- Read more about GaitMM: Multi-Granularity Motion Sequence Learning for Gait Recognition
- Log in to post comments
Gait recognition aims to identify individual-specific walking patterns by observing the different periodic movements of each body part. However, most existing methods treat each part equally and fail to account for the data redundancy caused by the different step frequencies and sampling rates of gait sequences. In this study, we propose a multi-granularity motion representation network (GaitMM) for gait sequence learning. In GaitMM, we design a combined full-body and fine-grained sequence learning module (FFSL) to explore part-independent spatio-temporal representations.
- Categories:
- Read more about GaitMM: Multi-Granularity Motion Sequence Learning for Gait Recognition
- Log in to post comments
Gait recognition aims to identify individual-specific walking patterns by observing the different periodic movements of each body part. However, most existing methods treat each part equally and fail to account for the data redundancy caused by the different step frequencies and sampling rates of gait sequences. In this study, we propose a multi-granularity motion representation network (GaitMM) for gait sequence learning. In GaitMM, we design a combined full-body and fine-grained sequence learning module (FFSL) to explore part-independent spatio-temporal representations.
- Categories:
- Read more about Are GAN-based Morphs Threatening Face Recognition?
- Log in to post comments
Morphing attacks are a threat to biometric systems where the biometric reference in an identity document can be altered. This form of attack presents an important issue in applications relying on identity documents such as border security or access control. Research in generation of face morphs and their detection is developing rapidly, however very few datasets with morphing attacks and open-source detection toolkits are publicly available.
- Categories:
- Read more about One-class Learning Towards Synthetic Voice Spoofing Detection (Poster)
- Log in to post comments
Human voices can be used to authenticate the identity of the speaker, but the automatic speaker verification (ASV) systems are vulnerable to voice spoofing attacks, such as impersonation, replay, text-to-speech, and voice conversion. Recently, researchers developed anti-spoofing techniques to improve the reliability of ASV systems against spoofing attacks. However, most methods encounter difficulties in detecting unknown attacks in practical use, which often have different statistical distributions from known attacks.
- Categories:
This work explores facial expression bias as a security vulnerability of face recognition systems. Despite the great performance achieved by state-of-the-art face recognition systems, the algorithms are still sensitive to a large range of covariates. We present a comprehensive analysis of how facial expression bias impacts the performance of face recognition technologies. Our study analyzes: i) facial expression biases in the most popular face recognition databases; and ii) the impact of facial expression in face recognition performances.
- Categories:
- Read more about SILHOUETTE-BASED VIEW-EMBEDDINGS FOR GAIT RECOGNITION UNDER MULTIPLE VIEWS
- Log in to post comments
- Categories:
- Read more about Deep and Ordinal Ensemble Learning for Human Age Estimation From Facial Images
- Log in to post comments
Some recent work treats age estimation as an ordinal ranking task and decomposes it into multiple binary classifications. However, a theoretical defect lies in this type of methods: the ignorance of possible contradictions in individual ranking results. In this paper, we partially embrace the decomposition idea and propose the Deep and Ordinal Ensemble Learning with Two Groups Classification (DOEL 2groups ) for age prediction. An important advantage of our approach is that it theoretically allows the prediction even when the contradictory cases occur.
DOEL_poster.pdf
- Categories:
- Read more about ICASSP 2021 Poster
- Log in to post comments
This paper investigates the employment of photoplethysmography (PPG) for user authentication systems. Time-stable and user-specific features are developed by stretching the signal, designing a convolutional neural network and performing a variation-stable approach with three score fusions. Two evaluation scenarios are explored, namely single-session and two-sessions.
- Categories:
- Read more about Key Agreement and Secure Identification with Physical Unclonable Functions (PUFs)
- Log in to post comments
- Categories:
- Read more about Unconstrained Periocular Recognition: Using Generative Deep Learning Frameworks for Attribute Normalization
- Log in to post comments
Ocular biometric systems working in unconstrained environments usually face the problem of small within-class compactness caused by the multiple factors that jointly degrade the quality of the obtained data. In this work, we propose an attribute normalization strategy based on deep learning generative frameworks, that reduces the variability of the samples used in pairwise comparisons, without reducing their discriminability.
- Categories: