Conferences related to Face Recognition

Back to Top

2016 IEEE International Conference on Image Processing (ICIP)

Signal processing, image processing, biomedical imaging, multimedia, video, multidemensional.


2013 10th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2013)

The IEEE conference on Automatic Face and Gesture Recognition is the premier international forum for research in image and video- based face, gesture, and body movement recognition. Its broad scope includes advances in fundamental computer vision, pattern recognition, computer graphics, and machine learning techniques relevant to face, gesture, and body action, new algorithms, and analysis of specific applications. The program will be single- track with poster sessions. Submissions will be rigorously reviewed and should clearly make the case for a documented improvement over the existing state of the art.


2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)

The conference will address, but is not limited to, the following topics:• Computational and psychological models of emotion;• Affect in arts entertainment and multimedia;• Bodily manifestations of affect (facial expressions, posture, behavior, physiology);• Databases for emotion processing, development and issues;• Affective interfaces and applications (games, learning, dialogue systems…);• Ecological and continuous emotion assessment;• Affect in social interactions.

  • 2009 3rd International Conference on Affective Computing and Intelligent Interaction (ACII 2009)

    The conference series on Affective Computing and Intelligent Interaction is the premier international forum for state of the art in research on affective and multi modal human-machine interaction and systems. Every other year the ACII conference plays an important role in shaping related scientific, academic, and higher education programs. This year, we are especially soliciting papers discussing Enabling Behavioral and Socially-Aware Human-Machine Interfaces in areas including psychology.


2013 IEEE 11th International Conference on Electronic Measurement & Instruments (ICEMI)

ICEMI is invited authors to submit original papers in any but not limited as following areas: Science Foundation of Instrument and Measurement Innovative Designing of Instrument and Test System Applications on Instrument and Testing Signal & Image Processing Sensor and Non-electric Measurement Communication and Network Test Systems Control Theory and Application Condition Monitoring, Fault Diagnosis and Prediction Other Relevant Theories and Technologies

  • 2011 IEEE 10th International Conference on Electronic Measurement & Instruments (ICEMI)

    ICEMI is the world s premier conference dedicated to the electronic test of devices, boards and systems covering the complete cycle from design verification, test, diagnosis, failure analysis and back to process and design improvement, and is convened every two years. The purpose of the ICEMI is to provide excellent opportunities for scientists, engineers, and participants throughout the world to present the latest research results and to exchange their views or experience.

  • 2009 9th International Conference on Electronic Measurement & Instruments (ICEMI 2009)

    Science Foundation of Instrument and Measurement Instrument, Measurement and Test Technology: Sensing Technology and Transducer Designing of Instrument and Test System Applications on Instrument and Testing: Communication and Network Test Systems Control Theory and Application


2013 International Carnahan Conference on Security Technology (ICCST)

This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.

  • 2012 IEEE International Carnahan Conference on Security Technology (ICCST)

    Research, development, and user aspects of security technology, including principles of operation, applications, and user experiences.

  • 2011 International Carnahan Conference on Security Technology (ICCST)

    This annual conference is the world s longest -running, international technical symposium on security technology. This conference is a forum for collaboration on all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.

  • 2010 IEEE International Carnahan Conference on Security Technology (ICCST)

    The ICCST is a forum for researchers and practitioners in both new and existing security technology, providing an interchange of knowledge through paper presentations and publication of proceedings that have been selected by the ICCST organizing committee.

  • 2009 International Carnahan Conference on Security Technology (ICCST)

    Conference is directed toward research and development and user aspects of electronic security technology.

  • 2008 International Carnahan Conference on Security Technology (ICCST)

    The ICCST is directed toward the research and development aspects of electronic security technology, including the operational testing of the technology. It establishes a forum for the exchange of ideas and dissemination of information on both new and existing technology. Conference participants are stimulated to consider the impact of their work on society. The Conference is an interchange of knowledge through the presentation of learned papers that have been selected by the ICCST organizing committee.

  • 2007 IEEE International Carnahan Conference on Security Technology (ICCST)

  • 2006 IEEE International Carnahan Conference on Security Technology (ICCST)


More Conferences

Periodicals related to Face Recognition

Back to Top

Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Instrumentation and Measurement, IEEE Transactions on

Measurements and instrumentation utilizing electrical and electronic techniques.


Pattern Analysis and Machine Intelligence, IEEE Transactions on

Statistical and structural pattern recognition; image analysis; computational models of vision; computer vision systems; enhancement, restoration, segmentation, feature extraction, shape and texture analysis; applications of pattern analysis in medicine, industry, government, and the arts and sciences; artificial intelligence, knowledge representation, logical and probabilistic inference, learning, speech recognition, character and text recognition, syntactic and semantic processing, understanding natural language, expert systems, ...



