Trunk-branch ensemble convolutional neural networks for video-based face recognition

C Ding, D Tao - IEEE transactions on pattern analysis and …, 2017 - ieeexplore.ieee.org
Human faces in surveillance videos often suffer from severe image blur, dramatic pose
variations, and occlusion. In this paper, we propose a comprehensive framework based on …

Face recognition in low quality images: A survey

P Li, L Prieto, D Mery, P Flynn - arXiv preprint arXiv:1805.11519, 2018 - arxiv.org
Low-resolution face recognition (LRFR) has received increasing attention over the past few
years. Its applications lie widely in the real-world environment when high-resolution or high …

Effects of image degradation and degradation removal to CNN-based image classification

Y Pei, Y Huang, Q Zou, X Zhang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Just like many other topics in computer vision, image classification has achieved significant
progress recently by using deep learning neural networks, especially the Convolutional …

Model inversion attack by integration of deep generative models: Privacy-sensitive face generation from a face recognition system

M Khosravy, K Nakamura, Y Hirose… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Cybersecurity in front of attacks to a face recognition system is an emerging issue in the
cloud era, especially due to its strong bonds with the privacy of the users registered to the …

Defeating image obfuscation with deep learning

R McPherson, R Shokri, V Shmatikov - arXiv preprint arXiv:1609.00408, 2016 - arxiv.org
We demonstrate that modern image recognition methods based on artificial neural networks
can recover hidden information from images protected by various forms of obfuscation. The …

Faceless person recognition: Privacy implications in social media

SJ Oh, R Benenson, M Fritz, B Schiele - … 11-14, 2016, Proceedings, Part III …, 2016 - Springer
As we shift more of our lives into the virtual domain, the volume of data shared on the web
keeps increasing and presents a threat to our privacy. This works contributes to the …

Recognition of images degraded by Gaussian blur

J Flusser, S Farokhi, C Höschl, T Suk… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we propose a new theory of invariants to Gaussian blur. We introduce a notion
of a primordial image as a canonical form of all Gaussian blur-equivalent images. The …

Urie: Universal image enhancement for visual recognition in the wild

T Son, J Kang, N Kim, S Cho, S Kwak - … Glasgow, UK, August 23–28, 2020 …, 2020 - Springer
Despite the great advances in visual recognition, it has been witnessed that recognition
models trained on clean images of common datasets are not robust against distorted images …

[PDF][PDF] Blur vs. block: Investigating the effectiveness of privacy-enhancing obfuscation for images

N Vishwamitra, B Knijnenburg, H Hu… - Proceedings of the …, 2017 - openaccess.thecvf.com
Computer vision can lead to privacy issues such as unauthorized disclosure of private
information and identity theft, but it may also be used to preserve user privacy. For example …

Learning disentangled behaviour patterns for wearable-based human activity recognition

J Su, Z Wen, T Lin, Y Guan - Proceedings of the ACM on Interactive …, 2022 - dl.acm.org
In wearable-based human activity recognition (HAR) research, one of the major challenges
is the large intra-class variability problem. The collected activity signal is often, if not always …