Conferences related to Face Recognition

Back to Top

2016 IEEE International Conference on Image Processing (ICIP)

Signal processing, image processing, biomedical imaging, multimedia, video, multidemensional.


2013 10th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2013)

The IEEE conference on Automatic Face and Gesture Recognition is the premier international forum for research in image and video- based face, gesture, and body movement recognition. Its broad scope includes advances in fundamental computer vision, pattern recognition, computer graphics, and machine learning techniques relevant to face, gesture, and body action, new algorithms, and analysis of specific applications. The program will be single- track with poster sessions. Submissions will be rigorously reviewed and should clearly make the case for a documented improvement over the existing state of the art.


2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)

The conference will address, but is not limited to, the following topics:

  • 2009 3rd International Conference on Affective Computing and Intelligent Interaction (ACII 2009)

    The conference series on Affective Computing and Intelligent Interaction is the premier international forum for state of the art in research on affective and multi modal human-machine interaction and systems. Every other year the ACII conference plays an important role in shaping related scientific, academic, and higher education programs. This year, we are especially soliciting papers discussing Enabling Behavioral and Socially-Aware Human-Machine Interfaces in areas including psychology.


2013 IEEE 11th International Conference on Electronic Measurement & Instruments (ICEMI)

ICEMI is invited authors to submit original papers in any but not limited as following areas: Science Foundation of Instrument and Measurement Innovative Designing of Instrument and Test System Applications on Instrument and Testing Signal & Image Processing Sensor and Non-electric Measurement Communication and Network Test Systems Control Theory and Application Condition Monitoring, Fault Diagnosis and Prediction Other Relevant Theories and Technologies

  • 2011 IEEE 10th International Conference on Electronic Measurement & Instruments (ICEMI)

    ICEMI is the world s premier conference dedicated to the electronic test of devices, boards and systems covering the complete cycle from design verification, test, diagnosis, failure analysis and back to process and design improvement, and is convened every two years. The purpose of the ICEMI is to provide excellent opportunities for scientists, engineers, and participants throughout the world to present the latest research results and to exchange their views or experience.

  • 2009 9th International Conference on Electronic Measurement & Instruments (ICEMI 2009)

    Science Foundation of Instrument and Measurement Instrument, Measurement and Test Technology: Sensing Technology and Transducer Designing of Instrument and Test System Applications on Instrument and Testing: Communication and Network Test Systems Control Theory and Application


2013 International Carnahan Conference on Security Technology (ICCST)

This international conference is a forum for all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainability. The ICCST facilitates the exchange of ideas and information.

  • 2012 IEEE International Carnahan Conference on Security Technology (ICCST)

    Research, development, and user aspects of security technology, including principles of operation, applications, and user experiences.

  • 2011 International Carnahan Conference on Security Technology (ICCST)

    This annual conference is the world s longest -running, international technical symposium on security technology. This conference is a forum for collaboration on all aspects of physical, cyber and electronic security research, development, systems engineering, testing, evaluation, operations and sustainment. The ICCST facilitates the exchange of ideas and sharing of information on both new and existing technology and systems. Conference participants are encouraged to consider the impact of their work on society. The ICCST provides a foundation for support to authorities and agencies responsible for security, safety and law enforcement in the use of available and future technology.

  • 2010 IEEE International Carnahan Conference on Security Technology (ICCST)

    The ICCST is a forum for researchers and practitioners in both new and existing security technology, providing an interchange of knowledge through paper presentations and publication of proceedings that have been selected by the ICCST organizing committee.

  • 2009 International Carnahan Conference on Security Technology (ICCST)

    Conference is directed toward research and development and user aspects of electronic security technology.

  • 2008 International Carnahan Conference on Security Technology (ICCST)

    The ICCST is directed toward the research and development aspects of electronic security technology, including the operational testing of the technology. It establishes a forum for the exchange of ideas and dissemination of information on both new and existing technology. Conference participants are stimulated to consider the impact of their work on society. The Conference is an interchange of knowledge through the presentation of learned papers that have been selected by the ICCST organizing committee.

  • 2007 IEEE International Carnahan Conference on Security Technology (ICCST)

  • 2006 IEEE International Carnahan Conference on Security Technology (ICCST)


More Conferences

Periodicals related to Face Recognition

Back to Top

Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Instrumentation and Measurement, IEEE Transactions on

Measurements and instrumentation utilizing electrical and electronic techniques.


Pattern Analysis and Machine Intelligence, IEEE Transactions on

Statistical and structural pattern recognition; image analysis; computational models of vision; computer vision systems; enhancement, restoration, segmentation, feature extraction, shape and texture analysis; applications of pattern analysis in medicine, industry, government, and the arts and sciences; artificial intelligence, knowledge representation, logical and probabilistic inference, learning, speech recognition, character and text recognition, syntactic and semantic processing, understanding natural language, expert systems, ...



Most published Xplore authors for Face Recognition

Back to Top

Xplore Articles related to Face Recognition

Back to Top

Real-time 3-D face tracking and modeling from awebcam

Jongmoo Choi; Yann Dumortier; Sang-Il Choi; Muhammad Bilal Ahmad; Gérard Medioni 2012 IEEE Workshop on the Applications of Computer Vision (WACV), 2012

We first infer a 3-D face model from a single frontal image using automatically extracted 2-D landmarks and deforming a generic 3-D model. Then, for any input image, we extract feature points and track them in 2-D. Given these correspondences, sometimes noisy and incorrect, we robustly estimate the 3-D head pose using PnP and a RANSAC process. As the head ...


A complementary local feature descriptor for face identification

Jonghyun Choi; William Robson Schwartz; Huimin Guo; Larry S. Davis 2012 IEEE Workshop on the Applications of Computer Vision (WACV), 2012

In many descriptors, spatial intensity transforms are often packed into a histogram or encoded into binary strings to be insensitive to local misalignment and compact. Discriminative information, however, might be lost during the process as a trade-off. To capture the lost pixel-wise local information, we propose a new feature descriptor, Circular Center Symmetric- Pairs of Pixels (CCS-POP). It concatenates the ...


Discrete wavelet face graph matching

K. Ma; Xiaoou Tang Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), 2001

We have designed a new face graph model, using the discrete wavelet transform, for fast elastic bunch graph matching. With fiducial points as graph nodes, and local-area power spectrum vectors estimated from a space-frequency tree as node attributes, the DWT graph achieves similar model matching performance to the Gabor graph, but with orders of magnitude faster computation


For your eyes only

Brian Heflin; Walter Scheirer; T. E. Boult 2012 IEEE Workshop on the Applications of Computer Vision (WACV), 2012

In this paper, we take a look at an enhanced approach for eye detection under difficult acquisition circumstances such as low-light, distance, pose variation, and blur. We present a novel correlation filter based eye detection pipeline that is specifically designed to reduce face alignment errors, thereby increasing eye localization accuracy and ultimately face recognition accuracy. The accuracy of our eye ...


Modified after surgical face recognition using RBF neural networks and local Gabor binary patterns

Mohammadreza Banan; Amir Masoud Eftekhari Moghadam; A. Broumandnia 2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), 2013

Today, a typical face recognition system, especially after surgeries are having problems such as lack of identification of the tissue changes are attributed to the original image. In this paper, a method is proposed to solve this problem as GLRB1. In the proposed method, the image is classification by RBF2 neural network after normalized, then extracted the face texture feature ...


More Xplore Articles

Educational Resources on Face Recognition

Back to Top

eLearning

Real-time 3-D face tracking and modeling from awebcam

Jongmoo Choi; Yann Dumortier; Sang-Il Choi; Muhammad Bilal Ahmad; Gérard Medioni 2012 IEEE Workshop on the Applications of Computer Vision (WACV), 2012

We first infer a 3-D face model from a single frontal image using automatically extracted 2-D landmarks and deforming a generic 3-D model. Then, for any input image, we extract feature points and track them in 2-D. Given these correspondences, sometimes noisy and incorrect, we robustly estimate the 3-D head pose using PnP and a RANSAC process. As the head ...


A complementary local feature descriptor for face identification

Jonghyun Choi; William Robson Schwartz; Huimin Guo; Larry S. Davis 2012 IEEE Workshop on the Applications of Computer Vision (WACV), 2012

In many descriptors, spatial intensity transforms are often packed into a histogram or encoded into binary strings to be insensitive to local misalignment and compact. Discriminative information, however, might be lost during the process as a trade-off. To capture the lost pixel-wise local information, we propose a new feature descriptor, Circular Center Symmetric- Pairs of Pixels (CCS-POP). It concatenates the ...


