-
1
-
-
34249661090
-
Synergistic face detection and pose estimation with energy-based models
-
May
-
M. Osadchy, Y. LeCun, and M. Miller, "Synergistic face detection and pose estimation with energy-based models," Journal of Machine Learning Research, vol. 8, pp. 1197-1215, May 2007.
-
(2007)
Journal of Machine Learning Research
, vol.8
, pp. 1197-1215
-
-
Osadchy, M.1
LeCun, Y.2
Miller, M.3
-
3
-
-
52049107821
-
Biometric binary string generation with detection rate optimized bit allocation
-
C. Chen, R. Veldhuis, T. Kevenaar, and A. Akkermans, "Biometric binary string generation with detection rate optimized bit allocation," in CVPR Workshop on Biometrics, 2008, pp. 1-7.
-
(2008)
CVPR Workshop on Biometrics
, pp. 1-7
-
-
Chen, C.1
Veldhuis, R.2
Kevenaar, T.3
Akkermans, A.4
-
4
-
-
0034290919
-
The FERET evaluation methodology for face-recognition algorithms
-
P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss, "The FERET evaluation methodology for face-recognition algorithms," PAMI, vol. 22, no. 10, pp. 1090-1104, 2000.
-
(2000)
PAMI
, vol.22
, Issue.10
, pp. 1090-1104
-
-
Phillips, P.J.1
Moon, H.2
Rizvi, S.A.3
Rauss, P.J.4
-
5
-
-
0347380229
-
The CMU pose, illumination, and expression database
-
T. Sim, S. Baker, and M. Bsat, "The CMU pose, illumination, and expression database," PAMI, vol. 25, pp. 1615-1618, 2003.
-
(2003)
PAMI
, vol.25
, pp. 1615-1618
-
-
Sim, T.1
Baker, S.2
Bsat, M.3
-
7
-
-
26444609828
-
Capacity and examples of templateprotecting biométrie authentication systems
-
P. Tuyls and J. Goseling, "Capacity and examples of templateprotecting biométrie authentication systems," in ECCV Workshop BioAW, 2004.
-
(2004)
ECCV Workshop BioAW
-
-
Tuyls, P.1
Goseling, J.2
-
8
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
9
-
-
0031187307
-
Face recognition: The problem of compensating for changes in illumination direction
-
Y Adini, Y Moses, and S. Ullman, "Face recognition: the problem of compensating for changes in illumination direction," PAMI, vol. 19, no. 7, pp. 721-732, 1997.
-
(1997)
PAMI
, vol.19
, Issue.7
, pp. 721-732
-
-
Adini, Y.1
Moses, Y.2
Ullman, S.3
-
10
-
-
0026065565
-
Eigenfaces for recognition
-
M. Turk and A. Pentland, "Eigenfaces for recognition," Journal of Cognitive Neuroscience, vol. 3, no. 1, pp. 71-86, 1991.
-
(1991)
Journal of Cognitive Neuroscience
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.1
Pentland, A.2
-
11
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," PAMI, vol. 29, no. 4, pp. 561-572, 2007.
-
(2007)
PAMI
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
12
-
-
33750799305
-
Robust distance measures for face-recognition supporting revocable biometrie tokens
-
T. Boult, "Robust distance measures for face-recognition supporting revocable biometrie tokens," in IEEE, 7th Intl. Confi. on Automatic Face and Gesture Recognition, 2006, pp. 560-566.
-
(2006)
IEEE, 7th Intl. Confi. on Automatic Face and Gesture Recognition
, pp. 560-566
-
-
Boult, T.1
-
13
-
-
33745857614
-
Blind vision
-
S. Avidan and M. Butman, "Blind vision," in ECCV (3). Springer, 2006, pp. 1-13.
-
(2006)
ECCV
, vol.3
, pp. 1-13
-
-
Avidan, S.1
Butman, M.2
-
14
-
-
20844455524
-
Enabling video privacy through computer vision
-
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, A. Ekin, J. Connell, C. R Shu, and M. Lu, "Enabling video privacy through computer vision," IEEE Security and Privacy, vol. 3, no. 3, pp. 50-57, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 50-57
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
Connell, J.7
Shu, C.R.8
Lu, M.9
-
16
-
-
14644429006
-
Preserving privacy by de-identifying face images
-
E. M. Newton, L. Sweeney, and B. Malin, "Preserving privacy by de-identifying face images," IEEE Trans, on Knowl. and Data Eng., vol. 17, no. 2, pp. 232-243, 2005.
-
(2005)
IEEE Trans, on Knowl. and Data Eng.
, vol.17
, Issue.2
, pp. 232-243
-
-
Newton, E.M.1
Sweeney, L.2
Malin, B.3
-
18
-
-
51349121612
-
Respectful cameras: Detecting visual markers in realtime to address privacy concerns
-
J. Schiff, M. Meingast, D. Mulligan, S. Sastry, and K. Goldberg, "Respectful cameras: Detecting visual markers in realtime to address privacy concerns," in Int. Conf on Intelligent Robots and Systems (IROS), 2007, pp. 971-978.
