 2 (5) Table VIII compiles the veriication results or our dierent patch selection strategies: DBMW, the selection strategy rom [9]; CSML, the selection strategy rom[5]; our-lfwa approach, which corresponds to applying our inal central patch cutting strategy on the commercially aligned LFWa images; and ours-aligned, which corresponds to using our complete processing pipeline or alignment and inal patch selection. The DBMW strategy takes LFW-unneled (or congealed) images and crops out a pixel rom the center o the image. The CSML strategy crops a pixel image rom the LFWa commercially aligned imagery. The irst two columns are or two dierent A 0 initializations { PCA, and WPCA} as used in [5], while the third column is or the inal CSML model. We used stochastic gradient ascent with a mini batch size o 20 or A learning, while the parameter θ was chosen to be at p(θ C + ) = p(θ C ), where C + and C are the positive (the same) and negative (not same) classes, modeled through two Gaussian distributions. The test results are or the LFW view-2 test-set, and we used Local Binary Patterns (LBP) as the eature deinition or a ace patch. The LBP descriptors were extracted or a non overlapping block o size 10 10, and concatenated to orm a global LBP descriptor
6 TABLE VIII VERIFICATION RESULTS FOR THREE PATCH SELECTIONS PCA WPCA CSML DBMW.622 ± ± ±.007 CSML.693 ± ± ±.005 ours-lfwa.700 ± ± ±.005 ours-aligned.688 ± ± ±.007 vector. The LBP eatures were irst reduced to a dimension o 500 by Principal Component Analysis(PCA), beore putting into the CSML ramework. From table VIII we see that our iducial point based patch selection methodology worked better than the conventional centralized patch based ace veriiers. Qualitatively the ace alignment pipeline had close perormance to the commercially available aligner. However, our approach and implementation here ailed to align 10% o the images due to 0 or 1 local point class detections. This may have caused the slightly poorer perormance o ours-aligned vs. ours-lfwa in table VIII. We hypothesize that an improvement in the local classiier and/or deining more iducial point classes may solve this problem, and thus might boost alignment pipeline. Generally, Haar-cascades output a window containing an object o interest (or example, a ace). For iducial point localizations, we hypothesized that the center o a output patch is the output point. We believe that this resulted in some localizations (or example, the mouth corners) to be more error prone than others (or example, the eyes) that have distinctive localization details. These results can be veriied rom table VII. IV. CONCLUSIONS In this paper we have presented a model to localize a consistent set o landmarks or iducial points on a ace image. The primary goal o these localizations was to then align aces to a common coordinate rame and reduce translation, rotation and scaling artiacts that impact the quality o subsequent descriptor based representations o the ace. Accordingly, ive Haar-cascades classiiers were trained and a simple probabilistic model was used to clean away alse positives and determine a similarity transormation based alignment. Based on our analysis we believe a promising direction or uture research would be to increase the number o landmarks or iducial points that could be detected in the irst phase o our ramework. However, as more landmark classes are added, the task o searching or a set o consistent landmarks becomes more time consuming. Thus a more sophisticated search strategy would also be needed. Further, or more precise spatial localization o such landmarks we believe some sort o spatially localized search within the Haar-cascade s output region could be a promising direction. Finally, we would like to improve the iltering pipeline by a more sophisticated probabilistic model. ACKNOWLEDGMENT This work was supported in part by grants rom the Natural Sciences and Engineering Research Council (NSERC) o Canada and through a Google Research award to CJP. The authors would like to thank David Rim or his ruitul suggestions and discussions. REFERENCES [1] Face recognition vendor test (rvt), 2007, [2] M. Turk and A. Pentland, Eigenaces or recognition, Journal o Cognitive Neuroscience, vol. 3, no. 1, pp , [3] G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, Labeled aces in the wild: A database or studying ace recognition in