91 research outputs found

    A Reproducible Study on Remote Heart Rate Measurement

    Get PDF
    This paper studies the problem of reproducible research in remote photoplethysmography (rPPG). Most of the work published in this domain is assessed on privately-owned databases, making it difficult to evaluate proposed algorithms in a standard and principled manner. As a consequence, we present a new, publicly available database containing a relatively large number of subjects recorded under two different lighting conditions. Also, three state-of-the-art rPPG algorithms from the literature were selected, implemented and released as open source free software. After a thorough, unbiased experimental evaluation in various settings, it is shown that none of the selected algorithms is precise enough to be used in a real-world scenario

    A novel statistical generative model dedicated to face recognition

    Get PDF
    In this paper, a novel statistical generative model to describe a face is presented, and is applied to the face authentication task. Classical generative models used so far in face recognition, such as Gaussian Mixture Models (GMMs) and Hidden Markov Models (HMMs) for instance, are making strong assumptions on the observations derived from a face image. Indeed, such models usually assume that local observations are independent, which is obviously not the case in a face. The presented model hence proposes to encode relationships between salient facial features by using a static Bayesian Network. Since robustness against imprecisely located faces is of great concern in a real-world scenario, authentication results are presented using automatically localised faces. Experiments conducted on the XM2VTS and the BANCA databases showed that the proposed approach is suitable for this task, since it reaches state-of-the-art results. We compare our model to baseline appearance-based systems (Eigenfaces and Fisherfaces) but also to classical generative models, namely GMM, HMM and pseudo-2DHMM. (C) 2009 Elsevier B.V. All rights reserved

    Face Authentication with Salient Local Features and Static Bayesian Network

    Get PDF
    In this paper, the problem of face authentication using salient facial features together with statistical generative models is adressed. Actually, classical generative models, and Gaussian Mixture Models in particular make strong assumptions on the way observations derived from face images are generated. Indeed, systems proposed so far consider that local observations are independent, which is obviously not the case in a face. Hence, we propose a new generative model based on Bayesian Networks using only salient facial features. We compare it to Gaussian Mixture Models using the same set of observations. Conducted experiments on the BANCA database show that our model is suitable for the face authentication task, since it outperforms not only Gaussian Mixture Models, but also classical appearance-based methods, such as Eigenfaces and Fisherfaces

    Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks

    Full text link
    This paper addresses the problem of face presentation attack detection using different image modalities. In particular, the usage of short wave infrared (SWIR) imaging is considered. Face presentation attack detection is performed using recent models based on Convolutional Neural Networks using only carefully selected SWIR image differences as input. Conducted experiments show superior performance over similar models acting on either color images or on a combination of different modalities (visible, NIR, thermal and depth), as well as on a SVM-based classifier acting on SWIR image differences. Experiments have been carried on a new public and freely available database, containing a wide variety of attacks. Video sequences have been recorded thanks to several sensors resulting in 14 different streams in the visible, NIR, SWIR and thermal spectra, as well as depth data. The best proposed approach is able to almost perfectly detect all impersonation attacks while ensuring low bonafide classification errors. On the other hand, obtained results show that obfuscation attacks are more difficult to detect. We hope that the proposed database will foster research on this challenging problem. Finally, all the code and instructions to reproduce presented experiments is made available to the research community

    The High-Quality Wide Multi-Channel Attack (HQ-WMCA) database

    Full text link
    The High-Quality Wide Multi-Channel Attack database (HQ-WMCA) database extends the previous Wide Multi-Channel Attack database(WMCA), with more channels including color, depth, thermal, infrared (spectra), and short-wave infrared (spectra), and also a wide variety of attacks

    Lighting Normalization Algorithms for Face Verification

    Get PDF
    In this report, we address the problem of face verification across illumination, since it has been identified as one of the major factor degrading the performance of face recognition systems. First, a brief overview of face recognition together with its main challenges is made, before reviewing state-of-the-art approaches to cope with illumination variations. We then present investigated approaches, which consists in applying a pre-processing step to the face images, and we also present the underlying theory. Namely, we will study the effect of various photometric normalization algorithms on the performance of a system based on local feature extraction and generative models (Gaussian Mixture Models). Studied algorithms include the Multiscale Retinex, as well as two state-of-the-art approaches: the Self Quotient Image and an anisotropic diffusion based normalization. This last involves the resolution of large sparse system of equations, and hence different approaches to solve such problems are described, including the efficient multigrid framework. Performances of the normalization algorithms are assessed with the challenging BANCA database and its realistic protocols. Conducted experiments showed significant improvements in terms of verification error rates and are comparable to other state-of-the-art face verification systems on the same database

    Efficient Diffusion-based Illumination Normalization for Face Verification

    Get PDF
    In this paper, the problem of face verification across illumination is addressed. In order to cope with different lighting conditions, a preprocessing step is applied to the face image so as to make it independent on the illumination conditions. The illuminant invariant representation of the image is obtained by first applying an anisotropic diffusion process to the original image. Hence, it implies the numerical resolution of an elliptic partial differential equation on a large grid: the image. So, a comparison is performed on two methods to resolve such diffusion problems, namely the Gauss-Seidel relaxation and the Multigrid V-cycle. The preprocessing algorithm with its different resolution schemes is applied prior to the task of face verification. Experiments conducted on the challenging BANCA database showed a significant improvement in terms of face verification error rate, while staying computationally efficient

    On the Recent Use of Local Binary Patterns for Face Authentication

    Get PDF
    This paper presents a survey on the recent use of Local Binary Patterns (LBPs) for face recognition. LBP is becoming a popular technique for face representation. It is a non-parametric kernel which summarizes the local spacial structure of an image and it is invariant to monotonic gray-scale transformations. This is a very interesting property in face recognition. This probably explains the recent success of Local Binary Patterns in face recognition. In this paper, we describe the LBP technique and different approaches proposed in the literature to represent and to recognize faces. The most representatives are considered for experimental comparison on a common face authentication task. For that purpose, the XM2VTS and BANCA databases are used according to their respective experimental protocols

    CD4+ CD25+ Regulatory T Cells Control T Helper Cell Type 1 Responses to Foreign Antigens Induced by Mature Dendritic Cells In Vivo

    Get PDF
    Recent evidence suggests that in addition to their well known stimulatory properties, dendritic cells (DCs) may play a major role in peripheral tolerance. It is still unclear whether a distinct subtype or activation status of DC exists that promotes the differentiation of suppressor rather than effector T cells from naive precursors. In this work, we tested whether the naturally occurring CD4+ CD25+ regulatory T cells (Treg) may control immune responses induced by DCs in vivo. We characterized the immune response induced by adoptive transfer of antigen-pulsed mature DCs into mice depleted or not of CD25+ cells. We found that the development of major histocompatibility complex class I and II–restricted interferon γ–producing cells was consistently enhanced in the absence of Treg. By contrast, T helper cell (Th)2 priming was down-regulated in the same conditions. This regulation was independent of interleukin 10 production by DCs. Of note, splenic DCs incubated in vitro with Toll-like receptor ligands (lipopolysaccharide or CpG) activated immune responses that remained sensitive to Treg function. Our data further show that mature DCs induced higher cytotoxic activity in CD25-depleted recipients as compared with untreated hosts. We conclude that Treg naturally exert a negative feedback mechanism on Th1-type responses induced by mature DCs in vivo
    • …
    corecore