Results 1 - 10
of
35,793
The FERET evaluation methodology for face recognition algorithms
- In (a) Example 1 (b) Example 1 (c) Right ear) (d) Mirroed Left ear
"... AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial i ..."
Abstract
-
Cited by 1116 (26 self)
- Add to MetaCart
AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial
Comparisons of Face Recognition Algorithms
, 2012
"... Abstract. In this paper we introduce the facereclib, the first software library that allows to compare a variety of face recognition algorithms on most of the known facial image databases and that permits rapid prototyping of novel ideas and testing of meta-parameters of face recognition algorithms. ..."
Abstract
- Add to MetaCart
Abstract. In this paper we introduce the facereclib, the first software library that allows to compare a variety of face recognition algorithms on most of the known facial image databases and that permits rapid prototyping of novel ideas and testing of meta-parameters of face recognition algorithms
Selected Face Recognition Algorithms
"... Abstract — Continuous miniaturization of mobile devices has greatly increased its adoption and use by people in various facets of our lives. This has also increased the popularity of face recognition and image processing. Face recognition is now being employed for security purpose opening up the nee ..."
Abstract
- Add to MetaCart
recognition systems. We studied and implemented three well known face recognition algorithms and observed their recognition accuracy when gallery / probe images were compressed and/or uncompressed as one would naturally expect. For compression purposes, we adopted the JPEG and JPEG2000 coding standard
Modelling Distance Functions Induced by Face Recognition Algorithms
, 2004
"... Modeling distance functions induced by face recognition algorithms ..."
Face recognition algorithms surpass humans
- IEEE Trans. PAMI
, 2005
"... Abstract—There has been significant progress in improving the performance of computer-based face recognition algorithms over the last decade. Although algorithms have been tested and compared extensively with each other, there has been remarkably little work comparing the accuracy of computer-based ..."
Abstract
-
Cited by 49 (7 self)
- Add to MetaCart
Abstract—There has been significant progress in improving the performance of computer-based face recognition algorithms over the last decade. Although algorithms have been tested and compared extensively with each other, there has been remarkably little work comparing the accuracy of computer
Faceperf: Benchmarks for face recognition algorithms
- Workload Characterization, 2007. IISWC 2007
, 2007
"... Abstract—In this paper we present a collection of C and C++ biometric performance benchmark algorithms called FacePerf. The benchmark includes three different face recognition algorithms that are historically important to the face recognition community: Haar-based face detection, Principal Component ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
Abstract—In this paper we present a collection of C and C++ biometric performance benchmark algorithms called FacePerf. The benchmark includes three different face recognition algorithms that are historically important to the face recognition community: Haar-based face detection, Principal
Designing Affine Transformations based Face Recognition Algorithms
"... We investigate methods to infer the best affine transformation based face recognition algorithm; which operates by projecting given images to a low-dimensional ..."
Abstract
- Add to MetaCart
We investigate methods to infer the best affine transformation based face recognition algorithm; which operates by projecting given images to a low-dimensional
The FERET Verification Testing Protocol for Face Recognition Algorithms
, 1999
"... Two critical performance characterizations of biometric algorithms, including face recognition, are identification and verification. In face recognition, FERET is the de facto standard evaluation methodology.Identification performance of face recognition algorithms on the FERET tests has been previo ..."
Abstract
-
Cited by 56 (2 self)
- Add to MetaCart
Two critical performance characterizations of biometric algorithms, including face recognition, are identification and verification. In face recognition, FERET is the de facto standard evaluation methodology.Identification performance of face recognition algorithms on the FERET tests has been
A face recognition algorithm based on multiple individual discriminative models
- DIKU, University of Copenhagen
, 2005
"... A face recognition algorithm based on multiple individual discriminative models ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
A face recognition algorithm based on multiple individual discriminative models
Blurred Face Recognition Algorithm Guided by a No-Reference Blur Metric
, 2010
"... Blurred face recognition algorithm guided by a no-reference blur metric ..."
Results 1 - 10
of
35,793