A survey on computer vision based human analysis in the COVID-19 era
The emergence of COVID-19 has had a global and profound impact, not only on society as a
whole, but also on the lives of individuals. Various prevention measures were introduced …
whole, but also on the lives of individuals. Various prevention measures were introduced …
A comprehensive study on face recognition biases beyond demographics
Face recognition (FR) systems have a growing effect on critical decision-making processes.
Recent works have shown that FR solutions show strong performance differences based on …
Recent works have shown that FR solutions show strong performance differences based on …
The effect of wearing a mask on face recognition performance: an exploratory study
Face recognition has become essential in our daily lives as a convenient and contactless
method of accurate identity verification. Process such as identity verification at automatic …
method of accurate identity verification. Process such as identity verification at automatic …
Privacy-friendly synthetic data for the development of face morphing attack detectors
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …
solutions be successfully developed based on synthetic data?". Towards that, this work …
Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network
Face morphing attacks aim at creating face images that are verifiable to be the face of
multiple identities, which can lead to building faulty identity links in operations like border …
multiple identities, which can lead to building faulty identity links in operations like border …
Pw-mad: Pixel-wise supervision for generalized face morphing attack detection
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …
major vulnerability to processes based on identity verification, such as border checks …
Extended evaluation of the effect of real and simulated masks on face recognition performance
Face recognition is an essential technology in our daily lives as a contactless and
convenient method of accurate identity verification. Processes such as secure login to …
convenient method of accurate identity verification. Processes such as secure login to …
Beyond identity: What information is stored in biometric face templates?
Deeply-learned face representations enable the success of current face recognition
systems. Despite the ability of these representations to encode the identity of an individual …
systems. Despite the ability of these representations to encode the identity of an individual …
Detecting face morphing attacks by analyzing the directed distances of facial landmarks shifts
Face morphing attacks create face images that are verifiable to multiple identities.
Associating such images to identity documents lead to building faulty identity links, causing …
Associating such images to identity documents lead to building faulty identity links, causing …
Face quality estimation and its correlation to demographic and non-demographic bias in face recognition
Face quality assessment aims at estimating the utility of a face image for the purpose of
recognition. It is a key factor to achieve high face recognition performances. Currently, the …
recognition. It is a key factor to achieve high face recognition performances. Currently, the …