-
1
-
-
84901294727
-
Wireless smart camera networks for the surveillance of public spaces
-
K. Abas, C. Porto, and K. Obraczka Wireless smart camera networks for the surveillance of public spaces IEEE Comput. 47 5 2014 37 44
-
(2014)
IEEE Comput.
, vol.47
, Issue.5
, pp. 37-44
-
-
Abas, K.1
Porto, C.2
Obraczka, K.3
-
2
-
-
77955848775
-
Survey on contemporary remote surveillance systems for public safety
-
D.T. Raty Survey on contemporary remote surveillance systems for public safety IEEE Trans. Syst., Man., Cybern. - Part C 40 5 2010 493 515
-
(2010)
IEEE Trans. Syst., Man., Cybern. - Part C
, vol.40
, Issue.5
, pp. 493-515
-
-
Raty, D.T.1
-
3
-
-
84906947405
-
-
Yale University Press New Haven & London
-
D.J. Solove Nothing to Hide 2011 Yale University Press New Haven & London
-
(2011)
Nothing to Hide
-
-
Solove, D.J.1
-
4
-
-
85032751373
-
Privacy in video surveillance
-
A. Cavallaro Privacy in video surveillance IEEE Signal Process. Mag. 24 2 2007 168 169
-
(2007)
IEEE Signal Process. Mag.
, vol.24
, Issue.2
, pp. 168-169
-
-
Cavallaro, A.1
-
5
-
-
84892252567
-
Privacy protection in a video surveillance system
-
A. Senior, Springer Dordrecht
-
A. Senior Privacy protection in a video surveillance system A. Senior, Protecting Privacy in Video Surveillance 2009 Springer Dordrecht 35 47
-
(2009)
Protecting Privacy in Video Surveillance
, pp. 35-47
-
-
Senior, A.1
-
6
-
-
84952924550
-
-
St. Martin's Press New York
-
J. Angwin Dragnet Nation 2015 St. Martin's Press New York
-
(2015)
Dragnet Nation
-
-
Angwin, J.1
-
7
-
-
84974726992
-
-
plato (accessed 12.06.14)
-
plato, (http://plato.stanford.edu), (2009) (accessed 12.06.14).
-
(2009)
-
-
-
8
-
-
0000320829
-
The Right to Privacy
-
(accessed 02.06. 14)
-
S.D. Warren, and L.D. Brandeis The Right to Privacy Harv. Law Rev. IV 5 1890 (http://readingnewengland.org/app/books/righttoprivacy/) (accessed 02.06. 14)
-
(1890)
Harv. Law Rev.
, vol.4
, Issue.5
-
-
Warren, S.D.1
Brandeis, L.D.2
-
11
-
-
84930583063
-
Security and privacy in biometrics: Towards a holistic approach
-
P. Campisi, Springer
-
P. Campisi Security and privacy in biometrics: towards a holistic approach P. Campisi, Privacy and Security in Biometrics 2013 Springer 1 24
-
(2013)
Privacy and Security in Biometrics
, pp. 1-24
-
-
Campisi, P.1
-
12
-
-
84974685454
-
-
Peck v United Kingdom, Reference Date of Judgment 28 Jan 2003. (accessed 04.11.15)
-
Peck v United Kingdom, Reference (2003) 36 EHRR 41; [2003] EMLR 287 Court European Court of Human Rights, Date of Judgment 28 Jan 2003. (http://www.worldlii.org/eu/cases/ECHR/2003/44.html) (accessed 04.11.15).
-
(2003)
36 EHRR 41; [2003] EMLR 287 Court European Court of Human Rights
-
-
-
14
-
-
84910038657
-
Standardization of biometric template protection
-
S. Rane Standardization of biometric template protection IEEE Multimed. 21 4 2014 94 99
-
(2014)
IEEE Multimed.
, vol.21
, Issue.4
, pp. 94-99
-
-
Rane, S.1
-
15
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
M. Savvides, B.V.K. Vijaya Kumar, P.K. Khosla, Cancelable biometric filters for face recognition, in: Proceedings of the International Conference on Pattern Recognition (ICPR) 3, 2004, pp. 922-925
-
(2004)
Proceedings of the International Conference on Pattern Recognition (ICPR)
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Vijaya Kumar, B.V.K.2
Khosla, P.K.3
-
16
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N.K. Ratha, S. Chikkerur, J.H. Connell, and R.M. Bolle Generating cancelable fingerprint templates IEEE Trans. Pattern Anal. Mach. Intell. 29 4 2007 561 572
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
17
-
-
33747624401
-
Combining cryptography with biometrics effectively
-
F. Hao, R. Anderson, and J. Daugman Combining cryptography with biometrics effectively IEEE Trans. Comput. 55 9 2006 1081 1088
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
18
-
-
54049133294
-
Cancelable voiceprint templates based on knowledge signatures
-
W. Xu, Q. He, Y. L,i T. Li, Cancelable voiceprint templates based on knowledge signatures, in: Proceedings of the International Symposium on Electronic Commerce and Security, 2008, pp. 412-415
-
(2008)
Proceedings of the International Symposium on Electronic Commerce and Security
, pp. 412-415
-
-
Xu, W.1
He, Q.2
Li, Y.3
Li, T.4
-
19
-
-
84879085385
-
A survey on biometric cryptosystems and cancelable biometrics
-
(accessed 10.01.15)
-
C. Rathgeb, and A. Uhl A survey on biometric cryptosystems and cancelable biometrics EURASIP J. Inf. Secur. 3 2011 2011 1 25 (http://jis.eurasipjournals.com/content/2011/1/3) (accessed 10.01.15)
-
(2011)
EURASIP J. Inf. Secur.
, vol.3
, Issue.2011
, pp. 1-25
-
-
Rathgeb, C.1
Uhl, A.2
-
22
-
-
33749406379
-
Ethical considerations in the conduct of electronic surveillance research
-
A.J. Bharucha, A.J. London, D. Barnard, H. Wactlar, M.A. Dew, and C.F. Reynolds III Ethical considerations in the conduct of electronic surveillance research J. Law, Med. Ethic. 2006 1 10
-
(2006)
J. Law, Med. Ethic.
, pp. 1-10
-
-
Bharucha, A.J.1
London, A.J.2
Barnard, D.3
Wactlar, H.4
Dew, M.A.5
Reynolds, C.F.6
-
26
-
-
0345817194
-
Privacy and power: Computer databases and metaphors for information privacy
-
D.J. Solove Privacy and power: computer databases and metaphors for information privacy 53 Stan. L. Rev. 1393 2001 1393 1461
-
(2001)
53 Stan. L. Rev.
, vol.1393
, pp. 1393-1461
-
-
Solove, D.J.1
-
27
-
-
0038443128
-
Privacy legislation: A comparison of the US and European approaches
-
S. Hinde Privacy legislation: a comparison of the US and European approaches Comput. Secur. 22 5 2003 378 387
-
(2003)
Comput. Secur.
, vol.22
, Issue.5
, pp. 378-387
-
-
Hinde, S.1
-
28
-
-
79960738039
-
U.S. and EU privacy policy: Comparison of regulatory approaches
-
B.L. Movius, and N. Krup U.S. and EU privacy policy: comparison of regulatory approaches Int. Journal. Commun. 3 2009 169 187
-
(2009)
Int. Journal. Commun.
