A survey of face recognition techniques under occlusion
The limited capacity to recognise faces under occlusions is a long‐standing problem that
presents a unique challenge for face recognition systems and even humans. The problem …
presents a unique challenge for face recognition systems and even humans. The problem …
Towards metrical reconstruction of human faces
Face reconstruction and tracking is a building block of numerous applications in AR/VR,
human-machine interaction, as well as medical applications. Most of these applications rely …
human-machine interaction, as well as medical applications. Most of these applications rely …
Facescape: a large-scale high quality 3d face dataset and detailed riggable 3d face prediction
In this paper, we present a large-scale detailed 3D face dataset, FaceScape, and propose a
novel algorithm that is able to predict elaborate riggable 3D face models from a single image …
novel algorithm that is able to predict elaborate riggable 3D face models from a single image …
Human gender classification: a review
The gender recognition is essential and critical for many applications in the commercial
domains such as applications of human-computer interaction and computer-aided …
domains such as applications of human-computer interaction and computer-aided …
Labeled faces in the wild: A database forstudying face recognition in unconstrained environments
Most face databases have been created under controlled conditions to facilitate the study of
specific parameters on the face recognition problem. These parameters include such …
specific parameters on the face recognition problem. These parameters include such …
Describable visual attributes for face verification and image search
We introduce the use of describable visual attributes for face verification and image search.
Describable visual attributes are labels that can be given to an image to describe its …
Describable visual attributes are labels that can be given to an image to describe its …
Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect
N Erdogmus, S Marcel - 2013 IEEE sixth international …, 2013 - ieeexplore.ieee.org
The problem of detecting face spoofing attacks (presentation attacks) has recently gained a
well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …
well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …
Single-network whole-body pose estimation
We present the first single-network approach for 2D whole-body pose estimation, which
entails simultaneous localization of body, face, hands, and feet keypoints. Due to the bottom …
entails simultaneous localization of body, face, hands, and feet keypoints. Due to the bottom …
Can GAN generated morphs threaten face recognition systems equally as landmark based morphs?-vulnerability and detection
The primary objective of face morphing is to com-bine face images of different data subjects
(eg an malicious actor and an accomplice) to generate a face image that can be equally …
(eg an malicious actor and an accomplice) to generate a face image that can be equally …
Multi-scale local binary pattern histograms for face recognition
A novel discriminative face representation derived by the Linear Discriminant Analysis (LDA)
of multi-scale local binary pattern histograms is proposed for face recognition. The face …
of multi-scale local binary pattern histograms is proposed for face recognition. The face …