Most published Xplore authors for Face Recognition

Back to Top

Xplore Articles related to Face Recognition

Back to Top

K Nearest Neighbor Based Local Sparse Representation Classifier

Nan Zhang; Jian Yang 2010 Chinese Conference on Pattern Recognition (CCPR), 2010

The sparse representation-based classifier (SRC) has been developed and shows great potential for pattern classification. SRC is a global representation based method in that a testing sample is represented by all training samples. Thus, it is time-consuming when the training sample size becomes large. This paper presents a local SRC method, called KNN-SRC, which chooses K nearest neighbors of a ...


Biometric face recognition using randomfaces

Elena Battini Sönmez; Songül Albayrak; Bülent Sankur 2010 IEEE 18th Signal Processing and Communications Applications Conference, 2010

This paper investigates the use of the Compressive Sensing (CS) technique to the classification issue. In this context, CS is used as a means to probe the nonlinear manifold on which faces under various illumination effects reside. The scheme of randomly sampled faces (Randomfaces) with nearest neighbor classifier are compared with two classical feature extraction approaches, as Eigenfaces and Fisherfaces. ...


Asynchronous examination security system using Ear Visual Biometric for college students

Bernie S. Fabito TENCON 2015 - 2015 IEEE Region 10 Conference, 2015

This study explores the use of an Ear Visual Biometric as a security measure to at least minimize identity theft in asynchronous examination. With the aid of the system, users make use of ear biometrics for user identification and password for user authentication. Users are identified based on the uniqueness of their ear structure thus limiting the chance of identity ...


The Iris Normalization Method Based on Line

Guo Qiaoli; Hongju Cao; Dong Benqing; Zheng Xiang 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications, 2013

Iris recognition is one of the most reliable and accurate biometric technologies. The reason of excentric between iris outside circle and iris inside circle is analysed. And two methods of normalizing irises and a description of the iris normalization algorithm based on line are introduced. This kind of method adopts some lines to describe iris area and has only one ...


Learning discriminative multi-scale and multi-position LBP features for face detection based on Ada-LDA

Kwang Ho An; So Hee Park; Yun Su Chung; Ki Young Moon; Myung Jin Chung 2009 IEEE International Conference on Robotics and Biomimetics (ROBIO), 2009

This paper presents a novel approach for face detection, which is based on the discriminative MspLBP features selected by a boosting technique called the Ada-LDA method. By scanning the face image with a scalable sub-window, many sub-regions are obtained from which the MspLBP features are extracted to describe the local structures of a face image. From a large pool of ...


More Xplore Articles

Educational Resources on Face Recognition

Back to Top

eLearning

K Nearest Neighbor Based Local Sparse Representation Classifier

Nan Zhang; Jian Yang 2010 Chinese Conference on Pattern Recognition (CCPR), 2010

The sparse representation-based classifier (SRC) has been developed and shows great potential for pattern classification. SRC is a global representation based method in that a testing sample is represented by all training samples. Thus, it is time-consuming when the training sample size becomes large. This paper presents a local SRC method, called KNN-SRC, which chooses K nearest neighbors of a ...


Biometric face recognition using randomfaces

Elena Battini Sönmez; Songül Albayrak; Bülent Sankur 2010 IEEE 18th Signal Processing and Communications Applications Conference, 2010

This paper investigates the use of the Compressive Sensing (CS) technique to the classification issue. In this context, CS is used as a means to probe the nonlinear manifold on which faces under various illumination effects reside. The scheme of randomly sampled faces (Randomfaces) with nearest neighbor classifier are compared with two classical feature extraction approaches, as Eigenfaces and Fisherfaces. ...


Asynchronous examination security system using Ear Visual Biometric for college students

Bernie S. Fabito TENCON 2015 - 2015 IEEE Region 10 Conference, 2015

This study explores the use of an Ear Visual Biometric as a security measure to at least minimize identity theft in asynchronous examination. With the aid of the system, users make use of ear biometrics for user identification and password for user authentication. Users are identified based on the uniqueness of their ear structure thus limiting the chance of identity ...


The Iris Normalization Method Based on Line

Guo Qiaoli; Hongju Cao; Dong Benqing; Zheng Xiang 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications, 2013

Iris recognition is one of the most reliable and accurate biometric technologies. The reason of excentric between iris outside circle and iris inside circle is analysed. And two methods of normalizing irises and a description of the iris normalization algorithm based on line are introduced. This kind of method adopts some lines to describe iris area and has only one ...


