Toward open set recognition

WJ Scheirer, A de Rezende Rocha… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
To date, almost all experimental evaluations of machine learning-based recognition
algorithms in computer vision have taken the form of “closed set” recognition, whereby all …

Real-time high density people counter using morphological tools

A Albiol, I Mora, V Naranjo - IEEE Transactions on Intelligent …, 2001 - ieeexplore.ieee.org
Deals with an application of image sequence analysis. In particular, it addresses the
problem of determining the number of people who get into and out of a train carriage when it …

Local descriptors and similarity measures for frontal face recognition: a comparative analysis

M Bereta, W Pedrycz, M Reformat - Journal of visual communication and …, 2013 - Elsevier
Face recognition based on local descriptors has been recently recognized as the state-of-
the-art design framework for problems of facial identification and verification. Given the …

Detecting and classifying scars, marks, and tattoos found in the wild

B Heflin, W Scheirer, TE Boult - 2012 IEEE Fifth International …, 2012 - ieeexplore.ieee.org
Within the forensics community, there is a growing interest in automatic biometric-based
approaches for describing subjects in an image. By labeling scars, marks and tattoos, a …

Animal recognition in the mojave desert: Vision tools for field biologists

MJ Wilber, WJ Scheirer, P Leitner… - … IEEE Workshop on …, 2013 - ieeexplore.ieee.org
The outreach of computer vision to non-traditional areas has enormous potential to enable
new ways of solving real world problems. One such problem is how to incorporate …

[HTML][HTML] 开放集识别研究综述

高菲, 杨柳, **晖 - 南京大学学报 (自然科学版), 2022 - jns.nju.edu.cn
传统机器学**方法和深度神经网络在训练模型的过程中都需要大量标记样本作为支撑,
然而标记大量样本是一个耗费巨大的过程, 并且真实场景变化莫测, 获得所有类别的标记样本是 …

Face and eye detection on hard datasets

J Parris, M Wilber, B Heflin, H Rara… - … Joint Conference on …, 2011 - ieeexplore.ieee.org
Face and eye detection algorithms are deployed in a wide variety of applications.
Unfortunately, there has been no quantitative comparison of how these detectors perform …

Secure remote matching with privacy: Scrambled support vector vaulted verification (S2V3)

MJ Wilber, TE Boult - 2012 IEEE Workshop on the Applications …, 2012 - ieeexplore.ieee.org
As biometric authentication systems become common in everyday use, researchers are
beginning to address privacy issues in biometric recognition. With the growing use of mobile …

For your eyes only

B Heflin, W Scheirer, TE Boult - 2012 IEEE Workshop on the …, 2012 - ieeexplore.ieee.org
In this paper, we take a look at an enhanced approach for eye detection under difficult
acquisition circumstances such as low-light, distance, pose variation, and blur. We present a …

DBC based Face Recognition using DWT

HS Jagadeesh, KS Babu, KB Raja - arxiv preprint arxiv:1205.1644, 2012 - arxiv.org
The applications using face biometric has proved its reliability in last decade. In this paper,
we propose DBC based Face Recognition using DWT (DBC-FR) model. The Poly-U Near …