Academic literature on the topic 'Face identification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Face identification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Face identification"

1

GARG, UMA. "Face Identification System-A Review." International Journal of Scientific Research 2, no. 9 (June 1, 2012): 77–78. http://dx.doi.org/10.15373/22778179/sep2013/27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Reddy, Mr B. Ravinder, V. Akhil, and G. Sai Preetham P. Sai Poojitha. "Profile Identification through Face Recognition." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 1482–83. http://dx.doi.org/10.31142/ijtsrd23439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bindemann, Markus, Rob Jenkins, and A. Mike Burton. "A Bottleneck in Face Identification." Experimental Psychology 54, no. 3 (January 2007): 192–201. http://dx.doi.org/10.1027/1618-3169.54.3.192.

Full text
Abstract:
Abstract. There is evidence that face processing is capacity-limited in distractor interference tasks and in tasks requiring overt recognition memory. We examined whether capacity limits for faces can be observed with a more sensitive measure of visual processing, by measuring repetition priming of flanker faces that were presented alongside a face or a nonface target. In Experiment 1, we found identity priming for face flankers, by measuring repetition priming across a change in image, during task-relevant nonface processing, but not during the processing of a concurrently-presented face target. Experiment 2 showed perceptual priming of the flanker faces, across identical images at prime and test, when they were presented alongside a face target. In a third Experiment, all of these effects were replicated by measuring identity priming and perceptual priming within the same task. Overall, these results imply that face processing is capacity limited, such that only a single face can be identified at one time. Merely attending to a target face appears sufficient to trigger these capacity limits, thereby extinguishing identification of a second face in the display, although our results demonstrate that the additional face remains at least subject to superficial image processing.
APA, Harvard, Vancouver, ISO, and other styles
4

Robertson, David J., Rob Jenkins, and A. Mike Burton. "Face detection dissociates from face identification." Visual Cognition 25, no. 7-8 (June 2, 2017): 740–48. http://dx.doi.org/10.1080/13506285.2017.1327465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Parihar, Virat. "Face Identification System." International Journal for Research in Applied Science and Engineering Technology 8, no. 7 (July 31, 2020): 394–98. http://dx.doi.org/10.22214/ijraset.2020.7064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shirai, Risako, and Hirokazu Ogawa. "Morality extracted under crowding impairs face identification." i-Perception 13, no. 3 (May 2022): 204166952211048. http://dx.doi.org/10.1177/20416695221104843.

Full text
Abstract:
We investigated whether morality associated with faces is perceptible even under less optimal visual conditions such as crowding. A facial image was paired with a sentence describing an immoral act or a neutral act. Participants imagined the person performing the actions described in the sentence during the learning phase. Then, in the crowding phase, the target face was briefly presented in the left or right peripheral visual fields. Participants were required to judge the gender or morality of the target face in Experiment 1 and to choose the target face from two faces in Experiment 2. In both experiments, flankers were presented around the target face in the flanker condition, whereas no flankers were presented in the no-flanker condition. Experiment 1 indicated that the accuracy of judgments about the morality of a crowded face was higher for immoral faces than for neutral faces. This demonstrates that morality is preferentially extracted even when conscious access to facial representations is limited. Experiment 2 showed that the accuracy of selecting the flanked face from two faces was higher for neutral faces than for immoral faces. These indicated that the morality processed under the crowding impaired the discrimination of the facial identity.
APA, Harvard, Vancouver, ISO, and other styles
7

Cleary, Anne M., and Laura E. Specker. "Recognition without face identification." Memory & Cognition 35, no. 7 (October 2007): 1610–19. http://dx.doi.org/10.3758/bf03193495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Abhay Pratap. "Criminal Face Identification System." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (May 31, 2020): 2068–72. http://dx.doi.org/10.22214/ijraset.2020.5339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lao, J., L. He, and R. Caldara. "Microsaccades Boost Face Identification." Journal of Vision 13, no. 9 (July 25, 2013): 1344. http://dx.doi.org/10.1167/13.9.1344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Psychology, J. R., M. Moscovitch, and M. Cadieux. "Face identification is dissociable from face imagery and generic face representation." Journal of Vision 3, no. 9 (March 18, 2010): 826. http://dx.doi.org/10.1167/3.9.826.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Face identification"

1

Watier, Nicholas. "Metacognitive Aspects of Face Identification." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/20532.

