Toward open set recognition
WJ Scheirer, A de Rezende Rocha… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
To date, almost all experimental evaluations of machine learning-based recognition
algorithms in computer vision have taken the form of “closed set” recognition, whereby all …
algorithms in computer vision have taken the form of “closed set” recognition, whereby all …
Real-time high density people counter using morphological tools
Deals with an application of image sequence analysis. In particular, it addresses the
problem of determining the number of people who get into and out of a train carriage when it …
problem of determining the number of people who get into and out of a train carriage when it …
Local descriptors and similarity measures for frontal face recognition: a comparative analysis
Face recognition based on local descriptors has been recently recognized as the state-of-
the-art design framework for problems of facial identification and verification. Given the …
the-art design framework for problems of facial identification and verification. Given the …
Detecting and classifying scars, marks, and tattoos found in the wild
Within the forensics community, there is a growing interest in automatic biometric-based
approaches for describing subjects in an image. By labeling scars, marks and tattoos, a …
approaches for describing subjects in an image. By labeling scars, marks and tattoos, a …
Animal recognition in the mojave desert: Vision tools for field biologists
The outreach of computer vision to non-traditional areas has enormous potential to enable
new ways of solving real world problems. One such problem is how to incorporate …
new ways of solving real world problems. One such problem is how to incorporate …
[HTML][HTML] 开放集识别研究综述
高菲, 杨柳, **晖 - 南京大学学报 (自然科学版), 2022 - jns.nju.edu.cn
传统机器学**方法和深度神经网络在训练模型的过程中都需要大量标记样本作为支撑,
然而标记大量样本是一个耗费巨大的过程, 并且真实场景变化莫测, 获得所有类别的标记样本是 …
然而标记大量样本是一个耗费巨大的过程, 并且真实场景变化莫测, 获得所有类别的标记样本是 …
Face and eye detection on hard datasets
Face and eye detection algorithms are deployed in a wide variety of applications.
Unfortunately, there has been no quantitative comparison of how these detectors perform …
Unfortunately, there has been no quantitative comparison of how these detectors perform …
Secure remote matching with privacy: Scrambled support vector vaulted verification (S2V3)
As biometric authentication systems become common in everyday use, researchers are
beginning to address privacy issues in biometric recognition. With the growing use of mobile …
beginning to address privacy issues in biometric recognition. With the growing use of mobile …
For your eyes only
In this paper, we take a look at an enhanced approach for eye detection under difficult
acquisition circumstances such as low-light, distance, pose variation, and blur. We present a …
acquisition circumstances such as low-light, distance, pose variation, and blur. We present a …
DBC based Face Recognition using DWT
The applications using face biometric has proved its reliability in last decade. In this paper,
we propose DBC based Face Recognition using DWT (DBC-FR) model. The Poly-U Near …
we propose DBC based Face Recognition using DWT (DBC-FR) model. The Poly-U Near …