2014
DOI: 10.1109/tifs.2014.2359577
|View full text |Cite
|
Sign up to set email alerts
|

Unconstrained Face Recognition: Identifying a Person of Interest From a Media Collection

Abstract: Abstract-As face recognition applications progress from constrained sensing and cooperative subjects scenarios (e.g., driver's license and passport photos) to unconstrained scenarios with uncooperative subjects (e.g., video surveillance), new challenges are encountered. These challenges are due to variations in ambient illumination, image resolution, background clutter, facial pose, expression, and occlusion. In forensic investigations where the goal is to identify a "person of interest," often based on low qu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
128
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 195 publications
(130 citation statements)
references
References 31 publications
2
128
0
Order By: Relevance
“…The options for localizing a component on the face are limited, and therefore achieving the desired alignment of components is also challenging. In total, 75 software-generated [28]. The subject shown is MarieJosee Croze.…”
Section: B Software-generated Compositesmentioning
confidence: 99%
See 3 more Smart Citations
“…The options for localizing a component on the face are limited, and therefore achieving the desired alignment of components is also challenging. In total, 75 software-generated [28]. The subject shown is MarieJosee Croze.…”
Section: B Software-generated Compositesmentioning
confidence: 99%
“…We investigate the possibility of using this form of facial composite to improve upon the matching performance of COTS matchers using a set of (surveillance composite, mugshot) pairs provided to us by the PCSO (Fig. 4) and a set of pairs from [28] (Fig. 5).…”
Section: Surveillance Compositesmentioning
confidence: 99%
See 2 more Smart Citations
“…The protected preparing of individual information in the cloud speaks to an enormous test. Appropriation of security upgrading advances to help such exercises in the cloud will rely on the presence of uniform methods for taking care of individual information at the worldwide level and on specialized gauges which can show consistence with lawful and administrative frameworks [11]. The computational asset force of the progression can be constraints of information de-duplication.…”
Section: Limitations and Concernsmentioning
confidence: 99%