Full text
Abstract:
To date, relatively little research has investigated participants’ ability to monitor their memory for faces and names. Four experiments were conducted with aim of developing a comprehensive profile of memory monitoring performance during face identification tasks. In each experiment, memory monitoring judgements were solicited during encoding and/or retrieval of unfamiliar face-name pairs. In general, subjective estimates of future and past memory performance were valid predictors of objective memory performance, regardless of whether a face or name was the item to be retrieved from memory. As a test of the stability of memory monitoring accuracy across different categories of stimuli, memory monitoring for face-name pairs was compared with noun-noun pairs. The predictive validity of estimates of future memory performance was similar across the categories of stimuli, but the predictive validity of estimates of past memory performance was superior for nouns compared with names. A subset of the studies examined the influence of face and name distinctiveness on memory and memory monitoring for face-name associations. This was done in an attempt to identify sources of information that individuals might use to monitor their memory during face-name learning. The beneficial effects of distinctiveness on associative memory were symmetrical between faces and names, such that relative to their typical counterparts, distinct faces enhanced memory for names, and distinct names enhanced memory for faces. These effects were also apparent in memory monitoring. Estimates of future and past memory performance were greater for face-name associations that contained a distinct face or name compared with a typical face or name, regardless of whether the distinct item was a cue or target. Moreover, the predictive validity of prospective monitoring improved with name distinctiveness, whereas the predictive validity of retrospective monitoring improved with facial distinctiveness. Altogether, the results of the dissertation indicate that participants can monitor their memory for faces and names at a level above chance, that retrospective metamemory is more accurate for nouns compared with names, and that distinctiveness not only affects the strength of the association between a face and a name, but also the ability to monitor that association.
APA, Harvard, Vancouver, ISO, and other styles
2

McIntyre, A. H. "Applying psychology to forensic facial identification : perception and identification of facial composite images and facial image comparison." Thesis, University of Stirling, 2012. http://hdl.handle.net/1893/9077.

Full text
Abstract:
Eyewitness recognition is acknowledged to be prone to error but there is less understanding of difficulty in discriminating unfamiliar faces. This thesis examined the effects of face perception on identification of facial composites, and on unfamiliar face image comparison. Facial composites depict face memories by reconstructing features and configurations to form a likeness. They are generally reconstructed from an unfamiliar face memory, and will be unavoidably flawed. Identification will require perception of any accurate features, by someone who is familiar with the suspect and performance is typically poor. In typical face perception, face images are processed efficiently as complete units of information. Chapter 2 explored the possibility that holistic processing of inaccurate composite configurations will impair identification of individual features. Composites were split below the eyes and misaligned to impair holistic analysis (cf. Young, Hellawell, & Jay, 1987); identification was significantly enhanced, indicating that perceptual expertise with inaccurate configurations exerts powerful effects that can be reduced by enabling featural analysis. Facial composite recognition is difficult, which means that perception and judgement will be influence by an affective recognition bias: smiles enhance perceived familiarity, while negative expressions produce the opposite effect. In applied use, facial composites are generally produced from unpleasant memories and will convey negative expression; affective bias will, therefore, be important for facial composite recognition. Chapter 3 explored the effect of positive expression on composite identification: composite expressions were enhanced, and positive affect significantly increased identification. Affective quality rather than expression strength mediated the effect, with subtle manipulations being very effective. Facial image comparison (FIC) involves discrimination of two or more face images. Accuracy in unfamiliar face matching is typically in the region of 70%, and as discrimination is difficult, may be influenced by affective bias. Chapter 4 explored the smiling face effect in unfamiliar face matching. When multiple items were compared, positive affect did not enhance performance and false positive identification increased. With a delayed matching procedure, identification was not enhanced but in contrast to face recognition and simultaneous matching, positive affect improved rejection of foil images. Distinctive faces are easier to discriminate. Chapter 5 evaluated a systematic caricature transformation as a means to increase distinctiveness and enhance discrimination of unfamiliar faces. Identification of matching face images did not improve, but successful rejection of non-matching items was significantly enhanced. Chapter 6 used face matching to explore the basis of own race bias in face perception. Other race faces were manipulated to show own race facial variation, and own race faces to show African American facial variation. When multiple face images were matched simultaneously, the transformation impaired performance for all of the images; but when images were individually matched, the transformation improved perception of other race faces and discrimination of own race faces declined. Transformation of Japanese faces to show own race dimensions produced the same pattern of effects but failed to reach significance. The results provide support for both perceptual expertise and featural processing theories of own race bias. Results are interpreted with reference to face perception theories; implications for application and future study are discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Kranauskas, Justas. "Person Identification by Face and Iris." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2010. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2010~D_20100213_102103-34345.