-
(2007)
Int. Conf on Intelligent Robots and Systems (IROS)
, pp. 971-978
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.3
Sastry, S.4
Goldberg, K.5
-
19
-
-
0022882770
-
How to generate and exchange secrets
-
A. Yao, "How to generate and exchange secrets," in FOCS, 1986, pp. 162-167.
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.1
-
21
-
-
77949825199
-
Privacy-preserving face recognition
-
Springer
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Proc, of the 9th International Symposium on Privacy Enhancing Technologies (PET). Springer, 2009, p. 253.
-
(2009)
Proc, of the 9th International Symposium on Privacy Enhancing Technologies (PET)
, pp. 253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
22
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
Springer
-
A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient Privacy-Preserving Face Recognition," in 12th International Conference on Information Security and Cryptology (ICISC09), LNCS. Springer, 2009.
-
(2009)
12th International Conference on Information Security and Cryptology (ICISC09), LNCS
-
-
Sadeghi, A.1
Schneider, T.2
Wehrenberg, I.3
-
23
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
D. G. Lowe, "Distinctive image features from scale-invariant keypoints," IJCV, vol. 60, no. 2, pp. 91-110, 2004.
-
(2004)
IJCV
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.G.1
-
24
-
-
77955183060
-
Automatic detection of face and facial features
-
C. T. Yuen, M. Rizon, W. S. San, and M. Sugisaka, "Automatic detection of face and facial features," in ISPRA'08, 2008, pp. 230-234.
-
(2008)
ISPRA'08
, pp. 230-234
-
-
Yuen, C.T.1
Rizon, M.2
San, W.S.3
Sugisaka, M.4
-
25
-
-
15744382474
-
Facial features detection robust to pose, illumination and identity
-
N. Gourier, D. Hall, and J. L. Crowley, "Facial features detection robust to pose, illumination and identity," in Int'l Confi. on Systems Man and Cybernetics, 2004.
-
(2004)
Int'l Confi. on Systems Man and Cybernetics
-
-
Gourier, N.1
Hall, D.2
Crowley, J.L.3
-
26
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999, pp. 223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
27
-
-
22044454088
-
Computationally secure oblivious transfer
-
M. Naor and B. Pinkas, "Computationally secure oblivious transfer," J. Cryptology, vol. 18, no. 1, pp. 1-35, 2005.
-
(2005)
J. Cryptology
, vol.18
, Issue.1
, pp. 1-35
-
-
Naor, M.1
Pinkas, B.2
-
29
-
-
0001539365
-
On economical construction of the transitive closure of an oriented graph
-
V. Arlazarov, E. Dinic, M. Kronrod, and I. Faradzev, "On economical construction of the transitive closure of an oriented graph," in Soviet Math. Dokl, vol. 11, no. 1209-1210.
-
Soviet Math. Dokl
, vol.11
, Issue.1209-1210
-
-
Arlazarov, V.1
Dinic, E.2
Kronrod, M.3
Faradzev, I.4
-
30
-
-
38049082907
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
S. P. Vadhan, Ed. Springer
-
Y. Aumann and Y. Lindell, "Security against covert adversaries: Efficient protocols for realistic adversaries," in TCC, ser. Lecture Notes in Computer Science, S. P. Vadhan, Ed., vol. 4392. Springer, 2007, pp. 137-156.
-
(2007)
TCC, Ser. Lecture Notes in Computer Science
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
31
-
-
84937559183
-
Face identification by fitting a 3d morphable model using linear shape and texture error functions
-
S. Romdhani, V. Blanz, and T. Vetter, "Face identification by fitting a 3d morphable model using linear shape and texture error functions," in ECCV, 2002, pp. 3-19.
-
(2002)
ECCV
, pp. 3-19
-
-
Romdhani, S.1
Blanz, V.2
Vetter, T.3
-
32
-
-
35148890332
-
Face re-lighting from a single image under harsh lighting conditions
-
Y. Wang, Z. Liu, G. Hua, Z. Wen, Z. Zhang, and D. Samaras, "Face re-lighting from a single image under harsh lighting conditions," in CVPR, vol. 1, 2007, pp. 1-8.
-
(2007)
CVPR
, vol.1
, pp. 1-8
-
-
Wang, Y.1
Liu, Z.2
Hua, G.3
Wen, Z.4
Zhang, Z.5
Samaras, D.6
-
33
-
-
33947167478
-
Face description with local binary patterns: Application to face recognition
-
T. Ahonen, A. Hadid, and M. Pietikainen, "Face description with local binary patterns: Application to face recognition," PAMI, vol. 28, no. 12, pp. 2037-2041, 2006.
-
(2006)
PAMI
, vol.28
, Issue.12
, pp. 2037-2041
-
-
Ahonen, T.1
Hadid, A.2
Pietikainen, M.3
|