, vol.3
, pp. 169-187
-
-
Movius, B.L.1
Krup, N.2
-
30
-
-
84974723336
-
-
(accessed 04.05.16)
-
Reform of EU Data Protection Rules, (2016). (http://ec.europa.eu/justice/data-protection/reform/index-en.htm) (accessed 04.05.16).
-
(2016)
Reform of EU Data Protection Rules
-
-
-
34
-
-
84974719087
-
-
(accessed 07.11.15)
-
A. Cavoukian Privacy by Design 2010 1 2 (https://www.privacybydesign.ca) (accessed 07.11.15)
-
(2010)
Privacy by Design
, pp. 1-2
-
-
Cavoukian, A.1
-
35
-
-
84857186746
-
The de-identification camera
-
M. Mrityunjay, P.J. Narayanan, The de-identification camera, in: Proceedings of the 3rd Natlional Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, 2011, pp. 192-195.
-
(2011)
Proceedings of the 3rd Natlional Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics
, pp. 192-195
-
-
Mrityunjay, M.1
Narayanan, P.J.2
-
36
-
-
84979529456
-
Practical Implications of Sharing Data: A Primer on Data Privacy
-
(accessed 25.06. 15)
-
G.S. Nelson Practical Implications of Sharing Data: A Primer on Data Privacy Anonymization, and De-Identification 2015 1 23 (http://thotwave.com/wp-content/uploads/2015/09/data-sharing-privacy-anonymization-and-de-identification-rev-13.pdf) (accessed 25.06. 15)
-
(2015)
Anonymization, and De-Identification
, pp. 1-23
-
-
Nelson, G.S.1
-
40
-
-
84974732641
-
-
(accessed 15.12.14)
-
HIPAA, (2014), (http://www.hhs.gov/ocr/hipaa) (accessed 15.12.14).
-
(2014)
HIPAA
-
-
-
41
-
-
79951510766
-
Bag of soft biometrics for person identification
-
A. Dantcheva, C. Velardo, A. D'Angelo, and J. - L. Dugelay Bag of soft biometrics for person identification Multimed. Tools Appl. 51 2 2011 739 777
-
(2011)
Multimed. Tools Appl.
, vol.51
, Issue.2
, pp. 739-777
-
-
Dantcheva, A.1
Velardo, C.2
D'Angelo, A.3
Dugelay, J.-L.4
-
42
-
-
33646138841
-
Soft biometric traits for personal recognition systems
-
A.K. Jain, S.C. Dass, K. Nandakumar, Soft biometric traits for personal recognition systems, in: Proceedings of the International Conference on Biometric Authentication, 2004, pp. 731-738.
-
(2004)
Proceedings of the International Conference on Biometric Authentication
, pp. 731-738
-
-
Jain, A.K.1
Dass, S.C.2
Nandakumar, K.3
-
44
-
-
50649114172
-
Automated de-identification of free-text medical records
-
I. Neamatullah, M.M. Douglass, L.H. Lehman, A. Reisner, M. Viallarroel, W.J. Long, and et al. Automated de-identification of free-text medical records BMC Med. Inform. Decis. Mak. 8 32 2008 1 73
-
(2008)
BMC Med. Inform. Decis. Mak.
, vol.8
, Issue.32
, pp. 1-73
-
-
Neamatullah, I.1
Douglass, M.M.2
Lehman, L.H.3
Reisner, A.4
Viallarroel, M.5
Long, W.J.6
-
45
-
-
0030333205
-
Replacing personally-identifying information in medical records, the Scrub system
-
L. Sweeney, Replacing personally-identifying information in medical records, the Scrub system, in: Proceedings of the AMIA Annual Fall Symposium, 1996, pp. 333-337.
-
(1996)
Proceedings of the AMIA Annual Fall Symposium
, pp. 333-337
-
-
Sweeney, L.1
-
46
-
-
0003529621
-
-
Ph.D. Thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
-
L. Sweeney, Computational disclosure control: a primer on data privacy protection, Ph.D. Thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, (2001) 216 pages.
-
(2001)
Computational Disclosure Control: A Primer on Data Privacy Protection
, pp. 216
-
-
Sweeney, L.1
-
48
-
-
34548508913
-
Evaluating the state-of-the-art in automatic de-identification
-
Ö. Uzuner, Y. Luo, and P. Szolovits Evaluating the state-of-the-art in automatic de-identification J. Am. Med. Inform. Assoc. 14 5 2007 550 563
-
(2007)
J. Am. Med. Inform. Assoc.
, vol.14
, Issue.5
, pp. 550-563
-
-
Uzuner, Ö.1
Luo, Y.2
Szolovits, P.3
-
50
-
-
77953185711
-
Attribute and simile classifiers for face verification
-
N. Kumar, A.C. Berg, P.N. Belhumeur, S.K. Nayar, Attribute and simile classifiers for face verification, in: Proceedings of the 12th IEEE International Conference on Computer Vision (ICCV), 2009, pp. 365-372
-
(2009)
Proceedings of the 12th IEEE International Conference on Computer Vision (ICCV)
, pp. 365-372
-
-
Kumar, N.1
Berg, A.C.2
Belhumeur, P.N.3
Nayar, S.K.4
-
51
-
-
52149106021
-
Method of human hair for hair sketching
-
M. Feng, Z. Kun, S. Nong, A. Classified, Method of human hair for hair sketching, in: Proceedings of the Congress on Image Signal Process. (CISP), 4, 2008, pp. 109-114
-
(2008)
Proceedings of the Congress on Image Signal Process. (CISP)
, vol.4
, pp. 109-114
-
-
Feng, M.1
Kun, Z.2
Nong, S.3
Classified, A.4
-
53
-
-
0035716623
-
Solving a dress problem for a human model recognition
-
M. Rahman, H.S. Kim, S. Ishikawa, Solving a dress problem for a human model recognition, in: Proceedings of the Society of Instruents Controls and Engineering (SICE), 2001, pp. 210-213
-
(2001)
Proceedings of the Society of Instruents Controls and Engineering (SICE)
, pp. 210-213
-
-
Rahman, M.1
Kim, H.S.2
Ishikawa, S.3
-
54
-
-
84892236866
-
Protecting personal identification in video
-
A. Senior, Springer Dordrecht
-
D. Chen, Y. Chang, R. Yan, and J. Yang Protecting personal identification in video A. Senior, Protecting Privacy in Video Surveillance 2009 Springer Dordrecht 115 128
-
(2009)
Protecting Privacy in Video Surveillance
, pp. 115-128
-
-
Chen, D.1
Chang, Y.2
Yan, R.3
Yang, J.4
-
57
-
-
77953196425
-
Large-scale privacy protection in google street view
-
A. Frome, G. Cheung, A. Abdulkader, M. Zennaro, B. Wu, A. Bissacco, H. Neven, L. Vincent, Large-scale privacy protection in google street view, in: Proceedings of the IEEE 12th International Conference on Computer Vision (ICCV), 2009, pp. 2373-2380
-
(2009)
Proceedings of the IEEE 12th International Conference on Computer Vision (ICCV)
, pp. 2373-2380
-
-
Frome, A.1
Cheung, G.2
Abdulkader, A.3
Zennaro, M.4
Wu, B.5
Bissacco, A.6
Neven, H.7
Vincent, L.8
-
58
-
-
0033682228
-
A statistical method for 3D object detection applied to faces and cars
-
H. Schneiderman, T. Kanade, A statistical method for 3D object detection applied to faces and cars, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), I, 2001, pp. 746-751
-
(2001)
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
, vol.1
, pp. 746-751
-
-
Schneiderman, H.1
Kanade, T.2
-
59
-
-
2142812371
-
Robust real-time face detection
-
P. Viola, and M.J. Jones Robust real-time face detection Int. J. Comput. Vis. 57 2 2004 137 154
-
(2004)
Int. J. Comput. Vis.
