Several patternrecognition and classification techniques have been applied to the biometrics domain. Among them, an interesting technique is the Scale Invariant Feature Transform (SIFT), originally devised for object...
详细信息
Several patternrecognition and classification techniques have been applied to the biometrics domain. Among them, an interesting technique is the Scale Invariant Feature Transform (SIFT), originally devised for object recognition. Even if SIFT features have emerged as a very powerful image descriptors, their employment in face analysis context has never been systematically investigated. This paper investigates the application of the SIFT approach in the context of face authentication. In order to determine the real potential and applicability of the method, different matching schemes are proposed and tested using the BANCA database and protocol, showing promising results.
Multiscale techniques have been used for many years in computervision. Recently multiscale edges have received attention in spectral graph methods as an important perceptual cue. In this paper multiscale cues are use...
详细信息
Multiscale techniques have been used for many years in computervision. Recently multiscale edges have received attention in spectral graph methods as an important perceptual cue. In this paper multiscale cues are used in the context of max-flow/min-cut energy minimization. We formulate multiscale min-cut versions of three typical computervision applications, namely interactive segmentation, image restoration, and optical flow. We then solve across all scales simultaneously. This use of multiscale models and constraints leads to quantitatively and qualitatively improved experimental results.
A process is described to determine the shot accuracy of an automatic robotic pool playing system. The system comprises a ceiling-mounted gantry robot, a special purpose cue end-effector, a ceiling-mounted camera, and...
详细信息
We propose to use attribute grammars for recognizing normal events and detecting abnormal events in a video. Attribute grammars can describe constraints on features (attributes) in addition to the syntactic structure ...
详细信息
We propose to use attribute grammars for recognizing normal events and detecting abnormal events in a video. Attribute grammars can describe constraints on features (attributes) in addition to the syntactic structure of the input. Events are recognized using an extension of the Earley parser that handles attributes and concurrent event threads. Abnormal events are detected when the input does not follow syntax of the grammar or the attributes do not satisfy the constraints in the attribute grammar to some degree. We demonstrate the effectiveness of our method for the task of recognizing normal events and detecting anomalies in a parking lot.
In this paper we present a framework for tracking nonrigid facial landmarks by combining various visual cues at multiple levels of detail. Using a probabilistic framework consisting of a hierarchy of particle filters,...
详细信息
In this paper we present a framework for tracking nonrigid facial landmarks by combining various visual cues at multiple levels of detail. Using a probabilistic framework consisting of a hierarchy of particle filters, we are able to track individual facial landmarks using multiple visual cues at the local level, as well as tracking results at more coarse level of detail. This allows for the fusion of global and local cues in an efficient and robust manner. Testing is performed by tracking and classifying facial action codes obtained from the Cohn-Kanade AU-Coded Facial Expression Database.
We propose a novel facial tracking method that uses a distributed network of individual trackers whose interactions are modeled using coalitional game theory. Our tracking method maintains a high level of accuracy and...
详细信息
We propose a novel facial tracking method that uses a distributed network of individual trackers whose interactions are modeled using coalitional game theory. Our tracking method maintains a high level of accuracy and can negotiate surface deformations and occlusions. We tested the method on a substantial video set featuring non-trivial face motion from over 40 subjects in both the infrared and visual spectra. The coalitional tracker demonstrated fault tolerant behavior that exceeds by far the performance of single condensation trackers. Our method represents a shift from the typical tracking paradigms and may find broader application in demanding imaging problems across the electromagnetic spectrum.
We introduce the use of geodesic distances and geodesic radius for calculating pairwise similarities needed in various graph cuts based methods. By using geodesics on an edge strength function we are able to calculate...
详细信息
We introduce the use of geodesic distances and geodesic radius for calculating pairwise similarities needed in various graph cuts based methods. By using geodesics on an edge strength function we are able to calculate similarities between pixels in a more natural way. Our technique improves the speed and reliability of calculating similarities and leads to reasonably good image segmentation results. Our algorithm takes an edge strength function as its input and its speed is independent of the feature dimension or the distance measure used.
Recording dynamic events, such as a sports event, a ballet performance, or a lecture, digitally for experiencing in a spatiotemporally distant setting requires 4D capture: three dimensions for their geometry/ appearan...
详细信息
Recording dynamic events, such as a sports event, a ballet performance, or a lecture, digitally for experiencing in a spatiotemporally distant setting requires 4D capture: three dimensions for their geometry/ appearance over the fourth dimension of time. Cameras are suitable for this task as they are nonintrusive, universal, and inexpensive. computervision techniques have advanced sufficiently to make the 4D capture possible. In this paper, we present a historical perspective on the Virtualized RealityTM system developed since early 90s to early 2000 at CMU for the 4D capture of dynamic events.
Mobile-robot interception or rendezvous with a maneuvering target requires the target's pose to be tracked. This paper presents a novel 6 degree-of-freedom pose tracking algorithm. This algorithm incorporates an i...
详细信息
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within a portion of a document. Content-speci...
详细信息
暂无评论