2019
DOI: 10.1007/978-981-15-1304-6_15
|View full text |Cite
|
Sign up to set email alerts
|

Gait Analysis for Gender Classification in Forensics

Abstract: Gender Classification (GC) is a natural ability that belongs to the human beings. Recent improvements in computer vision provide the possibility to extract information for different classification/recognition purposes. Gender is a soft biometrics useful in video surveillance, especially in uncontrolled contexts such as low-light environments, with arbitrary poses, facial expressions, occlusions and motion blur. In this work we present a methodology for the construction of a gait analyzer. The methodology is di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…Once a suspicious behaviour is detected, Pepper can be alerted and go in the same room of the camera to check at short distance the identity of the subject. At the same time, soft biometric traits can be detected to perform an initial subject identification from traits like the gender [25] or facial attributes [26]. Those data have a threefold function: to help to identify a user before the involvement of Pepper; to detect a malicious intent also in low-resolution data; to furnish information to increase or decrease the trustworthiness of a subject.…”
Section: B Methods Built On Smart Camerasmentioning
confidence: 99%
“…Once a suspicious behaviour is detected, Pepper can be alerted and go in the same room of the camera to check at short distance the identity of the subject. At the same time, soft biometric traits can be detected to perform an initial subject identification from traits like the gender [25] or facial attributes [26]. Those data have a threefold function: to help to identify a user before the involvement of Pepper; to detect a malicious intent also in low-resolution data; to furnish information to increase or decrease the trustworthiness of a subject.…”
Section: B Methods Built On Smart Camerasmentioning
confidence: 99%
“…Various methodologies have been adopted to discriminate users; for example, distance measurements, such as Euclidean distance or the Manhattan distance, have been used to evaluate the similarity between acquired feature data and prebuilt user templates [26][27][28]. Modern, advanced computers have enabled conventional analytic methods with different distance metrics to be replaced by machine learning algorithms for biometric identification [17,18,20,32].…”
Section: Related Workmentioning
confidence: 99%
“…Behavioural authentication systems recognize behavioural biometrics; these are patterns of actions performed by the users such as keystroke and touch dynamics (typing and touchscreen usage patterns) [14][15][16][17][18], signature, and gait (walking patterns) [19,20]. Authentication is achieved by first recording the user's behaviours over a period of time, then constructing a specific model corresponding to the recorded behaviours, and finally comparing the created model and the newly observed user behaviours to determine whether a user is an authorized user.…”
Section: Introductionmentioning
confidence: 99%
“…Third, the proposed compound scaling of EfficientPose assumes that the scaling relationship between resolution, width, and depth, as defined by (2), is identical in HPE and image classification. However, the optimal compound scaling coefficients might be different for HPE, where the precision level is more dependent on image resolution, than for image classification.…”
Section: Avenues For Further Researchmentioning
confidence: 99%
“…Moreover, by spending 160 billion floating-point operations (GFLOPs) per inference, OpenPose is considered highly inefficient. Despite these issues, OpenPose seems to remain a commonly applied network for single-person HPE performing markerless motion capture from which critical decisions are based upon [2,56].…”
mentioning
confidence: 99%