, vol.57
, Issue.2
, pp. 137-154
-
-
Viola, P.1
Jones, M.J.2
-
63
-
-
33746062776
-
Blur filtration fails to preserve privacy for home - Based video conferencing
-
C. Neustaedter, S. Greenberg, and M. Boyle Blur filtration fails to preserve privacy for home - based video conferencing ACM Trans. Comput. Human. Interact. 13 issue 1 2006 1 36
-
(2006)
ACM Trans. Comput. Human. Interact.
, vol.13
, Issue.1
, pp. 1-36
-
-
Neustaedter, C.1
Greenberg, S.2
Boyle, M.3
-
64
-
-
84974656312
-
-
cmu-pie, (accessed 02. 11.12)
-
cmu-pie, (http://www.computervisiononline.com/dataset/cmu-pie-database) (accessed 02. 11.12)
-
-
-
-
66
-
-
33845527694
-
Model-based face de-identification
-
R. Gross, L. Sweeney, F. de la Torre, S. Baker, Model-based face de-identification, in: Proceedings of the Conference on Computer Vision. Pattern Recognit. Workshop (CVPRW), 2006, pp. 161-169
-
(2006)
Proceedings of the Conference on Computer Vision. Pattern Recognit. Workshop (CVPRW)
, pp. 161-169
-
-
Gross, R.1
Sweeney, L.2
De La Torre, F.3
Baker, S.4
-
67
-
-
26444533425
-
Privacy operating characteristic for privacy protection in surveillance applications
-
T. Kanade, A.K. Jain, N.K. Ratha, Springer Berlin
-
P.J. Phillips Privacy operating characteristic for privacy protection in surveillance applications T. Kanade, A.K. Jain, N.K. Ratha, Audio- and Video-Based Biometric Person Authentication, Lecture Notes in Computer Science (LNCS) 3546 2005 Springer Berlin 869 878
-
(2005)
Audio- And Video-Based Biometric Person Authentication, Lecture Notes in Computer Science (LNCS)
, vol.3546
, pp. 869-878
-
-
Phillips, P.J.1
-
69
-
-
33746083254
-
Integrating utility into face de-identification
-
G. Danezis, D. Martin, Springer Berlin
-
R. Gross, E. Airoldi, B. Malin, and L. Sweeney Integrating utility into face de-identification G. Danezis, D. Martin, PET - Privacy Enhancing Technologies 2005, Lecture Notes in Computer Science (LNCS) vol. 3856 2006 Springer Berlin 227 242
-
(2006)
PET - Privacy Enhancing Technologies 2005, Lecture Notes in Computer Science (LNCS)
, vol.3856
, pp. 227-242
-
-
Gross, R.1
Airoldi, E.2
Malin, B.3
Sweeney, L.4
-
70
-
-
84892312834
-
Face de-identification
-
A. Senior, Springer Dordrecht
-
R. Gross, L. Sweeney, J. Cohn, F. de la Torre, and S. Baker Face de-identification A. Senior, Protecting Privacy in Video Surveillance 2009 Springer Dordrecht 129 146
-
(2009)
Protecting Privacy in Video Surveillance
, pp. 129-146
-
-
Gross, R.1
Sweeney, L.2
Cohn, J.3
De La Torre, F.4
Baker, S.5
-
73
-
-
84974727717
-
Retaining expressions on de-identified faces
-
L. Meng, Z. Sun, A. Ariyaeeinia, and K.L. Bennett Retaining expressions on de-identified faces Proc. Spec. Sess. Biom., Forensics, De.-Identif. Priv. Prot. (BiForD) 2014 27 32
-
(2014)
Proc. Spec. Sess. Biom., Forensics, De.-Identif. Priv. Prot. (BiForD)
, pp. 27-32
-
-
Meng, L.1
Sun, Z.2
Ariyaeeinia, A.3
Bennett, K.L.4
-
83
-
-
84866667680
-
Face detection, pose estimation, and landmark localization in the wild
-
X. Zhu, D. Ramanan, Face detection, pose estimation, and landmark localization in the wild Proc. Conf. Comput. Vision. Pattern Recognit. (CVPR) 2012, pp. 2879-2886
-
(2012)
Proc. Conf. Comput. Vision. Pattern Recognit. (CVPR)
, pp. 2879-2886
-
-
Zhu, X.1
Ramanan, D.2
-
86
-
-
84903622275
-
Fast feature pyramids for object detection
-
P. Dollár, R. Appel, S. Belongie, and P. Per Fast feature pyramids for object detection IEEE Trans. Pattern Anal. Mach. Intell. 36 8 2014 1532 1545
-
(2014)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.36
, Issue.8
, pp. 1532-1545
-
-
Dollár, P.1
Appel, R.2
Belongie, S.3
Per, P.4
-
91
-
-
0033682434
-
Real-time tracking of non-rigid objects using mean shift
-
D. Comaniciu, V. Ramesh, P. Meer, Real-time tracking of non-rigid objects using mean shift, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2, 2000, pp. 142-149
-
(2000)
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
, vol.2
, pp. 142-149
-
-
Comaniciu, D.1
Ramesh, V.2
Meer, P.3
-
93
-
-
84909956620
-
Adaptive cartooning for privacy protection in camera networks
-
A. Erdely, T. Barat, P. Valet, T. Winkler, B. Rinner, Adaptive cartooning for privacy protection in camera networks, in: Proceedings of the 11th IEEE International Conference on Advanced Video Signal Based Surveillance (AVSS), 2014, pp. 26-29
-
(2014)
Proceedings of the 11th IEEE International Conference on Advanced Video Signal Based Surveillance (AVSS)
, pp. 26-29
-
-
Erdely, A.1
Barat, T.2
Valet, P.3
Winkler, T.4
Rinner, B.5
-
94
-
-
50549104583
-
Scrambling for privacy protection in video surveillance systems
-
F. Dufaux, and T. Ebrahimi Scrambling for privacy protection in video surveillance systems IEEE Trans. Circuits Syst. Video Technol. 18 8 2008 1168 1174
-
(2008)
IEEE Trans. Circuits Syst. Video Technol.