Discrete wavelet face graph matching

K. Ma; Xiaoou Tang Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), 2001

We have designed a new face graph model, using the discrete wavelet transform, for fast elastic bunch graph matching. With fiducial points as graph nodes, and local-area power spectrum vectors estimated from a space-frequency tree as node attributes, the DWT graph achieves similar model matching performance to the Gabor graph, but with orders of magnitude faster computation


For your eyes only

Brian Heflin; Walter Scheirer; T. E. Boult 2012 IEEE Workshop on the Applications of Computer Vision (WACV), 2012

In this paper, we take a look at an enhanced approach for eye detection under difficult acquisition circumstances such as low-light, distance, pose variation, and blur. We present a novel correlation filter based eye detection pipeline that is specifically designed to reduce face alignment errors, thereby increasing eye localization accuracy and ultimately face recognition accuracy. The accuracy of our eye ...


Modified after surgical face recognition using RBF neural networks and local Gabor binary patterns

Mohammadreza Banan; Amir Masoud Eftekhari Moghadam; A. Broumandnia 2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), 2013

Today, a typical face recognition system, especially after surgeries are having problems such as lack of identification of the tissue changes are attributed to the original image. In this paper, a method is proposed to solve this problem as GLRB1. In the proposed method, the image is classification by RBF2 neural network after normalized, then extracted the face texture feature ...


More eLearning Resources

IEEE-USA E-Books

  • Quaternionic Fuzzy Neural Network for View-Invariant Color Face Image Recognition

    This chapter contains sections titled: Introduction Face Recognition System Quaternion-Based View-Invariant Color Face Image Recognition Enrollment Stage and Recognition Stage for Quaternion-Based Color Face Image Correlator Max-Product Fuzzy Neural Network Classifier Experimental Results Conclusion and Future Research Directions

  • PersonSpecific Characteristic Feature Selection for Face Recognition

    This chapter contains sections titled: Introduction Face Recognition in Humans Our Approach to Face Recognition Feature Extractors The Learning Algorithm Methodology Results Conclusions and Future Work References

  • The Teradata SQL3 Multimedia Database Server

    Multimedia applications - such as fingerprint matching, signature verification, face recognition, and speech recognition or translation - require complex abstract data-type support within database management systems. However, conventional databases are not designed to support multimedia. In this chapter, we describe several multimedia database challenges and explain how Teradata solves these problems with its SQL3 Multimedia Database system. A key component of this system is the Multimedia Object Manager, a general- purpose content-based multimedia server designed for the symmetric multiprocessor (SMP) and massively parallel processor (MPP) environments. The Teradata SQL3 Multimedia Database system allows users to define and manipulate user-defined functions (UDFs), which are invoked in parallel in the Multimedia Object Manager to analyze/manipulate the contents of multimedia objects. The two key characteristics of this subsystem are its support for content-based retrieval and multimodal integration. We provide an in-depth analysis of retrieval techniques using feature extraction and spatial indices. We also illustrate the power of multimodal integration by walking through the development of a complex application involving the generation of a ?>talking agent,?> which uses speech, image, and video data types within the database system.

  • Combining Geometrical and Statistical Models for VideoBased Face Recognition

    This chapter contains sections titled: Introduction Method for Learning GAMs Robust and Efficient Tracking on GAMs Face Recognition from Video Experiment Results Conclusion References

  • Pattern Recognition

    This chapter contains sections titled: Learning to Read, Matching Model Granularity, Generative Models, Face Recognition, Speech Recognition, Natural Language Processing and Translation, Combining Multiple Models, Outlier Detection, Dimensionality Reduction, Decision Trees, Active Learning, Learning to Rank, Bayesian Methods