Learning discriminative multi-scale and multi-position LBP features for face detection based on Ada-LDA

Kwang Ho An; So Hee Park; Yun Su Chung; Ki Young Moon; Myung Jin Chung 2009 IEEE International Conference on Robotics and Biomimetics (ROBIO), 2009

This paper presents a novel approach for face detection, which is based on the discriminative MspLBP features selected by a boosting technique called the Ada-LDA method. By scanning the face image with a scalable sub-window, many sub-regions are obtained from which the MspLBP features are extracted to describe the local structures of a face image. From a large pool of ...


More eLearning Resources

IEEE-USA E-Books

  • Epilogue

    How has the Internet, a medium that thrives on control, been accepted as a medium of freedom? Why is freedom increasingly indistinguishable from paranoid control? In Control and Freedom, Wendy Hui Kyong Chun explores the current political and technological coupling of freedom with control by tracing the emergence of the Internet as a mass medium. The parallel (and paranoid) myths of the Internet as total freedom/total control, she says, stem from our reduction of political problems into technological ones.Drawing on the theories of Gilles Deleuze and Michel Foucault and analyzing such phenomena as Webcams and face-recognition technology, Chun argues that the relationship between control and freedom in networked contact is experienced and negotiated through sexuality and race. She traces the desire for cyberspace to cyberpunk fiction and maps the transformation of public/private into open/closed. Analyzing "pornocracy," she contends that it was through cyberporn and the government's attempts to regulate it that the Internet became a marketplace of ideas and commodities. Chun describes the way Internet promoters conflated technological empowerment with racial empowerment and, through close examinations of William Gibson's Neuromancer and Mamoru Oshii's Ghost in the Shell, she analyzes the management of interactivity in narratives of cyberspace.The Internet's potential for democracy stems not from illusory promises of individual empowerment, Chun argues, but rather from the ways in which it exposes us to others (and to other machines) in ways we cannot control. Using fiber optic networks -- light coursing through glass tubes -- as metaphor and reality, Control and Freedom engages the rich philosophical tradition of light as a figure for knowledge, clarifica tion, surveillance, and discipline, in order to argue that fiber-optic networks physically instantiate, and thus shatter, enlightenment.

  • References

    How has the Internet, a medium that thrives on control, been accepted as a medium of freedom? Why is freedom increasingly indistinguishable from paranoid control? In Control and Freedom, Wendy Hui Kyong Chun explores the current political and technological coupling of freedom with control by tracing the emergence of the Internet as a mass medium. The parallel (and paranoid) myths of the Internet as total freedom/total control, she says, stem from our reduction of political problems into technological ones.Drawing on the theories of Gilles Deleuze and Michel Foucault and analyzing such phenomena as Webcams and face-recognition technology, Chun argues that the relationship between control and freedom in networked contact is experienced and negotiated through sexuality and race. She traces the desire for cyberspace to cyberpunk fiction and maps the transformation of public/private into open/closed. Analyzing "pornocracy," she contends that it was through cyberporn and the government's attempts to regulate it that the Internet became a marketplace of ideas and commodities. Chun describes the way Internet promoters conflated technological empowerment with racial empowerment and, through close examinations of William Gibson's Neuromancer and Mamoru Oshii's Ghost in the Shell, she analyzes the management of interactivity in narratives of cyberspace.The Internet's potential for democracy stems not from illusory promises of individual empowerment, Chun argues, but rather from the ways in which it exposes us to others (and to other machines) in ways we cannot control. Using fiber optic networks -- light coursing through glass tubes -- as metaphor and reality, Control and Freedom engages the rich philosophical tradition of light as a figure for knowledge, clarifica tion, surveillance, and discipline, in order to argue that fiber-optic networks physically instantiate, and thus shatter, enlightenment.

  • PersonSpecific Characteristic Feature Selection for Face Recognition

    This chapter contains sections titled: Introduction Face Recognition in Humans Our Approach to Face Recognition Feature Extractors The Learning Algorithm Methodology Results Conclusions and Future Work References

  • Quaternionic Fuzzy Neural Network for View-Invariant Color Face Image Recognition

    This chapter contains sections titled: Introduction Face Recognition System Quaternion-Based View-Invariant Color Face Image Recognition Enrollment Stage and Recognition Stage for Quaternion-Based Color Face Image Correlator Max-Product Fuzzy Neural Network Classifier Experimental Results Conclusion and Future Research Directions

  • Learning Facial Aging Models: A Face Recognition Perspective

    This chapter contains sections titled: Introduction Age Progression during Formative Years Discussions and Conclusions References