, vol.18
, Issue.8
, pp. 1168-1174
-
-
Dufaux, F.1
Ebrahimi, T.2
-
96
-
-
79952858532
-
Respectful cameras: Detecting visual markers in real-time to address privacy concerns
-
A. Senior, Springer Dordrecht
-
J. Schiff, M. Meingast, D.K. Mulligan, S. Sastry, and K. Goldberg Respectful cameras: detecting visual markers in real-time to address privacy concerns A. Senior, Protecting Privacy in Video Surveillance 2009 Springer Dordrecht 65 89
-
(2009)
Protecting Privacy in Video Surveillance
, pp. 65-89
-
-
Schiff, J.1
Meingast, M.2
Mulligan, D.K.3
Sastry, S.4
Goldberg, K.5
-
100
-
-
84974713050
-
Privacy and data protection implications of the civil use of drones
-
(accessed 13.11.15)
-
O. Marzocchi Privacy and data protection implications of the civil use of drones PE 519. 221 2015 1 34 (http://www.europarl.europa.eu/RegData/etudes/IDAN/2015/519221/IPOL-IDA%282015%29519221-EN.pdf) (accessed 13.11.15)
-
(2015)
PE 519. 221
, pp. 1-34
-
-
Marzocchi, O.1
-
101
-
-
84900497962
-
The regulation of the impact of civilian drones on behavioural privacy
-
R. Clarke The regulation of the impact of civilian drones on behavioural privacy Comput. Law Secur. Rev. 30 2014 286 305
-
(2014)
Comput. Law Secur. Rev.
, vol.30
, pp. 286-305
-
-
Clarke, R.1
-
102
-
-
84905856891
-
Surveillance, then and now: Securing privacy in public spaces
-
A. Cavoukian Surveillance, then and now: securing privacy in public spaces Tech. Report. Inf. Priv. Comm. Ont. 2013 1 64
-
(2013)
Tech. Report. Inf. Priv. Comm. Ont.
, pp. 1-64
-
-
Cavoukian, A.1
-
104
-
-
84876822417
-
Observations from above: Unmanned aircraft systems and privacy
-
J. Villasenor Observations from above: unmanned aircraft systems and privacy Harv. J. Law Public Policy 36 2013 458 517
-
(2013)
Harv. J. Law Public Policy
, vol.36
, pp. 458-517
-
-
Villasenor, J.1
-
107
-
-
84870497836
-
Crowdsourcing approach for evaluation of privacy filters in video surveillance
-
P. Korshunov, S. Cai, T. Ebrahimi, Crowdsourcing approach for evaluation of privacy filters in video surveillance, in: Proceedings of the ACM Multimedia 2012 Workshop Crowdsourcing Multimedia (CrowdMM), 2012, pp. 35-40
-
(2012)
Proceedings of the ACM Multimedia 2012 Workshop Crowdsourcing Multimedia (CrowdMM)
, pp. 35-40
-
-
Korshunov, P.1
Cai, S.2
Ebrahimi, T.3
-
108
-
-
84989869926
-
MediaEval 2015 Drone Protect Task: Privacy Protection in Surveillance Systems Using False Coloring
-
S. Çiftçi, P. Korshunov, A.O. Akyüz, and T. Ebrahimi MediaEval 2015 Drone Protect Task: Privacy Protection in Surveillance Systems Using False Coloring Proc. Mediaev. Workshop 2015 1 2
-
(2015)
Proc. Mediaev. Workshop
, pp. 1-2
-
-
Çiftçi, S.1
Korshunov, P.2
Akyüz, A.O.3
Ebrahimi, T.4
-
111
-
-
84974727642
-
-
(accessed 07.12.15)
-
technologyreview, (2015) (https://www.technologyreview.com/s/422400/fingerprints-go-the-distance) (accessed 07.12.15)
-
(2015)
Technologyreview
-
-
-
112
-
-
81355166957
-
Fingerprint - Based gender classification
-
A. Badawi, M. Mahfouz, R. Tadross, and R. Jantz Fingerprint - based gender classification Proc. Int. Conf. Image Process., Comput. Vision., Pattern Recognit. (IPCV) 2006 41 46
-
(2006)
Proc. Int. Conf. Image Process., Comput. Vision., Pattern Recognit. (IPCV)
, pp. 41-46
-
-
Badawi, A.1
Mahfouz, M.2
Tadross, R.3
Jantz, R.4
-
113
-
-
84974657702
-
Multimodal biometrics for identity, state-of-the-art
-
pages
-
D. Dessimoz, J. Richiardi, C. Champod, and A. Drygajlo Multimodal biometrics for identity, state-of-the-art Res. Report. PFS 341 - 08. 05, (Version 2. 0) 2009 156 pages
-
(2009)
Res. Report. PFS 341 - 08. 05, (Version 2. 0)
, pp. 156
-
-
Dessimoz, D.1
Richiardi, J.2
Champod, C.3
Drygajlo, A.4
-
114
-
-
76549184980
-
Fingerprint patterns in Huntington's Chorea and Parkinson's disease
-
A. Barbeau, J.-G. Trudeau, and C. Coiteux Fingerprint patterns in Huntington's Chorea and Parkinson's disease Canad. Med. Ass. J. 92 1965 514 515
-
(1965)
Canad. Med. Ass. J.
, vol.92
, pp. 514-515
-
-
Barbeau, A.1
Trudeau, J.-G.2
Coiteux, C.3
-
115
-
-
0021914349
-
Fingerprint patterns in Alzheimer's Disease
-
H.J. Weinreb Fingerprint patterns in Alzheimer's Disease Arch. Neurol. 42 1 1985 50 54
-
(1985)
Arch. Neurol.
