Proceedings 15th International Conference on Pattern Recognition. ICPR-2000
DOI: 10.1109/icpr.2000.903052
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of face verification results on the XM2VTFS database

Abstract: The paper presents results of the face verification contest that was organized in conjunction with International Conference on Pattern Recognition 2000 [14]. Participants had to use identical data sets from a large, publicly available multimodal database XM2VTSDB. Training and evaluation was carried out according to an a priori known protocol ([7]). Verification results of all tested algorithms have been collected and made public on the XM2VTSDB website [15], facilitating large scale experiments on classifier … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
60
2

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 78 publications
(64 citation statements)
references
References 8 publications
1
60
2
Order By: Relevance
“…Four different institutions submitted results on the database which were subsequently published in [13]. This paper presents the results of a second contest using the same dataset and protocol, that has been organised as part of AVBPA 2003.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Four different institutions submitted results on the database which were subsequently published in [13]. This paper presents the results of a second contest using the same dataset and protocol, that has been organised as part of AVBPA 2003.…”
Section: Introductionmentioning
confidence: 99%
“…The database used was the Xm2vts database along with the Lausanne protocol [14]. Four different institutions submitted results on the database which were subsequently published in [13]. Three years later, a second contest using the same dataset and protocol was organised as part of AVBPA 2003.…”
mentioning
confidence: 99%
“…The development set is used uniquely to train the fusion classifier parameters, including the threshold (bias) parameter, whereas the evaluation set is used uniquely to evaluate the generalisation performance. They are in accordance to the two originally defined Lausanne Protocols [18]. The 32 fusion experiments have 400 (client accesses) × 32 (data sets)= 12,800 client accesses and 111,800 (impostor accesses) × 32 (data sets) = 3,577,600 impostor accesses.…”
Section: Database and Evaluationmentioning
confidence: 99%
“…Then, the objective function to be optimized for classification is simplified to be the denominator of the objective function in (3). Denote the transformed class centers from the transformation matrix obtained in Section III-B2 as (12) Then, the corresponding objective function is (13) Denoting and , the optimal affine transformation matrix can be obtained by setting the derivative of the objective function to zero (14) Therefore, the optimal is (15) When the matrix is not of full rank, the inverse matrix can be replaced with the pseudo-inverse matrix. Finally, the transformation matrix is reset to be the product of a columnly orthogonal matrix and a diagonal matrix by using singular value decomposition as in (5) and (6).…”
Section: ) Initializationmentioning
confidence: 99%
“…FOR FACE VERIFICATION A large number of algorithms have been proposed for the face verification task; aside from techniques based on hidden Markov models (HMMs), the Bayesian method, support vector machines (SVMs), and neural networks (NNs) [13], [14], subspace learning techniques such as linear discriminant analysis (LDA) are the most popular. Motivated by the benefit to face verification of balancing class specific thresholds, in this work we develop a new subspace learning algorithm that can extract effective features for the verification task and at the same time ensure the balance of the class specific thresholds.…”
Section: Threshold Balanced Affine Transformationmentioning
confidence: 99%