A survey of face recognition techniques under occlusion

D Zeng, R Veldhuis, L Spreeuwers - IET biometrics, 2021 - Wiley Online Library
The limited capacity to recognise faces under occlusions is a long‐standing problem that
presents a unique challenge for face recognition systems and even humans. The problem …

Towards metrical reconstruction of human faces

W Zielonka, T Bolkart, J Thies - European conference on computer vision, 2022 - Springer
Face reconstruction and tracking is a building block of numerous applications in AR/VR,
human-machine interaction, as well as medical applications. Most of these applications rely …

Facescape: a large-scale high quality 3d face dataset and detailed riggable 3d face prediction

H Yang, H Zhu, Y Wang, M Huang… - Proceedings of the …, 2020 - openaccess.thecvf.com
In this paper, we present a large-scale detailed 3D face dataset, FaceScape, and propose a
novel algorithm that is able to predict elaborate riggable 3D face models from a single image …

Human gender classification: a review

F Lin, Y Wu, Y Zhuang, X Long… - International Journal of …, 2016 - inderscienceonline.com
The gender recognition is essential and critical for many applications in the commercial
domains such as applications of human-computer interaction and computer-aided …

Labeled faces in the wild: A database forstudying face recognition in unconstrained environments

GB Huang, M Mattar, T Berg… - Workshop on faces in' …, 2008 - inria.hal.science
Most face databases have been created under controlled conditions to facilitate the study of
specific parameters on the face recognition problem. These parameters include such …

Describable visual attributes for face verification and image search

N Kumar, A Berg, PN Belhumeur… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
We introduce the use of describable visual attributes for face verification and image search.
Describable visual attributes are labels that can be given to an image to describe its …

Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect

N Erdogmus, S Marcel - 2013 IEEE sixth international …, 2013 - ieeexplore.ieee.org
The problem of detecting face spoofing attacks (presentation attacks) has recently gained a
well-deserved popularity. Mainly focusing on 2D attacks forged by displaying printed photos …

Single-network whole-body pose estimation

G Hidalgo, Y Raaj, H Idrees, D Xiang… - Proceedings of the …, 2019 - openaccess.thecvf.com
We present the first single-network approach for 2D whole-body pose estimation, which
entails simultaneous localization of body, face, hands, and feet keypoints. Due to the bottom …

Can GAN generated morphs threaten face recognition systems equally as landmark based morphs?-vulnerability and detection

S Venkatesh, H Zhang, R Ramachandra… - … on Biometrics and …, 2020 - ieeexplore.ieee.org
The primary objective of face morphing is to com-bine face images of different data subjects
(eg an malicious actor and an accomplice) to generate a face image that can be equally …

Multi-scale local binary pattern histograms for face recognition

CH Chan, J Kittler, K Messer - … , ICB 2007, Seoul, Korea, August 27-29 …, 2007 - Springer
A novel discriminative face representation derived by the Linear Discriminant Analysis (LDA)
of multi-scale local binary pattern histograms is proposed for face recognition. The face …