, vol.42
, Issue.1
, pp. 50-54
-
-
Weinreb, H.J.1
-
116
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N.K. Ratha, J.H. Connell, and R.M. Bolle Enhancing security and privacy in biometrics-based authentication systems IBM Syst. J. 40 3 2001 614 634
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
119
-
-
84872326434
-
Fingerprint combination for privacy protection
-
L. Sheng, and A.C. Kot Fingerprint combination for privacy protection IEEE Trans. Inf. Forensics Secur. 8 2 2013 350 360
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.2
, pp. 350-360
-
-
Sheng, L.1
Kot, A.C.2
-
121
-
-
84974659211
-
Removing gender signature from fingerprints
-
L. Lugini, E. Marasco, B. Cukic, and J. Dawson Removing gender signature from fingerprints Proc. Spec. Sess. Biom., Forensics, De.-identifications Priv. Prot. (BiForD) 2014 63 67
-
(2014)
Proc. Spec. Sess. Biom., Forensics, De.-identifications Priv. Prot. (BiForD)
, pp. 63-67
-
-
Lugini, L.1
Marasco, E.2
Cukic, B.3
Dawson, J.4
-
123
-
-
0031236835
-
Iris recognition: An emerging biometric technology
-
R.P. Wildes Iris recognition: an emerging biometric technology Proc. IEEE 85 9 1997 1348 1363
-
(1997)
Proc. IEEE
, vol.85
, Issue.9
, pp. 1348-1363
-
-
Wildes, R.P.1
-
125
-
-
33947417043
-
Iris on the move: Acquisition of images for iris recognition in less constrained environments
-
J.R. Matey, O. Naroditsky, K. Hanna, R. Kolczynski, D.J. Loiacono, S. Mangru, M. Tinker, T.M. Zappia, and W.Y. Zhao Iris on the move: acquisition of images for iris recognition in less constrained environments Proc. IEEE 94 11 2006 1936 1947
-
(2006)
Proc. IEEE
, vol.94
, Issue.11
, pp. 1936-1947
-
-
Matey, J.R.1
Naroditsky, O.2
Hanna, K.3
Kolczynski, R.4
Loiacono, D.J.5
Mangru, S.6
Tinker, M.7
Zappia, T.M.8
Zhao, W.Y.9
-
126
-
-
84974723319
-
-
morpho (accessed 23.07.14)
-
morpho (2014). (http://www.morpho.com/en/media/20140311-iris-distance-power-behind-iris) (accessed 23.07.14)
-
(2014)
-
-
-
127
-
-
26444510207
-
-
Springer Berlin
-
C. Fancourt, L. Bogoni, K. Hanna, Y. Gua, R. Wildes, N. Takahashi, and U. Jain Iris Recognition at a Distance, AVBPA 2005, Lecture Notes in Computer Science (LNCS) 3546 2005 Springer Berlin 1 13
-
(2005)
Iris Recognition at A Distance, AVBPA 2005, Lecture Notes in Computer Science (LNCS)
, vol.3546
, pp. 1-13
-
-
Fancourt, C.1
Bogoni, L.2
Hanna, K.3
Gua, Y.4
Wildes, R.5
Takahashi, N.6
Jain, U.7
-
128
-
-
63249107189
-
Self-adaptive iris image acquisition system
-
W. Dong, Z. Sun, T. Tan, and X. Qiu Self-adaptive iris image acquisition system Proc. SPIE, Biom. Technol. Human. Identif. 6944 2008 6 14
-
(2008)
Proc. SPIE, Biom. Technol. Human. Identif.
, vol.6944
, pp. 6-14
-
-
Dong, W.1
Sun, Z.2
Tan, T.3
Qiu, X.4
-
129
-
-
67549085012
-
Stand-off Iris recognition system
-
F.W. Wheeler, A.G. Amitha Perera, G. Abramovich, B. Yu, P.H. Tu, Stand-off Iris recognition system, in: Proceedings of the 2nd IEEE International Conference on Biometrics: Theory, Application and System (BTAS), 2008, pp. 1-7
-
(2008)
Proceedings of the 2nd IEEE International Conference on Biometrics: Theory, Application and System (BTAS)
, pp. 1-7
-
-
Wheeler, F.W.1
Amitha Perera, A.G.2
Abramovich, G.3
Yu, B.4
Tu, P.H.5
-
130
-
-
50649087522
-
Eagle-eyes: A system for iris recognition at a distance
-
F. Bashir, P. Casaverde, D. Usher, M. Friedman, Eagle-eyes: a system for iris recognition at a distance, in: Proceedings of the IEEE Conference on Technol. Homel. Secur., 2008, pp. 426-431
-
(2008)
Proceedings of the IEEE Conference on Technol. Homel. Secur.
, pp. 426-431
-
-
Bashir, F.1
Casaverde, P.2
Usher, D.3
Friedman, M.4
-
132
-
-
33750956742
-
Automatic eye-level height system for face and iris recognition systems
-
R. Abiantun, M. Savvides, P.K. Khosla, Automatic eye-level height system for face and iris recognition systems, in: Proceedings of the 4th IEEE Workshop on Automatic Identified Advanced Technology, 2005, pp. 155-159
-
(2005)
Proceedings of the 4th IEEE Workshop on Automatic Identified Advanced Technology
, pp. 155-159
-
-
Abiantun, R.1
Savvides, M.2
Khosla, P.K.3
-
133
-
-
84867585713
-
A novel eye region based privacy protection scheme
-
D. Lee, K.N. Plataniotis, A novel eye region based privacy protection scheme, in: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2012, pp. 1845-1848
-
(2012)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1845-1848
-
-
Lee, D.1
Plataniotis, K.N.2
-
134
-
-
84875180794
-
A survey on ear biometrics
-
Article 22
-
A. Abaza, A. Ross, C. Hebert, M.A.F. Harrison, and M.S. Nixon A survey on ear biometrics Article 22 ACM Comput. Surv. 45 2 2013 1 35
-
(2013)
ACM Comput. Surv.
, vol.45
, Issue.2
, pp. 1-35
-
-
Abaza, A.1
Ross, A.2
Hebert, C.3
Harrison, M.A.F.4
Nixon, M.S.5
-
135
-
-
84866878822
-
Ear biometrics: A survey of detection, feature extraction and recognition methods
-
A. Pflug, and C. Busch Ear biometrics: a survey of detection, feature extraction and recognition methods IET Biom. 1 issue 2 2012 114 129
-
(2012)
IET Biom.
, vol.1
, Issue.2
, pp. 114-129
-
-
Pflug, A.1
Busch, C.2
-
137
-
-
84863129538
-
Automatic ear detection for online biometric applications
-
A. Kumar, M. Hanmandlu, M. Kuldeep, H.M. Gupta, Automatic ear detection for online biometric applications, in: Proceedings of the 3rd National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, 2011, pp. 146-149
-
(2011)
Proceedings of the 3rd National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics
, pp. 146-149
-
-
Kumar, A.1
Hanmandlu, M.2
Kuldeep, M.3
Gupta, H.M.4
-
138
-
-
78650367846
-
Fast learning ear detection for real-time surveillance
-
A. Abaza, C. Hebert, M.A.F. Harrison, Fast learning ear detection for real-time surveillance, in: Proceedings of the 4th IEEE International Conference on Biometrics: Theory, Application Systems (BTAS) 2010, pp. 1-6
-
(2010)
Proceedings of the 4th IEEE International Conference on Biometrics: Theory, Application Systems (BTAS)
, pp. 1-6
-
-
Abaza, A.1
Hebert, C.2
Harrison, M.A.F.3
-
139
-
-
70350125882
-
An overview of text-independent speaker recognition: From features to supervectors
-
T. Kinnunen, and H. Li An overview of text-independent speaker recognition: from features to supervectors Speech Commun. 52 1 2010 12 40
-
(2010)
Speech Commun.
, vol.52
, Issue.1
, pp. 12-40
-
-
Kinnunen, T.1
Li, H.2
-
141
-
-
33745029187
-
Speaker recognition
-
A.K. Jain, R.M. Bolle, S. Pankanti, Kluwer Dordrech
-
J.P. Campbell Speaker recognition A.K. Jain, R.M. Bolle, S. Pankanti, Biometrics, Personal Identification in Networked Society 1999 Kluwer Dordrech 165 189
-
(1999)
Biometrics, Personal Identification in Networked Society
, pp. 165-189
-
-
Campbell, J.P.1
-
142
-
-
84867598353
-
Privacy-preserving speaker verification as password matching
-
M.A. Pathak, B. Raj, Privacy-preserving speaker verification as password matching, in: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2012, pp. 1849-1852
-
(2012)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1849-1852
-
-
Pathak, M.A.1
Raj, B.2
-
144
-
-
79952755319
-
Voice recognition algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) techniques
-
L.B. Muda, and M.I. Elamvazuthi Voice recognition algorithms using Mel Frequency Cepstral Coefficient (MFCC) and Dynamic Time Warping (DTW) techniques J. Comput. 2 issue 3 2010 138 143
-
(2010)
J. Comput.
, vol.2
, Issue.3
, pp. 138-143
-
-
Muda, L.B.1
Elamvazuthi, M.I.2
-
145
-
-
78650542860
-
Voice conversion: State-of-the-art and future work
-
D. Sundermann Voice conversion: state-of-the-art and future work Fortschritte der Akust. 31 2 2005 1 2
-
(2005)
Fortschritte der Akust.