  • No title

    The recognition of humans and their activities from video sequences is currently a very active area of research because of its applications in video surveillance, design of realistic entertainment systems, multimedia communications, and medical diagnosis. In this lecture, we discuss the use of face and gait signatures for human identification and recognition of human activities from video sequences. We survey existing work and describe some of the more well-known methods in these areas. We also describe our own research and outline future possibilities. In the area of face recognition, we start with the traditional methods for image-based analysis and then describe some of the more recent developments related to the use of video sequences, 3D models, and techniques for representing variations of illumination. We note that the main challenge facing researchers in this area is the development of recognition strategies that are robust to changes due to pose, illumination, disguise, and a ing. Gait recognition is a more recent area of research in video understanding, although it has been studied for a long time in psychophysics and kinesiology. The goal for video scientists working in this area is to automatically extract the parameters for representation of human gait. We describe some of the techniques that have been developed for this purpose, most of which are appearance based. We also highlight the challenges involved in dealing with changes in viewpoint and propose methods based on image synthesis, visual hull, and 3D models. In the domain of human activity recognition, we present an extensive survey of various methods that have been developed in different disciplines like artificial intelligence, image processing, pattern recognition, and computer vision. We then outline our method for modeling complex activities using 2D and 3D deformable shape theory. The wide application of automatic human identification and activity recognition methods will require the fusio of different modalities like face and gait, dealing with the problems of pose and illumination variations, and accurate computation of 3D models. The last chapter of this lecture deals with these areas of future research.

  • Index

    How has the Internet, a medium that thrives on control, been accepted as a medium of freedom? Why is freedom increasingly indistinguishable from paranoid control? In Control and Freedom, Wendy Hui Kyong Chun explores the current political and technological coupling of freedom with control by tracing the emergence of the Internet as a mass medium. The parallel (and paranoid) myths of the Internet as total freedom/total control, she says, stem from our reduction of political problems into technological ones.Drawing on the theories of Gilles Deleuze and Michel Foucault and analyzing such phenomena as Webcams and face-recognition technology, Chun argues that the relationship between control and freedom in networked contact is experienced and negotiated through sexuality and race. She traces the desire for cyberspace to cyberpunk fiction and maps the transformation of public/private into open/closed. Analyzing "pornocracy," she contends that it was through cyberporn and the government's attempts to regulate it that the Internet became a marketplace of ideas and commodities. Chun describes the way Internet promoters conflated technological empowerment with racial empowerment and, through close examinations of William Gibson's Neuromancer and Mamoru Oshii's Ghost in the Shell, she analyzes the management of interactivity in narratives of cyberspace.The Internet's potential for democracy stems not from illusory promises of individual empowerment, Chun argues, but rather from the ways in which it exposes us to others (and to other machines) in ways we cannot control. Using fiber optic networks -- light coursing through glass tubes -- as metaphor and reality, Control and Freedom engages the rich philosophical tradition of light as a figure for knowledge, clarifica tion, surveillance, and discipline, in order to argue that fiber-optic networks physically instantiate, and thus shatter, enlightenment.

  • A Taxonomy of Emerging Multilinear Discriminant Analysis Solutions for Biometric Signal Recognition

    This chapter contains sections titled: Introduction Multilinear Basics Multilinear Discriminant Analysis Empirical Comparison of MLDA Variants on Face Recognition Conclusions Acknowledgments Appendix: Multilinear Decompositions References

  • The Teradata SQL3 Multimedia Database Server

    Multimedia applications - such as fingerprint matching, signature verification, face recognition, and speech recognition or translation - require complex abstract data-type support within database management systems. However, conventional databases are not designed to support multimedia. In this chapter, we describe several multimedia database challenges and explain how Teradata solves these problems with its SQL3 Multimedia Database system. A key component of this system is the Multimedia Object Manager, a general- purpose content-based multimedia server designed for the symmetric multiprocessor (SMP) and massively parallel processor (MPP) environments. The Teradata SQL3 Multimedia Database system allows users to define and manipulate user-defined functions (UDFs), which are invoked in parallel in the Multimedia Object Manager to analyze/manipulate the contents of multimedia objects. The two key characteristics of this subsystem are its support for content-based retrieval and multimodal integration. We provide an in-depth analysis of retrieval techniques using feature extraction and spatial indices. We also illustrate the power of multimodal integration by walking through the development of a complex application involving the generation of a ?>talking agent,?> which uses speech, image, and video data types within the database system.

  • Measuring Information Content in Biometric Features

    This chapter contains sections titled: Introduction Theoretical Framework Face Recognition Discussion References



Standards related to Face Recognition

Back to Top

No standards are currently tagged "Face Recognition"


Jobs related to Face Recognition

Back to Top