178,082 research outputs found

    Towards Egocentric Person Re-identification and Social Pattern Analysis

    Full text link
    Wearable cameras capture a first-person view of the daily activities of the camera wearer, offering a visual diary of the user behaviour. Detection of the appearance of people the camera user interacts with for social interactions analysis is of high interest. Generally speaking, social events, lifestyle and health are highly correlated, but there is a lack of tools to monitor and analyse them. We consider that egocentric vision provides a tool to obtain information and understand users social interactions. We propose a model that enables us to evaluate and visualize social traits obtained by analysing social interactions appearance within egocentric photostreams. Given sets of egocentric images, we detect the appearance of faces within the days of the camera wearer, and rely on clustering algorithms to group their feature descriptors in order to re-identify persons. Recurrence of detected faces within photostreams allows us to shape an idea of the social pattern of behaviour of the user. We validated our model over several weeks recorded by different camera wearers. Our findings indicate that social profiles are potentially useful for social behaviour interpretation

    Side-View Face Recognition

    Get PDF
    Side-view face recognition is a challenging problem with many applications. Especially in real-life scenarios where the environment is uncontrolled, coping with pose variations up to side-view positions is an important task for face recognition. In this paper we discuss the use of side view face recognition techniques to be used in house safety applications. Our aim is to recognize people as they pass through a door, and estimate their location in the house. Here, we compare available databases appropriate for this task, and review current methods for profile face recognition

    The Intrinsic Dimensionality of Attractiveness: A Study in Face Profiles

    Get PDF
    The study of human attractiveness with pattern analysis techniques is an emerging research field. One still largely unresolved problem is which are the facial features relevant to attractiveness, how they combine together, and the number of independent parameters required for describing and identifying harmonious faces. In this paper, we present a first study about this problem, applied to face profiles. First, according to several empirical results, we hypothesize the existence of two well separated manifolds of attractive and unattractive face profiles. Then, we analyze with manifold learning techniques their intrinsic dimensionality. Finally, we show that the profile data can be reduced, with various techniques, to the intrinsic dimensions, largely without loosing their ability to discriminate between attractive and unattractive face

    The computer nose best

    Get PDF

    Behavioural biometric identification based on human computer interaction

    Get PDF
    As we become increasingly dependent on information systems, personal identification and profiling systems have received an increasing interest, either for reasons of personali- sation or security. Biometric profiling is one means of identification which can be achieved by analysing something the user is or does (e.g., a fingerprint, signature, face, voice). This Ph.D. research focuses on behavioural biometrics, a subset of biometrics that is concerned with the patterns of conscious or unconscious behaviour of a person, involving their style, preference, skills, knowledge, motor-skills in any domain. In this work I explore the cre- ation of user profiles to be applied in dynamic user identification based on the biometric pat- terns observed during normal Human-Computer Interaction (HCI) by continuously logging and tracking the corresponding computer events. Unlike most of the biometrics systems that need special hardware devices (e.g. finger print reader), HCI-based identification sys- tems can be implemented using regular input devices (mouse or keyboard) and they do not require the user to perform specific tasks to train the system. Specifically, three components are studied in-depth: mouse dynamics, keystrokes dynamics and GUI based user behaviour. In this work I will describe my research on HCI-based behavioural biometrics, discuss the features and models I proposed for each component along with the result of experiments. In addition, I will describe the methodology and datasets I gathered using my LoggerMan application that has been developed specifically to passively gather behavioural biometric data for evaluation. Results show that normal Human-Computer Interaction reveals behavioural information with discriminative power sufficient to be used for user modelling for identification purposes

    Keystroke Biometrics in Response to Fake News Propagation in a Global Pandemic

    Full text link
    This work proposes and analyzes the use of keystroke biometrics for content de-anonymization. Fake news have become a powerful tool to manipulate public opinion, especially during major events. In particular, the massive spread of fake news during the COVID-19 pandemic has forced governments and companies to fight against missinformation. In this context, the ability to link multiple accounts or profiles that spread such malicious content on the Internet while hiding in anonymity would enable proactive identification and blacklisting. Behavioral biometrics can be powerful tools in this fight. In this work, we have analyzed how the latest advances in keystroke biometric recognition can help to link behavioral typing patterns in experiments involving 100,000 users and more than 1 million typed sequences. Our proposed system is based on Recurrent Neural Networks adapted to the context of content de-anonymization. Assuming the challenge to link the typed content of a target user in a pool of candidate profiles, our results show that keystroke recognition can be used to reduce the list of candidate profiles by more than 90%. In addition, when keystroke is combined with auxiliary data (such as location), our system achieves a Rank-1 identification performance equal to 52.6% and 10.9% for a background candidate list composed of 1K and 100K profiles, respectively.Comment: arXiv admin note: text overlap with arXiv:2004.0362
    corecore