unconstrained environments, University o Massachusetts, Amherst, Tech. Rep , October [4] G. B. Huang, V. Jain, and E. Learned-Miller., Unsupervised joint alignment o complex images, in International Conerence on Computer Vision (ICCV), Rio de Janeiro, Brazil, 2007, pp [5] H. V. Nguyen and L. Bai, Cosine similarity metric learning or ace veriication, in ACCV (2), 2010, pp [6] S. Prince, P. Li, Y. Fu, U. Mohammed, and J. Elder, Probabilistic models or inerence about identity, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 99, no. PrePrints, [7] L. Wol, T. Hassner, and Y. Taigman, Similarity scores based on background samples, in Proc. o ACCV, [8] Labeled aces in the wild (lw) [9] L. Wol, T. Hassner, and Y. Taigman, Descriptor based methods in the wild, in Real-Lie Images workshop at the European Conerence on Computer Vision (ECCV), Marseille, France, October [Online]. Available: [10] E. Learned-Miller, Data driven image models through continuous joint alignment, IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), vol. 28, no. 2, pp , [11] A. Kasinski, A. Florek, and A. Schmidt, The put ace database, Image Processing and Communications, vol. 13, no. 3, pp , [12] A. Kasinski and A. Schmidt, The architecture and perormance o the ace and eyes detection system based on the haar cascade classiiers, Pattern Analysis and Applications, vol. 13, pp , [13] G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, Labeled aces in the wild: A database or studying ace recognition in unconstrained environments, University o Massachusetts, Amherst, Tech. Rep , October [14] D. G. Lowe, Distinctive image eatures rom scale-invariant keypoints, International Journal o Computer Vision, vol. 60, no. 2, pp , [15] The bioid database, 2010,
Learning to Recognize Faces in Realistic Conditions
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION
ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION Phuong-Trinh Pham-Ngoc, Quang-Linh Huynh Department o Biomedical Engineering, Faculty o Applied Science, Hochiminh University o Technology,
More informationCS485/685 Computer Vision Spring 2012 Dr. George Bebis Programming Assignment 2 Due Date: 3/27/2012
CS8/68 Computer Vision Spring 0 Dr. George Bebis Programming Assignment Due Date: /7/0 In this assignment, you will implement an algorithm or normalizing ace image using SVD. Face normalization is a required
More informationNeighbourhood Operations
Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle
More informationFace Recognition using Hough Peaks extracted from the significant blocks of the Gradient Image
Face Recognition using Hough Peaks extracted rom the signiicant blocks o the Gradient Image Arindam Kar 1, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu 1 Indian Statistical
More informationA Robust Elastic and Partial Matching Metric for Face Recognition
A Robust Elastic and Partial Matching Metric or Face Recognition Gang Hua Amir Akbarzadeh Microsot Corporate One Microsot Way, Redmond, WA 9852 {ganghua, amir}@microsot.com Abstract We present a robust
More informationMAPI Computer Vision. Multiple View Geometry
MAPI Computer Vision Multiple View Geometry Geometry o Multiple Views 2- and 3- view geometry p p Kpˆ [ K R t]p Geometry o Multiple Views 2- and 3- view geometry Epipolar Geometry The epipolar geometry
More informationFace detection and recognition. Detection Recognition Sally
Face detection and recognition Detection Recognition Sally Face detection & recognition Viola & Jones detector Available in open CV Face recognition Eigenfaces for face recognition Metric learning identification
More informationGeneric Face Alignment Using an Improved Active Shape Model
Generic Face Alignment Using an Improved Active Shape Model Liting Wang, Xiaoqing Ding, Chi Fang Electronic Engineering Department, Tsinghua University, Beijing, China {wanglt, dxq, fangchi} @ocrserv.ee.tsinghua.edu.cn
More informationSkin and Face Detection
Skin and Face Detection Linda Shapiro EE/CSE 576 1 What s Coming 1. Review of Bakic flesh detector 2. Fleck and Forsyth flesh detector 3. Details of Rowley face detector 4. Review of the basic AdaBoost
More informationCS 223B Computer Vision Problem Set 3
CS 223B Computer Vision Problem Set 3 Due: Feb. 22 nd, 2011 1 Probabilistic Recursion for Tracking In this problem you will derive a method for tracking a point of interest through a sequence of images.
More informationSUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN
SUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN Tsz Chun Ho and Bing Zeng Department o Electronic and Computer Engineering The Hong Kong University o Science
More informationCS 231A Computer Vision (Fall 2012) Problem Set 3
CS 231A Computer Vision (Fall 2012) Problem Set 3 Due: Nov. 13 th, 2012 (2:15pm) 1 Probabilistic Recursion for Tracking (20 points) In this problem you will derive a method for tracking a point of interest
More informationProbabilistic Facial Feature Extraction Using Joint Distribution of Location and Texture Information
Probabilistic Facial Feature Extraction Using Joint Distribution of Location and Texture Information Mustafa Berkay Yilmaz, Hakan Erdogan, Mustafa Unel Sabanci University, Faculty of Engineering and Natural
More informationImage Processing. Image Features
Image Processing Image Features Preliminaries 2 What are Image Features? Anything. What they are used for? Some statements about image fragments (patches) recognition Search for similar patches matching
More informationRoad Sign Analysis Using Multisensory Data
Road Sign Analysis Using Multisensory Data R.J. López-Sastre, S. Lauente-Arroyo, P. Gil-Jiménez, P. Siegmann, and S. Maldonado-Bascón University o Alcalá, Department o Signal Theory and Communications
More informationFig. 3.1: Interpolation schemes for forward mapping (left) and inverse mapping (right, Jähne, 1997).
Eicken, GEOS 69 - Geoscience Image Processing Applications, Lecture Notes - 17-3. Spatial transorms 3.1. Geometric operations (Reading: Castleman, 1996, pp. 115-138) - a geometric operation is deined as
More informationChapter 3 Image Enhancement in the Spatial Domain
Chapter 3 Image Enhancement in the Spatial Domain Yinghua He School o Computer Science and Technology Tianjin University Image enhancement approaches Spatial domain image plane itsel Spatial domain methods
More informationFace detection and recognition. Many slides adapted from K. Grauman and D. Lowe
Face detection and recognition Many slides adapted from K. Grauman and D. Lowe Face detection and recognition Detection Recognition Sally History Early face recognition systems: based on features and distances
More informationDescribable Visual Attributes for Face Verification and Image Search
Advanced Topics in Multimedia Analysis and Indexing, Spring 2011, NTU. 1 Describable Visual Attributes for Face Verification and Image Search Kumar, Berg, Belhumeur, Nayar. PAMI, 2011. Ryan Lei 2011/05/05
More informationExperiments on Visual Information Extraction with the Faces of Wikipedia
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Experiments on Visual Information Extraction with the Faces of Wikipedia Md. Kamrul Hasan and Christopher Pal Département de
More informationImage Processing Pipeline for Facial Expression Recognition under Variable Lighting
Image Processing Pipeline for Facial Expression Recognition under Variable Lighting Ralph Ma, Amr Mohamed ralphma@stanford.edu, amr1@stanford.edu Abstract Much research has been done in the field of automated
More informationLarge-scale Datasets: Faces with Partial Occlusions and Pose Variations in the Wild
Large-scale Datasets: Faces with Partial Occlusions and Pose Variations in the Wild Tarik Alafif, Zeyad Hailat, Melih Aslan and Xuewen Chen Computer Science Department, Wayne State University Detroit,
More informationFace and Nose Detection in Digital Images using Local Binary Patterns
Face and Nose Detection in Digital Images using Local Binary Patterns Stanko Kružić Post-graduate student University of Split, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture
More informationAn Associate-Predict Model for Face Recognition FIPA Seminar WS 2011/2012
An Associate-Predict Model for Face Recognition FIPA Seminar WS 2011/2012, 19.01.2012 INSTITUTE FOR ANTHROPOMATICS, FACIAL IMAGE PROCESSING AND ANALYSIS YIG University of the State of Baden-Wuerttemberg
More informationSIFT: SCALE INVARIANT FEATURE TRANSFORM SURF: SPEEDED UP ROBUST FEATURES BASHAR ALSADIK EOS DEPT. TOPMAP M13 3D GEOINFORMATION FROM IMAGES 2014
