2018
DOI: 10.1016/j.imavis.2018.03.004
|View full text |Cite
|
Sign up to set email alerts
|

Patch-based face recognition using a hierarchical multi-label matcher

Abstract: This paper proposes a hierarchical multi-label matcher for patch-based face recognition. In signature generation, a face image is iteratively divided into multi-level patches. Two different types of patch divisions and signatures are introduced for 2D facial image and texture-lifted image, respectively. The matcher training consists of three steps. First, local classifiers are built to learn the local matching of each patch. Second, the hierarchical relationships defined between local patches are used to learn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 58 publications
0
3
0
Order By: Relevance
“…Video manipulation methods and devices that support privacy protection aim at preventing privacy infiltration when the images recorded on multiple VSSs are required to be sent to outside entity/entities that are beyond the jurisdiction of the VSSs. In cases where the video images are requested by, for example, law enforcement agencies, masking will be carried out with a receiver of control signals activated ( Figure 3) [33]. When motion signals are received, the VSS will compare the operational status of the cameras against the regulatory information and check if they match.…”
Section: Video Manipulation Methods and Devices That Support Privacy mentioning
confidence: 99%
“…Video manipulation methods and devices that support privacy protection aim at preventing privacy infiltration when the images recorded on multiple VSSs are required to be sent to outside entity/entities that are beyond the jurisdiction of the VSSs. In cases where the video images are requested by, for example, law enforcement agencies, masking will be carried out with a receiver of control signals activated ( Figure 3) [33]. When motion signals are received, the VSS will compare the operational status of the cameras against the regulatory information and check if they match.…”
Section: Video Manipulation Methods and Devices That Support Privacy mentioning
confidence: 99%
“…Typically, blurring is achieved by using the gaussian function to set the sigma parameter. Once the visual data are subject to blurring, they cannot be recovered to their original state [36][37][38]. This blurring technique blurs the edges, creating a clump of photos, and generally is applied to personal information about the subjects taken from the images to prevent the identification of targets by arbitrarily crushing them [39][40][41][42].…”
Section: Blurringmentioning
confidence: 99%
“…The UR2D system is evaluated on two types of face recognition scenarios: constrained environment and unconstrained environment. The datasets used for evaluation are the UHDB31 dataset [50,54] and the IJB-A dataset [35]. The same setting is followed as [55] in the UHDB31 dataset.…”
Section: Ur2d Evaluationmentioning
confidence: 99%