, vol.31
, Issue.2
, pp. 1-2
-
-
Sundermann, D.1
-
146
-
-
0023739214
-
Voice conversion through vector quantization
-
M. Abe, S. Nakamura, K. Shikano, H. Kuwabara, Voice conversion through vector quantization, in: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 1988, pp. 655-658
-
(1988)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 655-658
-
-
Abe, M.1
Nakamura, S.2
Shikano, K.3
Kuwabara, H.4
-
147
-
-
84974659283
-
-
(accessed 14.12.14)
-
G. Upperman, M. Hutchinson, B. Van Osdol, J. Chen, Methods for Voice Conversion, (2014) 1-40. (http://ftpmirror.your.org/pub/misc/cd3wd/1006/Methods-for-Voice-Conversion-electr-physics-cnx-x10252-.pdf) (accessed 14.12.14)
-
(2014)
Methods for Voice Conversion
, pp. 1-40
-
-
Upperman, G.1
Hutchinson, M.2
Van Osdol, B.3
Chen, J.4
-
148
-
-
85009084358
-
A first step towards text-independent voice conversion
-
D. Sundermann, A. Bonafonte, H. Ney, H. Hoge, A first step towards text-independent voice conversion, in: Proceedings of the International Conference on Spoken Langanges and Processing (ICSLP), 2004, pp. 1-4
-
(2004)
Proceedings of the International Conference on Spoken Langanges and Processing (ICSLP)
, pp. 1-4
-
-
Sundermann, D.1
Bonafonte, A.2
Ney, H.3
Hoge, H.4
-
149
-
-
84974702742
-
Text-independent cross- language voice conversion
-
D. Sundermann, H. Hoge, A. Bonafonte, H. Ney, J. Hirschberg, Text-independent cross- language voice conversion, in: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) vol.1, 2006, pp. 1-4
-
(2006)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, vol.1
, pp. 1-4
-
-
Sundermann, D.1
Hoge, H.2
Bonafonte, A.3
Ney, H.4
Hirschberg, J.5
-
150
-
-
4544297119
-
Non-parallel training for voice conversion by maximum likelihood constrained adoption
-
I-1
-
A. Mouchtaris J. Van Spiegel P. Mueller Non-parallel training for voice conversion by maximum likelihood constrained adoption, in: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 1, 2004 I-1 pp. I-4
-
(2004)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, vol.1
, pp. I-4
-
-
Mouchtaris, A.1
Van Spiegel, J.2
Mueller, P.3
-
152
-
-
84969248210
-
Privacy protection for life-log system
-
J.S. Chaudhari, S.-C.S. Cheung, M.V. Venkatesh, Privacy protection for life-log system, in: Proceedings of the IEEE Workshop on Signal Processing Application Public Security Forensics (SAFE), 2007, pp. 1-5
-
(2007)
Proceedings of the IEEE Workshop on Signal Processing Application Public Security Forensics (SAFE)
, pp. 1-5
-
-
Chaudhari, J.S.1
Cheung, S.-C.S.2
Venkatesh, M.V.3
-
153
-
-
70349216553
-
Voice converging: Speaker de-identification by voice transformation
-
Q. Jin, A.R. Toth, T. Schultz, A.W. Black, Voice converging: speaker de-identification by voice transformation, in: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2009, pp. 3909-3912
-
(2009)
Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
, pp. 3909-3912
-
-
Jin, Q.1
Toth, A.R.2
Schultz, T.3
Black, A.W.4
-
154
-
-
77949378080
-
Speaker de-identification via voice transformation
-
Q. Jin, A.R. Toth, T. Schultz, A.W. Black, Speaker de-identification via voice transformation, in: Proceedings of the IEEE Workshop Automatic Speech Recognition and Understanding (ASRU), 2009, pp. 529-533
-
(2009)
Proceedings of the IEEE Workshop Automatic Speech Recognition and Understanding (ASRU)
, pp. 529-533
-
-
Jin, Q.1
Toth, A.R.2
Schultz, T.3
Black, A.W.4
-
156
-
-
85073436068
-
Speaker de-identification using diphone recognition and speech synthesis
-
T. Justin, V. Struc, S. Dobrisek, B. Vesnicer, I. Ipsic, F. Mihelic, Speaker de-identification using diphone recognition and speech synthesis, in: Proceedings of the 11th IEEE International Conference on Work. Automatic Face Gesture Recognition (FG), 4, 2015, 1-7
-
(2015)
Proceedings of the 11th IEEE International Conference on Work. Automatic Face Gesture Recognition (FG)
, vol.4
, pp. 1-7
-
-
Justin, T.1
Struc, V.2
Dobrisek, S.3
Vesnicer, B.4
Ipsic, I.5
Mihelic, F.6
-
158
-
-
0002450963
-
Automatic gait recognition
-
A.K. Jain, R. Bolle, S. Pankanti, Kluwer Academic Publishers New York
-
M.S. Nixon, J.N. Carter, D. Cunado, P.S. Huang, and S.V. Stevenage Automatic gait recognition A.K. Jain, R. Bolle, S. Pankanti, Biometrics, Personal Identification in Networked Society 1999 Kluwer Academic Publishers New York 231 249
-
(1999)
Biometrics, Personal Identification in Networked Society
, pp. 231-249
-
-
Nixon, M.S.1
Carter, J.N.2
Cunado, D.3
Huang, P.S.4
Stevenage, S.V.5
-
159
-
-
33646192927
-
-
Springer Berlin
-
J.-H. Yoo, D. Hwang, and M.S. Nixon Gender Classification in Human Gait Using Support Vector Machine, ACIVS 2005, Lecture Notes in Computer Science (LNCS) vol. 3708 2005 Springer Berlin 138 145
-
(2005)
Gender Classification in Human Gait Using Support Vector Machine, ACIVS 2005, Lecture Notes in Computer Science (LNCS)
, vol.3708
, pp. 138-145
-
-
Yoo, J.-H.1
Hwang, D.2
Nixon, M.S.3
-
161
-
-
81155133302
-
-
Springer Berlin
-
Z. Zhang, M. Hu, and Y. Wang A Survey of Advances in Biometric Gait Recognition, CCBR 2011, Lecture Notes in Computer Science (LNCS) vol. 7098 2011 Springer Berlin 150 158
-
(2011)
A Survey of Advances in Biometric Gait Recognition, CCBR 2011, Lecture Notes in Computer Science (LNCS)
, vol.7098
, pp. 150-158
-
-
Zhang, Z.1
Hu, M.2
Wang, Y.3
-
162
-
-
85032751690
-
Gait recognition: A challenging signal processing technology for biometric identification
-
N.V. Boulgouris, D. Hatzinakos, and K.N. Plataniotis Gait recognition: a challenging signal processing technology for biometric identification IEEE Signal Process. Mag. 11 2005 78 90
-
(2005)
IEEE Signal Process. Mag.