Full text
Abstract:
In this thesis, person identification by combining automatic face and iris recognition is analyzed. Person identification by his face is one of the most intuitive from all biometric measures. We are used to recognizing familiar faces and confirming identity by a short glance at one's id card which contains image of the face. We are also used to being observed by surveillance cameras, which can perform biometric authentication without even being noticed. However, facial biometrics is one of most unstable metrics because the face gets noticeably older in several years and can frequently change depending on the mood of its owner. The core algorithm for facial recognition presented in this work is based on Gabor features. Deep analysis of each step helped to develop the method with better or similar accuracy to the best published results received on the same datasets, while being simple and fast. On the other hand, person identification by his iris is one of the most sophisticated, stable and accurate biometrics. The core algorithm for iris recognition presented in this work is based on a novel iris texture representation by local extremum points of multiscale Taylor expansion. The proposed irises comparison method is very different from the classic phase-based methods, but is also fast and accurate. Combining it with our implementation of phase-based method results in superior recognition accuracy which is comparable or better than any published results received on the same... [to full text]
Darbe tyrinėjama asmens identifikacija, kombinuojant automatinį veido ir akies rainelės atpažinimą. Automatinė identifikacija pagal veidą yra intuityviausia iš biometrijos metrikų, kadangi būtent pagal veidą mes geriausiai sugebame atpažinti pažįstamus asmenis. Tai yra ir viena labiausiai priimtinų, kadangi visi esame įprate, kad mus filmuoja apsaugos kameros, lengviausiai išmatuojama - nes nereikalauja jokių įmantrių skanerių, tačiau kartu - tai yra ir viena iš nestabiliausių metrikų, kadangi veidas sensta ir šiaip kinta priklausomai nuo savininko nuotaikos. Darbe pristatomas veidų atpažinimo algoritmas paremtas Gaboro požymiais. Nuodugni analizė padėjo sukurti algoritmą, kurio tikslumą vertinant standartiniais testais jis lenkia arba yra lygus su geriausiais publikuotais metodais, tačiau pasižymi paprastumu ir dideliu greičiu. Tuo tarpu automatinė identifikacija pagal rainelę yra laikoma viena stabiliausių ir tiksliausių. Darbe pristatomas rainelių atpažinimo algoritmas naudoja naujovišką rainelių tekstūros vaizdavimo būdą, paremtą lokaliais dvimačiais funkcijų aproksimacijos Teiloro eilutėmis ekstremumais. Kartu pristatomas naudojamų požymių palyginimo metodas, kuris yra labai nutolęs nuo bet kokių iki šiol rainelių tekstūrų palyginimui naudojamų metodų. Pasiūlytas rainelių atpažinimo metodas vėlgi yra spartus ir itin tikslus, o sujungus su klasikinio stiliaus rainelių tekstūrų palyginimu tikslumu nenusileidžia geriausiems publikuotiems metodams. Darbas užbaigiamas veidų... [toliau žr. visą tekstą]
APA, Harvard, Vancouver, ISO, and other styles
4

Stone, Zachary. "Face Identification in the Internet Era." Thesis, Harvard University, 2012. http://dissertations.umi.com/gsas.harvard:10397.

