Trunk-branch ensemble convolutional neural networks for video-based face recognition
C Ding, D Tao - IEEE transactions on pattern analysis and …, 2017 - ieeexplore.ieee.org
Human faces in surveillance videos often suffer from severe image blur, dramatic pose
variations, and occlusion. In this paper, we propose a comprehensive framework based on …
variations, and occlusion. In this paper, we propose a comprehensive framework based on …
Face recognition in low quality images: A survey
Low-resolution face recognition (LRFR) has received increasing attention over the past few
years. Its applications lie widely in the real-world environment when high-resolution or high …
years. Its applications lie widely in the real-world environment when high-resolution or high …
Effects of image degradation and degradation removal to CNN-based image classification
Just like many other topics in computer vision, image classification has achieved significant
progress recently by using deep learning neural networks, especially the Convolutional …
progress recently by using deep learning neural networks, especially the Convolutional …
Model inversion attack by integration of deep generative models: Privacy-sensitive face generation from a face recognition system
M Khosravy, K Nakamura, Y Hirose… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Cybersecurity in front of attacks to a face recognition system is an emerging issue in the
cloud era, especially due to its strong bonds with the privacy of the users registered to the …
cloud era, especially due to its strong bonds with the privacy of the users registered to the …
Defeating image obfuscation with deep learning
We demonstrate that modern image recognition methods based on artificial neural networks
can recover hidden information from images protected by various forms of obfuscation. The …
can recover hidden information from images protected by various forms of obfuscation. The …
Faceless person recognition: Privacy implications in social media
As we shift more of our lives into the virtual domain, the volume of data shared on the web
keeps increasing and presents a threat to our privacy. This works contributes to the …
keeps increasing and presents a threat to our privacy. This works contributes to the …
Recognition of images degraded by Gaussian blur
In this paper, we propose a new theory of invariants to Gaussian blur. We introduce a notion
of a primordial image as a canonical form of all Gaussian blur-equivalent images. The …
of a primordial image as a canonical form of all Gaussian blur-equivalent images. The …
Urie: Universal image enhancement for visual recognition in the wild
Despite the great advances in visual recognition, it has been witnessed that recognition
models trained on clean images of common datasets are not robust against distorted images …
models trained on clean images of common datasets are not robust against distorted images …
[PDF][PDF] Blur vs. block: Investigating the effectiveness of privacy-enhancing obfuscation for images
Computer vision can lead to privacy issues such as unauthorized disclosure of private
information and identity theft, but it may also be used to preserve user privacy. For example …
information and identity theft, but it may also be used to preserve user privacy. For example …
Learning disentangled behaviour patterns for wearable-based human activity recognition
In wearable-based human activity recognition (HAR) research, one of the major challenges
is the large intra-class variability problem. The collected activity signal is often, if not always …
is the large intra-class variability problem. The collected activity signal is often, if not always …