[go: up one dir, main page]

Hooge et al., 2020 - Google Patents

Evaluating automated face identity-masking methods with human perception and a deep convolutional neural network

Hooge et al., 2020

View PDF @Full View
Document ID
813803822281909205
Author
Hooge K
Baragchizadeh A
Karnowski T
Bolme D
Ferrell R
Jesudasen P
Castillo C
O’toole A
Publication year
Publication venue
ACM Transactions on Applied Perception (TAP)

External Links

Snippet

Face de-identification (or “masking”) algorithms have been developed in response to the prevalent use of video recordings in public places. We evaluated the success of face identity masking for human perceivers and a deep convolutional neural network (DCNN). Eight de …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00275Holistic features and representations, i.e. based on the facial image taken as a whole
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation

Similar Documents

Publication Publication Date Title
Ravi et al. A review on visual privacy preservation techniques for active and assisted living
Bodla et al. Deep heterogeneous feature fusion for template-based face recognition
US20190138807A1 (en) Iris liveness detection for mobile devices
Tapia et al. Semantic segmentation of periocular near-infra-red eye images under alcohol effects
Majumdar et al. Facial retouching and alteration detection
Dutta et al. Facial Pain Expression Recognition in Real‐Time Videos
Hooge et al. Evaluating automated face identity-masking methods with human perception and a deep convolutional neural network
Hao et al. Robustness analysis of face obscuration
Khan et al. Person de-identification: a comprehensive review of methods, datasets, applications, and ethical aspects along with new dimensions
Ahmad et al. Event anonymization: Privacy-preserving person re-identification and pose estimation in event-based vision
Xu et al. Facial depth forgery detection based on image gradient
Chriskos et al. Face detection hindering
Zhang et al. Morphganformer: Transformer-based face morphing and de-morphing
Taj et al. A survey on embedding iris biometric watermarking for user authentication
Kuckreja et al. INDIFACE: Illuminating India's deepfake landscape with a comprehensive synthetic dataset
Bharadwaj et al. Deepfake detection for preventing Audio and Video frauds using Advanced Deep Learning Techniques
Li et al. Generative adversarial networks-based privacy-preserving 3D reconstruction
Chowdhury et al. Review on deep fake: A looming technological threat
Chen et al. An active security system based on ar smart classes and face recognition technology
Maity et al. Preserving privacy in video analytics: A comprehensive review of face de-identification and background blurring techniques
Orsten-Hooge et al. Evaluating the effectiveness of automated identity masking (AIM) methods with human perception and a deep convolutional neural network (CNN)
Ali et al. Biometric counter-spoofing for mobile devices using gaze information
Tyagi et al. A survey of unconstrained face recognition algorithm and its applications
Wen et al. Face De-identification: Safeguarding Identities in the Digital Era
Baragchizadeh et al. Evaluation of automated identity masking method (AIM) in naturalistic driving study (NDS)