, vol.11
, pp. 78-90
-
-
Boulgouris, N.V.1
Hatzinakos, D.2
Plataniotis, K.N.3
-
164
-
-
0242313583
-
Automatic extraction and description of human gait models for recognition purposes
-
D. Cunado, M.S. Nixon, and J.N. Carter Automatic extraction and description of human gait models for recognition purposes Comput. Vision. Image Underst. 90 1 2003 1 41
-
(2003)
Comput. Vision. Image Underst.
, vol.90
, Issue.1
, pp. 1-41
-
-
Cunado, D.1
Nixon, M.S.2
Carter, J.N.3
-
166
-
-
36048992886
-
General tensor discriminant analysis and Gabor features for gait recognition
-
D. Tao, X. Li, X. Wu, and S.J. Maybank General tensor discriminant analysis and Gabor features for gait recognition IEEE Trans. Pattern Anal. Mach. Intell. 29 10 2007 1700 1715
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.10
, pp. 1700-1715
-
-
Tao, D.1
Li, X.2
Wu, X.3
Maybank, S.J.4
-
168
-
-
0346750541
-
Silhouette analysis-based gait recognition for human identification
-
L. Wang, T. Tan, H. Ning, and W. Hu Silhouette analysis-based gait recognition for human identification IEEE Trans. Pattern Anal. Mach. Intell. 25 12 2003 1505 1518
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.25
, Issue.12
, pp. 1505-1518
-
-
Wang, L.1
Tan, T.2
Ning, H.3
Hu, W.4
-
169
-
-
14544286039
-
The human ID gait challenge problem: Data sets, performance, and analysis
-
S. Sarkar, P.J. Phillips, Z. Liu, I.R. Vega, P. Grother, and K.W. Bowyer The human ID gait challenge problem: data sets, performance, and analysis IEEE Trans. Pattern Anal. Mach. Intell. 27 2 2005 162 177
-
(2005)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.27
, Issue.2
, pp. 162-177
-
-
Sarkar, S.1
Phillips, P.J.2
Liu, Z.3
Vega, I.R.4
Grother, P.5
Bowyer, K.W.6
-
172
-
-
84875756807
-
An overview of gesture recognition
-
M.B. Abdallah, M. Kallel, M.S. Bouhlel, An overview of gesture recognition, in: Proceedings of the 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications. (SETIT), 2012, pp. 20-24
-
(2012)
Proceedings of the 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications. (SETIT)
, pp. 20-24
-
-
Abdallah, M.B.1
Kallel, M.2
Bouhlel, M.S.3
-
173
-
-
84974702744
-
Identity verification system using hand gesture information
-
(accessed 12.04.16)
-
N.D. Lentsoane, K. Kith, B.J. Van Wyk, M.A. Van Wyk, Identity verification system using hand gesture information, in: Proceedings of the 17th International Symposium on Pattern Recognition Society of South Africa, 2006, pp. 1-6. (accessed 12.04.16) (http://www.prasa.org/proceedings/2006/prasa06-13.pdf)
-
(2006)
Proceedings of the 17th International Symposium on Pattern Recognition Society of South Africa
, pp. 1-6
-
-
Lentsoane, N.D.1
Kith, K.2
Van Wyk, B.J.3
Van Wyk, M.A.4
-
174
-
-
84974709767
-
-
Magister Technologiae: Electronic Engineering, Department Of Electrical Engineering. Faculty of Engineering, Tshwane University of Technology pages
-
N.D. Lentsoane Identity Verification System Using Hand Gesture Information 2007 Magister Technologiae: Electronic Engineering, Department Of Electrical Engineering. Faculty of Engineering, Tshwane University of Technology 202 pages
-
(2007)
Identity Verification System Using Hand Gesture Information
, pp. 202
-
-
Lentsoane, N.D.1
-
175
-
-
33947373944
-
Tracking, analysis, and recognition of human gestures in video
-
S. Sclaroff, M. Betke, G. Kollios, Alon Jonathan, V. Athitsos, Rui Li, J. Magee, Tai-Peng Tian, Tracking, analysis, and recognition of human gestures in video, in: Proceedings of the 8th International Conference Document on Analysis, and Recognition (ICDAR) vol. 2, 2005, pp. 806-810
-
(2005)
Proceedings of the 8th International Conference Document on Analysis, and Recognition (ICDAR)
, vol.2
, pp. 806-810
-
-
Sclaroff, S.1
Betke, M.2
Kollios, G.3
Jonathan, A.4
Athitsos, V.5
Li, R.6
Magee, J.7
Tian, T.-P.8
-
176
-
-
84888387294
-
A biometric authentication model using hand gesture images
-
(accessed 24.06.14)
-
S. Fong, Y. Zhuang, and I. Fister A biometric authentication model using hand gesture images Biomed. Eng. OnLine 12:111 2013 1 18 (https://biomedical-engineering-online.biomedcentral.com/articles/10.1186/1475-925X-12-111) (accessed 24.06.14)
-
(2013)
Biomed. Eng. OnLine 12:111
, pp. 1-18
-
-
Fong, S.1
Zhuang, Y.2
Fister, I.3
-
178
-
-
84896820181
-
Soft biometrics and their application in person recognition at a distance
-
P. Tome, J. Fierrez, R. Vera-Rodriguez, and M.S. Nixon Soft biometrics and their application in person recognition at a distance IEEE Trans. Inf. Forensics Secur. 9 1 2014 464 475
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, Issue.1
, pp. 464-475
-
-
Tome, P.1
Fierrez, J.2
Vera-Rodriguez, R.3
Nixon, M.S.4
-
179
-
-
84974679244
-
Large-scale civilian biometric systems issues and feasibility
-
J.L. Waymann Large-scale civilian biometric systems issues and feasibility Proc. Card. Tech./Secur. Tech. ID 1997
-
(1997)
IEEE Trans. Inf. Forensics Secur.
-
-
Waymann, J.L.1
-
180
-
-
77955684511
-
Face matching and retrieval using soft biometrics
-
U. Park, and A.K. Jain Face matching and retrieval using soft biometrics IEEE Trans. Inf. Forensics Secur. 5 3 2010 406 415
-
(2010)
IEEE Trans. Inf. Forensics Secur.