SIFT: SCALE INVARIANT FEATURE TRANSFORM SURF: SPEEDED UP ROBUST FEATURES BASHAR ALSADIK EOS DEPT. TOPMAP M13 3D GEOINFORMATION FROM IMAGES 2014 SIFT SIFT: Scale Invariant Feature Transform; transform image
More informationBetter than best: matching score based face registration
Better than best: based face registration Luuk Spreeuwers University of Twente Fac. EEMCS, Signals and Systems Group Hogekamp Building, 7522 NB Enschede The Netherlands l.j.spreeuwers@ewi.utwente.nl Bas
More informationarxiv: v1 [cs.cv] 4 Aug 2011
arxiv:1108.1122v1 [cs.cv] 4 Aug 2011 Leveraging Billions of Faces to Overcome Performance Barriers in Unconstrained Face Recognition Yaniv Taigman and Lior Wolf face.com {yaniv, wolf}@face.com Abstract
More informationOut-of-Plane Rotated Object Detection using Patch Feature based Classifier
Available online at www.sciencedirect.com Procedia Engineering 41 (2012 ) 170 174 International Symposium on Robotics and Intelligent Sensors 2012 (IRIS 2012) Out-of-Plane Rotated Object Detection using
More informationA Study on Similarity Computations in Template Matching Technique for Identity Verification
A Study on Similarity Computations in Template Matching Technique for Identity Verification Lam, S. K., Yeong, C. Y., Yew, C. T., Chai, W. S., Suandi, S. A. Intelligent Biometric Group, School of Electrical
More informationCombined model for detecting, localizing, interpreting and recognizing faces
Combined model for detecting, localizing, interpreting and recognizing faces Leonid Karlinsky, Michael Dinerstein, Dan Levi, Shimon Ullman To cite this version: Leonid Karlinsky, Michael Dinerstein, Dan
More informationA GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION
A GENERIC FACE REPRESENTATION APPROACH FOR LOCAL APPEARANCE BASED FACE VERIFICATION Hazim Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs, Universität Karlsruhe (TH) 76131 Karlsruhe, Germany
More informationAutomatic Video Segmentation for Czech TV Broadcast Transcription
Automatic Video Segmentation or Czech TV Broadcast Transcription Jose Chaloupka Laboratory o Computer Speech Processing, Institute o Inormation Technology and Electronics Technical University o Liberec
More informationSupplementary Material for Synthesizing Normalized Faces from Facial Identity Features
Supplementary Material for Synthesizing Normalized Faces from Facial Identity Features Forrester Cole 1 David Belanger 1,2 Dilip Krishnan 1 Aaron Sarna 1 Inbar Mosseri 1 William T. Freeman 1,3 1 Google,
More informationGlobal fitting of a facial model to facial features for model based video coding
Global fitting of a facial model to facial features for model based video coding P M Hillman J M Hannah P M Grant University of Edinburgh School of Engineering and Electronics Sanderson Building, King
More information1.2 Related Work. Panoramic Camera PTZ Dome Camera
3rd International Conerence on Multimedia Technology ICMT 2013) A SPATIAL CALIBRATION METHOD BASED ON MASTER-SLAVE CAMERA Hao Shi1, Yu Liu, Shiming Lai, Maojun Zhang, Wei Wang Abstract. Recently the Master-Slave
More informationFace detection, validation and tracking. Océane Esposito, Grazina Laurinaviciute, Alexandre Majetniak
Face detection, validation and tracking Océane Esposito, Grazina Laurinaviciute, Alexandre Majetniak Agenda Motivation and examples Face detection Face validation Face tracking Conclusion Motivation Goal:
More informationCHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS
CHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS As explained previously in the scope, this thesis will also create a prototype about face recognition system. The face recognition system itself has several
More informationLarge-Scale Traffic Sign Recognition based on Local Features and Color Segmentation
Large-Scale Traffic Sign Recognition based on Local Features and Color Segmentation M. Blauth, E. Kraft, F. Hirschenberger, M. Böhm Fraunhofer Institute for Industrial Mathematics, Fraunhofer-Platz 1,
More informationBinary Morphological Model in Refining Local Fitting Active Contour in Segmenting Weak/Missing Edges
