Hooge et al., 2020 - Google Patents
Evaluating automated face identity-masking methods with human perception and a deep convolutional neural networkHooge et al., 2020
View PDF- Document ID
- 813803822281909205
- Author
- Hooge K
- Baragchizadeh A
- Karnowski T
- Bolme D
- Ferrell R
- Jesudasen P
- Castillo C
- O’toole A
- Publication year
- Publication venue
- ACM Transactions on Applied Perception (TAP)
External Links
Snippet
Face de-identification (or “masking”) algorithms have been developed in response to the prevalent use of video recordings in public places. We evaluated the success of face identity masking for human perceivers and a deep convolutional neural network (DCNN). Eight de …
- 241000282414 Homo sapiens 0 title abstract description 47
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00275—Holistic features and representations, i.e. based on the facial image taken as a whole
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ravi et al. | A review on visual privacy preservation techniques for active and assisted living | |
| Bodla et al. | Deep heterogeneous feature fusion for template-based face recognition | |
| US20190138807A1 (en) | Iris liveness detection for mobile devices | |
| Tapia et al. | Semantic segmentation of periocular near-infra-red eye images under alcohol effects | |
| Majumdar et al. | Facial retouching and alteration detection | |
| Dutta et al. | Facial Pain Expression Recognition in Real‐Time Videos | |
| Hooge et al. | Evaluating automated face identity-masking methods with human perception and a deep convolutional neural network | |
| Hao et al. | Robustness analysis of face obscuration | |
| Khan et al. | Person de-identification: a comprehensive review of methods, datasets, applications, and ethical aspects along with new dimensions | |
| Ahmad et al. | Event anonymization: Privacy-preserving person re-identification and pose estimation in event-based vision | |
| Xu et al. | Facial depth forgery detection based on image gradient | |
| Chriskos et al. | Face detection hindering | |
| Zhang et al. | Morphganformer: Transformer-based face morphing and de-morphing | |
| Taj et al. | A survey on embedding iris biometric watermarking for user authentication | |
| Kuckreja et al. | INDIFACE: Illuminating India's deepfake landscape with a comprehensive synthetic dataset | |
| Bharadwaj et al. | Deepfake detection for preventing Audio and Video frauds using Advanced Deep Learning Techniques | |
| Li et al. | Generative adversarial networks-based privacy-preserving 3D reconstruction | |
| Chowdhury et al. | Review on deep fake: A looming technological threat | |
| Chen et al. | An active security system based on ar smart classes and face recognition technology | |
| Maity et al. | Preserving privacy in video analytics: A comprehensive review of face de-identification and background blurring techniques | |
| Orsten-Hooge et al. | Evaluating the effectiveness of automated identity masking (AIM) methods with human perception and a deep convolutional neural network (CNN) | |
| Ali et al. | Biometric counter-spoofing for mobile devices using gaze information | |
| Tyagi et al. | A survey of unconstrained face recognition algorithm and its applications | |
| Wen et al. | Face De-identification: Safeguarding Identities in the Digital Era | |
| Baragchizadeh et al. | Evaluation of automated identity masking method (AIM) in naturalistic driving study (NDS) |