Full text
Abstract:
Despite decades of effort in academia and industry, it is not yet possible to build machines that can replicate many seemingly-basic human perceptual abilities. This work focuses on the problem of face identification that most of us effortlessly solve daily. Substantial progress has been made towards the goal of automatically identifying faces under tightly controlled conditions; however, in the domain of unconstrained face images, many challenges remain. We observe that the recent combination of widespread digital photography, inexpensive digital storage and bandwidth, and online social networks has led to the sudden creation of repositories of billions of shared photographs and opened up an important new domain for unconstrained face identification research. Drawing upon the newly-popular phenomenon of “tagging,” we construct some of the first face identification datasets that are intended to model the digital social spheres of online social network members, and we examine various qualitative and quantitative properties of these image sets. The identification datasets we present here include up to 100 individuals, making them comparable to the average size of members’ networks of “friends” on a popular online social network, and each individual is represented by up to 100 face samples that feature significant real-world variation in appearance, expression, and pose. We demonstrate that biologically-inspired visual representations can achieve state-of-the-art face identification performance on our novel frontal and multi-pose face datasets. We also show that the addition of a tree-structured classifier and training set augmentation can enhance accuracy in the multi-pose setting. Finally, we illustrate that the machine-readable “social context” in which shared photos are often embedded can be applied to further boost face identification accuracy. Taken together, our results suggest that accurate automated face identification in vast online shared photo collections is now feasible.
Engineering and Applied Sciences
APA, Harvard, Vancouver, ISO, and other styles
5

Wong, Vincent. "Human face recognition /." Online version of thesis, 1994. http://hdl.handle.net/1850/11882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jovanović, Nataša. "To whom it may concern adressee identification in face-to-face meetings /." Enschede : University of Twente [Host], 2007. http://doc.utwente.nl/57870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Morrison, Donald J. "Positive and negative priming of person identification." Thesis, University of Stirling, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brennen, Tim. "Facilitation and inhibition of person identification." Thesis, University of Nottingham, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.329857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Knuycky, Leslie Riddick. "The Cross Race Effect: The Influence of Stereotypicality on Memory Errors." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/psych_theses/66.

Full text
Abstract:
In eyewitness identification cases, suspect misidentification is the leading factor attributed to wrongful convictions (Scheck, Neufeld, & Dwyer, 2000), thus, it is of applied importance to identify factors that contribute to the false recollection of faces. One potential factor addressed in the current study was whether face memory and subsequent identification for other-race-faces is biased by the degree to which a target face posses facial features associated with ethnic identity. Individual differences in level of processing (global, local) and prejudice were tested as potential mechanisms contributing to biased judgments. In Experiment 1 a standard face recognition task revealed that prejudice, level of processing, and face-type interacted to predict recognition bias. In Experiment 2 results showed that positive misidentifications (i.e., choosing an incorrect foil) were more likely when a stereotypical versus non-stereotypical Black actor was witnessed committing the crime. Results are discussed in terms of theoretical and practical implications.
APA, Harvard, Vancouver, ISO, and other styles
10

Edmunds, Taiamiti. "Protection of 2D face identification systems against spoofing attacks." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT007/document.

Full text
Abstract:
Les systèmes d’identification faciale sont en plein essor et se retrouvent de plus en plus dans des produits grand public tels que les smartphones et les ordinateurs portables. Cependant, ces systèmes peuvent être facilement bernés par la présentation par exemple d’une photo imprimée de la personne ayant les droits d’accès au système. Cette thèse s’inscrit dans le cadre du projet ANR BIOFENCE qui vise à développer une certification des systèmes biométriques veine, iris et visage permettant aux industriels de faire valoir leurs innovations en termes de protection. L’objectif de cette thèse est double, d’abord il s’agit de développer des mesures de protection des systèmes 2D d’identification faciale vis à vis des attaques connues à ce jour (photos imprimées, photos ou vidéos sur un écran, masques) puis de les confronter à la méthodologie de certification développée au sein du projet ANR. Dans un premier temps, un état de l’art général des attaques et des contremesures est présenté en mettant en avant les méthodes algorithmiques (« software ») par rapport aux méthodes hardware. Ensuite, plusieurs axes sont approfondis au cours de ce travail. Le premier concerne le développement d’une contremesure basée sur une analyse de texture et le second concerne le développement d’une contre-mesure basée sur une analyse de mouvement. Ensuite, une modélisation du processus de recapture pour différencier un faux visage d’un vrai est proposée. Une nouvelle méthode de protection est développée sur ce concept en utilisant les données d'enrolment des utilisateurs et un premier pas est franchi dans la synthèse d'attaque pour un nouvel utilisateur à partir de sa donnée d'enrolment. Enfin, la méthodologie de certification développée pour les systèmes à empreintes digitales est évaluée pour les systèmes d'identification facial
Face identification systems are growing rapidly and invade the consumer market with security products in smartphones, computers and banking. However, these systems are easily fooled by presenting a picture of the person having legitimate access to the system. This thesis is part of the BIOFENCE project which aim to develop a certification of biometric systems in order for industrials to promote their innovations in terms of protection. Our goal is to develop new anti-spoofing countermeasures for 2D face biometric systems and to evaluate the certification methodology on protected systems. First, a general state of the art in face spoofing attack forgery and in anti-spoofing protection measures is presented. Then texture-based countermeasures and motion-based countermeasures are investigated leading to the development of two novel countermeasures. Then, the recapturing process is modelled and a new fake face detection approach is proposed based on this model. Taking advantage of enrolment samples from valid users, a first step toward the synthesis of spoofing attacks for new users is taken. Finally, the certification methodology originally developed for fingerprint technology is evaluated on face biometric systems
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Face identification"