0 International Conerence on Advanced Computer Science Applications and Technologies Binary Morphological Model in Reining Local Fitting Active Contour in Segmenting Weak/Missing Edges Norshaliza Kamaruddin,
More informationNOWADAYS, there are many human jobs that can. Face Recognition Performance in Facing Pose Variation
CommIT (Communication & Information Technology) Journal 11(1), 1 7, 2017 Face Recognition Performance in Facing Pose Variation Alexander A. S. Gunawan 1 and Reza A. Prasetyo 2 1,2 School of Computer Science,
More informationKey properties of local features
Key properties of local features Locality, robust against occlusions Must be highly distinctive, a good feature should allow for correct object identification with low probability of mismatch Easy to etract
More informationMobile Face Recognization
Mobile Face Recognization CS4670 Final Project Cooper Bills and Jason Yosinski {csb88,jy495}@cornell.edu December 12, 2010 Abstract We created a mobile based system for detecting faces within a picture
More informationCriminal Identification System Using Face Detection and Recognition
Criminal Identification System Using Face Detection and Recognition Piyush Kakkar 1, Mr. Vibhor Sharma 2 Information Technology Department, Maharaja Agrasen Institute of Technology, Delhi 1 Assistant Professor,
More informationCombining Classifier for Face Identification at Unknown Views with a Single Model Image
Combining Classiier or Face Identiication at Unknown Views with a Single Model Image Tae-Kyun Kim 1 and Jose Kittler 2 1 HCI Lab., Samsung Advanced Institute o Technology, Yongin, Korea taekyun@sait.samsung.co.kr
More informationDetecting Multiple Symmetries with Extended SIFT
1 Detecting Multiple Symmetries with Extended SIFT 2 3 Anonymous ACCV submission Paper ID 388 4 5 6 7 8 9 10 11 12 13 14 15 16 Abstract. This paper describes an effective method for detecting multiple
More informationMethod estimating reflection coefficients of adaptive lattice filter and its application to system identification
Acoust. Sci. & Tech. 28, 2 (27) PAPER #27 The Acoustical Society o Japan Method estimating relection coeicients o adaptive lattice ilter and its application to system identiication Kensaku Fujii 1;, Masaaki
More informationFace/Flesh Detection and Face Recognition
Face/Flesh Detection and Face Recognition Linda Shapiro EE/CSE 576 1 What s Coming 1. Review of Bakic flesh detector 2. Fleck and Forsyth flesh detector 3. Details of Rowley face detector 4. The Viola
More informationPatch-based Object Recognition. Basic Idea
Patch-based Object Recognition 1! Basic Idea Determine interest points in image Determine local image properties around interest points Use local image properties for object classification Example: Interest
More informationSubject-Oriented Image Classification based on Face Detection and Recognition
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 14th International Conference of the Biometrics Special Interest Group, BIOSIG, Darmstadt, Germany, 9-11 September,
More informationFace recognition using SURF features
ace recognition using SUR features Geng Du*, ei Su, Anni Cai Multimedia Communication and Pattern Recognition Labs, School of Information and Telecommunication Engineering, Beijing University of Posts
More informationSelection of Scale-Invariant Parts for Object Class Recognition
Selection of Scale-Invariant Parts for Object Class Recognition Gy. Dorkó and C. Schmid INRIA Rhône-Alpes, GRAVIR-CNRS 655, av. de l Europe, 3833 Montbonnot, France fdorko,schmidg@inrialpes.fr Abstract
More informationClassifier Evasion: Models and Open Problems
Classiier Evasion: Models and Open Problems Blaine Nelson 1, Benjamin I. P. Rubinstein 2, Ling Huang 3, Anthony D. Joseph 1,3, and J. D. Tygar 1 1 UC Berkeley 2 Microsot Research 3 Intel Labs Berkeley
More informationIntegral Channel Features with Random Forest for 3D Facial Landmark Detection
MSc Artificial Intelligence Track: Computer Vision Master Thesis Integral Channel Features with Random Forest for 3D Facial Landmark Detection by Arif Qodari 10711996 February 2016 42 EC Supervisor/Examiner:
