Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170)
DOI: 10.1109/icpr.1998.711877
|View full text |Cite
|
Sign up to set email alerts
|

Towards detection of glasses in facial images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0
1

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(22 citation statements)
references
References 20 publications
0
21
0
1
Order By: Relevance
“…Detection is carried out using edge information within a small area defined between the eyes. Detection is similar to the method proposed in [1]. As mentioned in [1], the nosepiece is one of the most common features existing on all of the glasses.…”
Section: Glasses Detection Extraction and Removalmentioning
confidence: 90%
See 2 more Smart Citations
“…Detection is carried out using edge information within a small area defined between the eyes. Detection is similar to the method proposed in [1]. As mentioned in [1], the nosepiece is one of the most common features existing on all of the glasses.…”
Section: Glasses Detection Extraction and Removalmentioning
confidence: 90%
“…Detection is similar to the method proposed in [1]. As mentioned in [1], the nosepiece is one of the most common features existing on all of the glasses. Extraction is achieved with a deformable contour, combining edge and geometrical features.…”
Section: Glasses Detection Extraction and Removalmentioning
confidence: 90%
See 1 more Smart Citation
“…Training is performed with a boot-strap learning algorithm [21]. Generating a training set for the SVM is a challenging task because of the difficulty in placing "characteristic" non-face images in the training set.…”
Section: Support Vector Machinesmentioning
confidence: 99%
“…Não apenas a identificação biométrica pela íris, como a identificação por impressão digital ou faces, procuram identificar um indivíduo através de informações biométricas pessoais (o que ele é) e não através de informações que o indivíduo sabe (senhas) ou possui (cartões e outros tipos de chaves) (JIANG et al, 2000).…”
Section: Considerações Iniciaisunclassified