2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA) 2016
DOI: 10.1109/isba.2016.7477243
|View full text |Cite
|
Sign up to set email alerts
|

Recognizing human faces under disguise and makeup

Abstract: The accuracy of automated human face recognition algorithms can significantly degrade while recognizing same subjects under make-up and disguised appearances. Increasing constraints on enhanced security and surveillance requires enhanced accuracy from face recognition algorithms for faces under disguise and/or makeup. This paper presents a new database for face images under disguised and make-up appearances the development of face recognition algorithms under such covariates. This database has 2460 images from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

6
19
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(25 citation statements)
references
References 10 publications
6
19
0
Order By: Relevance
“…Hand-crafted feature based approaches extract local or global features from query and gallery faces to perform matching. The representative works in this category include [4,7,8,[12][13][14]. In [4], authors extracted LBP and Gabor features to capture micropatterns and shape and texture information, respectively.…”
Section: Hand-crafted Feature Based Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…Hand-crafted feature based approaches extract local or global features from query and gallery faces to perform matching. The representative works in this category include [4,7,8,[12][13][14]. In [4], authors extracted LBP and Gabor features to capture micropatterns and shape and texture information, respectively.…”
Section: Hand-crafted Feature Based Approachesmentioning
confidence: 99%
“…In [4], authors extracted LBP and Gabor features to capture micropatterns and shape and texture information, respectively. Wang and Kumar [7] used LBP with biometric and nonbiometric blocks. Matching is performed using only the biometric blocks to achieve superior accuracies.…”
Section: Hand-crafted Feature Based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the sparse encoding representation, which ensures constraint on the training dictionary, can be formulated as follows: (6) where  is the regularization parameter. In this manner, the spoof face sample detection problem can be considered as a solution to the two-class classification problem.…”
Section: Sparse Encoding Of Recovered Featuresmentioning
confidence: 99%
“…This is largely due to the fact that intruders are always expected to imitate these unique biometric details that would lead to positive but undesirable identification by the biometrics system. Successful examples of anti-spoofing results [2] are available for a range of deployed biometrics systems with different modalities: fingerprint spoofing detection [3]- [4], face spoofing detection [5], [12], facial disguise and makeup detection [6], [15], etc. The development of effective anti-spoofing techniques is critical to safeguard the integrity of deployed biometrics systems.…”
Section: Introductionmentioning
confidence: 99%