2022
DOI: 10.1504/ijbm.2022.124683
|View full text |Cite
|
Sign up to set email alerts
|

DeepVeil: deep learning for identification of face, gender, expression recognition under veiled conditions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Our future efforts will be focused on overcoming the limitations listed above: To improve accent learning, fluent speakers must be removed from the speech database, simply because there is no accent information preserved in their recordings. In order to overcome the effect of female voices, our future approach will divide the dataset into two, one for males and one for females, then train the deep learning method on each to produce two models, which are then merged to improve recognition results, as done by [49,50]. In addition to collecting more data to increase the size of the dataset for better deep learning.…”
Section: Discussionmentioning
confidence: 99%
“…Our future efforts will be focused on overcoming the limitations listed above: To improve accent learning, fluent speakers must be removed from the speech database, simply because there is no accent information preserved in their recordings. In order to overcome the effect of female voices, our future approach will divide the dataset into two, one for males and one for females, then train the deep learning method on each to produce two models, which are then merged to improve recognition results, as done by [49,50]. In addition to collecting more data to increase the size of the dataset for better deep learning.…”
Section: Discussionmentioning
confidence: 99%
“…Another useful feature of smartphones is their capacity to support electronic payments, making mobile transactions and financial transactions more accessible [10]. Smartphones incorporate biometric authentication methods such as facial recognition [11], fingerprint identification [12,13], and palm-print identification [14,15], which are used not only for user recognition, but also for specialized applications such as identifying potential threats or terrorists [16,17].…”
Section: Introductionmentioning
confidence: 99%