More informationObject Tracking with Dynamic Feature Graph
Object Tracking with Dynamic Feature Graph Feng Tang and Hai Tao Department o Computer Engineering, University o Caliornia, Santa Cruz {tang,tao}@soe.ucsc.edu Abstract Two major problems or model-based
More informationFast Face Detection Assisted with Skin Color Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. II (Jul.-Aug. 2016), PP 70-76 www.iosrjournals.org Fast Face Detection Assisted with Skin Color
More informationFace Recognition using SURF Features and SVM Classifier
International Journal of Electronics Engineering Research. ISSN 0975-6450 Volume 8, Number 1 (016) pp. 1-8 Research India Publications http://www.ripublication.com Face Recognition using SURF Features
More informationFacial Landmarks Detection Based on Correlation Filters
Facial Landmarks Detection Based on Correlation Filters Gabriel M. Araujo 1, Waldir S. S. Júnior 1,2, Eduardo A. B. Silva 1 and Siome K. Goldenstein 3 1 PEE-COPPE/DEL-Poli, Federal University of Rio de
More informationFace Detection on OpenCV using Raspberry Pi
Face Detection on OpenCV using Raspberry Pi Narayan V. Naik Aadhrasa Venunadan Kumara K R Department of ECE Department of ECE Department of ECE GSIT, Karwar, Karnataka GSIT, Karwar, Karnataka GSIT, Karwar,
More informationWhat is Clustering? Clustering. Characterizing Cluster Methods. Clusters. Cluster Validity. Basic Clustering Methodology
Clustering Unsupervised learning Generating classes Distance/similarity measures Agglomerative methods Divisive methods Data Clustering 1 What is Clustering? Form o unsupervised learning - no inormation
More informationObject Recognition Algorithms for Computer Vision System: A Survey
Volume 117 No. 21 2017, 69-74 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Object Recognition Algorithms for Computer Vision System: A Survey Anu
More informationReflection and Refraction
Relection and Reraction Object To determine ocal lengths o lenses and mirrors and to determine the index o reraction o glass. Apparatus Lenses, optical bench, mirrors, light source, screen, plastic or
More informationA Hybrid Face Detection System using combination of Appearance-based and Feature-based methods
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.5, May 2009 181 A Hybrid Face Detection System using combination of Appearance-based and Feature-based methods Zahra Sadri
More informationFace Recognition in Unconstrained Environments: A Comparative Study
Face Recognition in Unconstrained Environments: A Comparative Study Rodrigo Verschae, Javier Ruiz-Del-Solar, Mauricio Correa To cite this version: Rodrigo Verschae, Javier Ruiz-Del-Solar, Mauricio Correa.
More informationStudy of Viola-Jones Real Time Face Detector
Study of Viola-Jones Real Time Face Detector Kaiqi Cen cenkaiqi@gmail.com Abstract Face detection has been one of the most studied topics in computer vision literature. Given an arbitrary image the goal
More informationImage Features: Local Descriptors. Sanja Fidler CSC420: Intro to Image Understanding 1/ 58
Image Features: Local Descriptors Sanja Fidler CSC420: Intro to Image Understanding 1/ 58 [Source: K. Grauman] Sanja Fidler CSC420: Intro to Image Understanding 2/ 58 Local Features Detection: Identify
More informationReal-Time Model-Based Hand Localization for Unsupervised Palmar Image Acquisition
Real-Time Model-Based Hand Localization for Unsupervised Palmar Image Acquisition Ivan Fratric 1, Slobodan Ribaric 1 1 University of Zagreb, Faculty of Electrical Engineering and Computing, Unska 3, 10000
More informationHand Posture Recognition Using Adaboost with SIFT for Human Robot Interaction
Hand Posture Recognition Using Adaboost with SIFT for Human Robot Interaction Chieh-Chih Wang and Ko-Chih Wang Department of Computer Science and Information Engineering Graduate Institute of Networking
More informationFace Recognition At-a-Distance Based on Sparse-Stereo Reconstruction
Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction Ham Rara, Shireen Elhabian, Asem Ali University of Louisville Louisville, KY {hmrara01,syelha01,amali003}@louisville.edu Mike Miller,