  • No title

    The recognition of humans and their activities from video sequences is currently a very active area of research because of its applications in video surveillance, design of realistic entertainment systems, multimedia communications, and medical diagnosis. In this lecture, we discuss the use of face and gait signatures for human identification and recognition of human activities from video sequences. We survey existing work and describe some of the more well-known methods in these areas. We also describe our own research and outline future possibilities. In the area of face recognition, we start with the traditional methods for image-based analysis and then describe some of the more recent developments related to the use of video sequences, 3D models, and techniques for representing variations of illumination. We note that the main challenge facing researchers in this area is the development of recognition strategies that are robust to changes due to pose, illumination, disguise, and a ing. Gait recognition is a more recent area of research in video understanding, although it has been studied for a long time in psychophysics and kinesiology. The goal for video scientists working in this area is to automatically extract the parameters for representation of human gait. We describe some of the techniques that have been developed for this purpose, most of which are appearance based. We also highlight the challenges involved in dealing with changes in viewpoint and propose methods based on image synthesis, visual hull, and 3D models. In the domain of human activity recognition, we present an extensive survey of various methods that have been developed in different disciplines like artificial intelligence, image processing, pattern recognition, and computer vision. We then outline our method for modeling complex activities using 2D and 3D deformable shape theory. The wide application of automatic human identification and activity recognition methods will require the fusio of different modalities like face and gait, dealing with the problems of pose and illumination variations, and accurate computation of 3D models. The last chapter of this lecture deals with these areas of future research.

  • A Taxonomy of Emerging Multilinear Discriminant Analysis Solutions for Biometric Signal Recognition

    This chapter contains sections titled: Introduction Multilinear Basics Multilinear Discriminant Analysis Empirical Comparison of MLDA Variants on Face Recognition Conclusions Acknowledgments Appendix: Multilinear Decompositions References

  • On Forensic Use of Biometrics

    Forensic science largely concerns the analysis of crime. The science of biometrics has developed approaches that are used to automatically identify individuals by personal characteristics. Biometric techniques have primarily been used to assure identity. The main steps of a biometric recognition approach include: acquisition of the biometric data, localization and alignment of the data, feature extraction, and matching. This chapter concentrates on two case studies discussing the forensic possibilities of face and ear as biometrics. It introduces the manual and computer-aided forensic face recognition. The chapter discusses the disparities between the behaviour of the current automatic face recognition systems and that which is needed for forensic application, and outlines the current progress towards addressing the challenges existing in face recognition. An emerging biometric ear is examined. There is a rich variety of approaches for ear biometrics and these are steeped in pattern recognition and computer vision.

  • A Biologically Inspired Model for the Simultaneous Recognition of Identity and Expression

    This chapter contains sections titled: Introduction Face Recognition Facial Expression of Emotion Model of Expression-Variant Processing Experimental Results: Recognition of Identity Experimental Results: Recognition of Expression Recognition of Expression Variant Faces Using Weighted Subspace Summary References

  • Index

    How has the Internet, a medium that thrives on control, been accepted as a medium of freedom? Why is freedom increasingly indistinguishable from paranoid control? In Control and Freedom, Wendy Hui Kyong Chun explores the current political and technological coupling of freedom with control by tracing the emergence of the Internet as a mass medium. The parallel (and paranoid) myths of the Internet as total freedom/total control, she says, stem from our reduction of political problems into technological ones.Drawing on the theories of Gilles Deleuze and Michel Foucault and analyzing such phenomena as Webcams and face-recognition technology, Chun argues that the relationship between control and freedom in networked contact is experienced and negotiated through sexuality and race. She traces the desire for cyberspace to cyberpunk fiction and maps the transformation of public/private into open/closed. Analyzing "pornocracy," she contends that it was through cyberporn and the government's attempts to regulate it that the Internet became a marketplace of ideas and commodities. Chun describes the way Internet promoters conflated technological empowerment with racial empowerment and, through close examinations of William Gibson's Neuromancer and Mamoru Oshii's Ghost in the Shell, she analyzes the management of interactivity in narratives of cyberspace.The Internet's potential for democracy stems not from illusory promises of individual empowerment, Chun argues, but rather from the ways in which it exposes us to others (and to other machines) in ways we cannot control. Using fiber optic networks -- light coursing through glass tubes -- as metaphor and reality, Control and Freedom engages the rich philosophical tradition of light as a figure for knowledge, clarifica tion, surveillance, and discipline, in order to argue that fiber-optic networks physically instantiate, and thus shatter, enlightenment.



Standards related to Face Recognition

Back to Top

No standards are currently tagged "Face Recognition"


Jobs related to Face Recognition

Back to Top