, vol.5
, Issue.3
, pp. 406-415
-
-
Park, U.1
Jain, A.K.2
-
181
-
-
78049493175
-
People re-identification by classification of silhouettes based on sparse representation
-
D.-N.T. Congl, C. Achard, L. Khoudour, People re-identification by classification of silhouettes based on sparse representation, in: Proceedings of the 2nd International Conference on Image Processing and Theory Tools Applications (IPTA), 2010, pp. 60-65
-
(2010)
Proceedings of the 2nd International Conference on Image Processing and Theory Tools Applications (IPTA)
, pp. 60-65
-
-
Congl, D.-N.T.1
Achard, C.2
Khoudour, L.3
-
182
-
-
84974719052
-
Person de-identification in activity videos
-
M. Ivasic-Kos, A. Iosifidis, A. Tefas, and I. Pitas Person de-identification in activity videos Proc. Spec. Sess. Biom., Forensics, De.-Identif. Priv. Prot. (BiForD) 2014 63 68
-
(2014)
Proc. Spec. Sess. Biom., Forensics, De.-Identif. Priv. Prot. (BiForD)
, pp. 63-68
-
-
Ivasic-Kos, M.1
Iosifidis, A.2
Tefas, A.3
Pitas, I.4
-
185
-
-
34047225784
-
A new automatic recognition system of gender, age and ethnicity
-
H. Lin, H. Lu, L. Zhang, A new automatic recognition system of gender, age and ethnicity, in: Proceedings of the Sixth World Congress Intelligent Control. Automation (WCICA), 2, 2006, pp. 9988-9991
-
(2006)
Proceedings of the Sixth World Congress Intelligent Control. Automation (WCICA)
, vol.2
, pp. 9988-9991
-
-
Lin, H.1
Lu, H.2
Zhang, L.3
-
186
-
-
77953227243
-
A study on automatic age estimation using a large database
-
G. Guo, G. Mu, Y. Fu, C. Dyer, T. Huang, A study on automatic age estimation using a large database, in: Proceedings of the 12th IEEE International Conference on Computer Vision (ICCV), 2009, pp.1986-1991
-
(2009)
Proceedings of the 12th IEEE International Conference on Computer Vision (ICCV)
, pp. 1986-1991
-
-
Guo, G.1
Mu, G.2
Fu, Y.3
Dyer, C.4
Huang, T.5
-
188
-
-
84867593285
-
Race recognition using local descriptors
-
G. Muhammad, M. Hussain, F. Alenezy, A.M. Mirza, G. Bebis, and H. Aboalsamh Race recognition using local descriptors Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP) 2012 1525 1528
-
(2012)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP)
, pp. 1525-1528
-
-
Muhammad, G.1
Hussain, M.2
Alenezy, F.3
Mirza, A.M.4
Bebis, G.5
Aboalsamh, H.6
-
189
-
-
84867327263
-
Emotion-inspired age and gender recognition systems
-
O.T.-C. Chen, J.J. Gu, P.-T. Lu, J.-Y. Ke, Emotion-inspired age and gender recognition systems, in: Proceedings of the 55th IEEE International Midwest Symposium on Circuits Systems (MWSCAS), 2012, pp. 662-665
-
(2012)
Proceedings of the 55th IEEE International Midwest Symposium on Circuits Systems (MWSCAS)
, pp. 662-665
-
-
Chen, O.T.-C.1
Gu, J.J.2
Lu, P.-T.3
Ke, J.-Y.4
-
191
-
-
56749107055
-
Scars, marks and tattoos (SMT): Soft biometric for suspect and victim identification
-
J.-E. Lee, A.K. Jain, and R. Jin Scars, marks and tattoos (SMT): soft biometric for suspect and victim identification Proc. Biom. Symp. (BSYM) 2008 1 8
-
(2008)
Proc. Biom. Symp. (BSYM)
, pp. 1-8
-
-
Lee, J.-E.1
Jain, A.K.2
Jin, R.3
-
193
-
-
84871982745
-
Detecting and classifying scars, marks, and tattoos found in the wild
-
B. Heflin, W. Scheirer, T.E. Boult, Detecting and classifying scars, marks, and tattoos found in the wild, in: Proceedings of the 5th IEEE International Conference on Biometrics: Theory, Application and Systems (BTAS) 2012, pp. 31-38
-
(2012)
Proceedings of the 5th IEEE International Conference on Biometrics: Theory, Application and Systems (BTAS)
, pp. 31-38
-
-
Heflin, B.1
Scheirer, W.2
Boult, T.E.3
-
194
-
-
33746882120
-
Tattoos body piercing United States.: A national dataset
-
A.E. Laumann, and A.J. Derick Tattoos body piercing United States.: a national dataset Am. Acad. Dermatol. 55 3 2006 413 421
-
(2006)
Am. Acad. Dermatol.
, vol.55
, Issue.3
, pp. 413-421
-
-
Laumann, A.E.1
Derick, A.J.2
-
196
-
-
84863041156
-
Image retrieval in forensics: Tattoo image database application
-
J.-E. Lee, R. Jin, and A.K. Jain Image retrieval in forensics: tattoo image database application IEEE Multimed. 19 1 2011 40 49
-
(2011)
IEEE Multimed.
, vol.19
, Issue.1
, pp. 40-49
-
-
Lee, J.-E.1
Jin, R.2
Jain, A.K.3
-
198
-
-
84992224472
-
An experimental tattoo de-identification system for privacy protection in still images
-
D. Marcetic, S. Ribaric, V. Struc, and N. Pavesic An experimental tattoo de-identification system for privacy protection in still images Proc. Spec. Sess. Biom., Forensics, De.-Identif. Priv. Prot. (BiForD) 2014 57 62
-
(2014)
Proc. Spec. Sess. Biom., Forensics, De.-Identif. Priv. Prot. (BiForD)
, pp. 57-62
-
-
Marcetic, D.1
Ribaric, S.2
Struc, V.3
Pavesic, N.4
-
199
-
-
84966457663
-
Automatic hair color de-identification
-
J. Prinosil, A. Krupka, K. Riha, M.K. Dutta, A. Singh, Automatic hair color de-identification, in: Proceedings of the International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, pp. 732-736
-
(2015)
Proceedings of the International Conference on Green Computing and Internet of Things (ICGCIoT)
, pp. 732-736
-
-
Prinosil, J.1
Krupka, A.2
Riha, K.3
Dutta, M.K.4
Singh, A.5
-
201
-
-
84905865401
-
Security and privacy protection in visual sensor networks: A survey
-
Article no. 2
-
T. Winkler, and B. Rinner Security and privacy protection in visual sensor networks: a survey Article no. 2 ACM Comput. Surv. 47 1 2014 1 39
-
(2014)
ACM Comput. Surv.
, vol.47
, Issue.1
, pp. 1-39
-
-
Winkler, T.1
Rinner, B.2
-
202
-
-
84930353011
-
An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR
-
F. Flammini, R. Setola, G. Franceschetti, CRC Press/Taylor & Francis Milton Park
-
H. Sohn, D. Lee, W. De Neve, K.N. Plataniotis, and Y.M. Ro An objective and subjective evaluation of content-based privacy protection of face images in video surveillance systems using JPEG XR F. Flammini, R. Setola, G. Franceschetti, Effective Surveillance for Homeland Security: Balancing Technology and Social Issues 2013 CRC Press/Taylor & Francis Milton Park 111 140
-
(2013)
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues
, pp. 111-140
-
-
Sohn, H.1
Lee, D.2
De Neve, W.3
Plataniotis, K.N.4
Ro, Y.M.5
|