More informationEE368 Project Report CD Cover Recognition Using Modified SIFT Algorithm
EE368 Project Report CD Cover Recognition Using Modified SIFT Algorithm Group 1: Mina A. Makar Stanford University mamakar@stanford.edu Abstract In this report, we investigate the application of the Scale-Invariant
More informationVideo Google faces. Josef Sivic, Mark Everingham, Andrew Zisserman. Visual Geometry Group University of Oxford
Video Google faces Josef Sivic, Mark Everingham, Andrew Zisserman Visual Geometry Group University of Oxford The objective Retrieve all shots in a video, e.g. a feature length film, containing a particular
More informationLarger K-maps. So far we have only discussed 2 and 3-variable K-maps. We can now create a 4-variable map in the
EET 3 Chapter 3 7/3/2 PAGE - 23 Larger K-maps The -variable K-map So ar we have only discussed 2 and 3-variable K-maps. We can now create a -variable map in the same way that we created the 3-variable
More informationObject and Class Recognition I:
Object and Class Recognition I: Object Recognition Lectures 10 Sources ICCV 2005 short courses Li Fei-Fei (UIUC), Rob Fergus (Oxford-MIT), Antonio Torralba (MIT) http://people.csail.mit.edu/torralba/iccv2005
More informationA Real Time Facial Expression Classification System Using Local Binary Patterns
A Real Time Facial Expression Classification System Using Local Binary Patterns S L Happy, Anjith George, and Aurobinda Routray Department of Electrical Engineering, IIT Kharagpur, India Abstract Facial
More informationDistribution Fields with Adaptive Kernels for Large Displacement Image Alignment
MEARS et al.: DISTRIBUTION FIELDS WITH ADAPTIVE KERNELS 1 Distribution Fields with Adaptive Kernels or Large Displacement Image Alignment Benjamin Mears bmears@cs.umass.edu Laura Sevilla Lara bmears@cs.umass.edu
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationEye Detection by Haar wavelets and cascaded Support Vector Machine
Eye Detection by Haar wavelets and cascaded Support Vector Machine Vishal Agrawal B.Tech 4th Year Guide: Simant Dubey / Amitabha Mukherjee Dept of Computer Science and Engineering IIT Kanpur - 208 016
More informationAn MKD-SRC Approach for Face Recognition from Partial Image
An MKD-SRC Approach for Face Recognition from Partial Image Mr.S.Krishnaraj 1, Mr. M. V. Prabhakaran 2 M.E. Computer science Dept, Adhiparasakthi college of Engineering, Melmaruvathur, Chennai, India 1,
More informationROBUST PARTIAL FACE RECOGNITION USING INSTANCE-TO-CLASS DISTANCE
ROBUST PARTIAL FACE RECOGNITION USING INSTANCE-TO-CLASS DISTANCE Junlin Hu 1, Jiwen Lu 2, and Yap-Peng Tan 1 1 School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore
More informationRobust PDF Table Locator
Robust PDF Table Locator December 17, 2016 1 Introduction Data scientists rely on an abundance of tabular data stored in easy-to-machine-read formats like.csv files. Unfortunately, most government records
More informationFace Recognition using Eigenfaces SMAI Course Project
Face Recognition using Eigenfaces SMAI Course Project Satarupa Guha IIIT Hyderabad 201307566 satarupa.guha@research.iiit.ac.in Ayushi Dalmia IIIT Hyderabad 201307565 ayushi.dalmia@research.iiit.ac.in Abstract
More informationSemi-Supervised PCA-based Face Recognition Using Self-Training
Semi-Supervised PCA-based Face Recognition Using Self-Training Fabio Roli and Gian Luca Marcialis Dept. of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi, 09123 Cagliari, Italy
More information521466S Machine Vision Exercise #1 Camera models
52466S Machine Vision Exercise # Camera models. Pinhole camera. The perspective projection equations or a pinhole camera are x n = x c, = y c, where x n = [x n, ] are the normalized image coordinates,
More informationChapter 3 Image Registration. Chapter 3 Image Registration
Chapter 3 Image Registration Distributed Algorithms for Introduction (1) Definition: Image Registration Input: 2 images of the same scene but taken from different perspectives Goal: Identify transformation
More informationFace Image Quality Assessment for Face Selection in Surveillance Video using Convolutional Neural Networks
Face Image Quality Assessment for Face Selection in Surveillance Video using Convolutional Neural Networks Vignesh Sankar, K. V. S. N. L. Manasa Priya, Sumohana Channappayya Indian Institute of Technology
More informationLocal Features: Detection, Description & Matching
Local Features: Detection, Description & Matching Lecture 08 Computer Vision Material Citations Dr George Stockman Professor Emeritus, Michigan State University Dr David Lowe Professor, University of British
More informationDiscovering Visual Hierarchy through Unsupervised Learning Haider Razvi
Discovering Visual Hierarchy through Unsupervised Learning Haider Razvi hrazvi@stanford.edu 1 Introduction: We present a method for discovering visual hierarchy in a set of images. Automatically grouping
More informationComputer Data Analysis and Use of Excel
Computer Data Analysis and Use o Excel I. Theory In this lab we will use Microsot EXCEL to do our calculations and error analysis. This program was written primarily or use by the business community, so
More informationGesture Recognition using a Probabilistic Framework for Pose Matching
Gesture Recognition using a Probabilistic Framework or Pose Matching Ahmed Elgammal Vinay Shet Yaser Yacoob Larry S. Davis Computer Vision Laboratory University o Maryland College Park MD 20742 USA elgammalvinayyaserlsd
More informationLOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM
LOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM Hazim Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs, University of Karlsruhe Am Fasanengarten 5, 76131, Karlsruhe, Germany
More informationIntensity-Depth Face Alignment Using Cascade Shape Regression
Intensity-Depth Face Alignment Using Cascade Shape Regression Yang Cao 1 and Bao-Liang Lu 1,2 1 Center for Brain-like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai
More informationAn Efficient Configuration Methodology for Time-Division Multiplexed Single Resources
An Eicient Coniguration Methodology or Time-Division Multiplexed Single Resources Benny Akesson 1, Anna Minaeva 1, Přemysl Šůcha 1, Andrew Nelson 2 and Zdeněk Hanzálek 1 1 Czech Technical University in
More informationResearch on Image Splicing Based on Weighted POISSON Fusion
Research on Image Splicing Based on Weighted POISSO Fusion Dan Li, Ling Yuan*, Song Hu, Zeqi Wang School o Computer Science & Technology HuaZhong University o Science & Technology Wuhan, 430074, China
More informationTIED FACTOR ANALYSIS FOR FACE RECOGNITION ACROSS LARGE POSE DIFFERENCES
TIED FACTOR ANALYSIS FOR FACE RECOGNITION ACROSS LARGE POSE DIFFERENCES SIMON J.D. PRINCE, JAMES H. ELDER, JONATHAN WARRELL, FATIMA M. FELISBERTI IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE,
More informationMobile Human Detection Systems based on Sliding Windows Approach-A Review
Mobile Human Detection Systems based on Sliding Windows Approach-A Review Seminar: Mobile Human detection systems Njieutcheu Tassi cedrique Rovile Department of Computer Engineering University of Heidelberg
More informationMORPH-II: Feature Vector Documentation
MORPH-II: Feature Vector Documentation Troy P. Kling NSF-REU Site at UNC Wilmington, Summer 2017 1 MORPH-II Subsets Four different subsets of the MORPH-II database were selected for a wide range of purposes,
More informationClassification Method for Colored Natural Textures Using Gabor Filtering
Classiication Method or Colored Natural Textures Using Gabor Filtering Leena Lepistö 1, Iivari Kunttu 1, Jorma Autio 2, and Ari Visa 1, 1 Tampere University o Technology Institute o Signal Processing P.
More informationDimension Reduction CS534
Dimension Reduction CS534 Why dimension reduction? High dimensionality large number of features E.g., documents represented by thousands of words, millions of bigrams Images represented by thousands of
More informationDesigning Applications that See Lecture 7: Object Recognition
stanford hci group / cs377s Designing Applications that See Lecture 7: Object Recognition Dan Maynes-Aminzade 29 January 2008 Designing Applications that See http://cs377s.stanford.edu Reminders Pick up
More information