1

Hammoud, Riad I., Besma R. Abidi, and Mongi A. Abidi, eds. Face Biometrics for Personal Identification. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-49346-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Valentine, Tim, and Josh P. Davis. Forensic facial identification: Theory and practice of identification from eyewitnesses, composites and CCTV. Chichester, West Sussex: John Wiley & Sons Inc., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1965-, WILKINSON CAROLINE. Craniofacial identification. Cambridge: Cambridge University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hes, Ronald. At face value: On biometrical identification and privacy. 2nd ed. The Hague: Registratiekamer, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Murray, Elizabeth A. Human identification: Putting a name and face on death. Minneapolis, MN: Twenty-First Century Books, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hammoud, Riad I. Face biometrics for personal identification: Multi-sensory multi-modal systems. Berlin: Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

author, Vollmann William T., ed. Unspeaking Likeness. Santa Fe, NM: Twin Palms Publishers, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Groc, Isabelle. Gentle giants: An emotional face to face with dolphins and whales. [Vercelli, Italy]: White Star Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zinin, A. M. Vneshnostʹ cheloveka v kriminalistike i sudebnoĭ ėkspertize: Monografii︠a︡. Moskva: I︠U︡rlitinform, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hamilton, Sue L. Forensic artist: Solving the case with a face. Edina, Minn: ABDO Pub. Co., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Face identification"

1

Klasén, Lena, and Haibo Li. "Faceless Identification." In Face Recognition, 513–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-72201-1_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Xiaogang. "Face Identification." In Computer Vision, 279–85. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-0-387-31439-6_354.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gross, Ralph, Latanya Sweeney, Jeffrey Cohn, Fernando de la Torre, and Simon Baker. "Face De-identification." In Protecting Privacy in Video Surveillance, 129–46. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-301-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gabbert, Fiona, and Charity Brown. "Interviewing for Face Identification." In Forensic Facial Identification, 15–41. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118469538.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bruce, Vicki, Peter J. B. Hancock, and A. Mike Burton. "Human Face Perception and Identification." In Face Recognition, 51–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-72201-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Takimoto, Hironori, Yasue Mitsukura, Norio Akamatsu, and Rajiv Khosla. "Face Identification Method Using the Face Shape." In Lecture Notes in Computer Science, 1157–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45224-9_156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

O'Toole, Alice, and P. Jonathon Phillips. "Evaluating Automatic Face Recognition Systems with Human Benchmarks." In Forensic Facial Identification, 263–83. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118469538.ch11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Orellana, Bryan, Luiggi Álvarez, and Jimmy Armas-Aguirre. "Face Recognition for Criminal Identification." In Proceedings of the 6th Brazilian Technology Symposium (BTSym’20), 368–77. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75680-2_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Salama, Mohammad, and Hagit Hel-Or. "Face-Image Source Generator Identification." In Computer Vision – ECCV 2020 Workshops, 511–27. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-68238-5_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Henneberg, Maciej, Ellie Simpson, and Carl Stephan. "Human Face in Biological Anthropology: Craniometry, Evolution and Forensic Identification." In The Human Face, 29–48. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-1063-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Face identification"

1

Wilder, Joseph, S. Juth, Augustine Tsai, and X. Y. Zhang. "Face recognition using the neural tree network." In Substance Identification Technologies, edited by James L. Flanagan, Richard J. Mammone, Albert E. Brandenstein, Edward R. Pike, Stelios C. A. Thomopoulos, Marie-Paule Boyer, H. K. Huang, and Osman M. Ratib. SPIE, 1994. http://dx.doi.org/10.1117/12.172539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goel, Prerit, Ritin Behl, Pranjul Aggarwal, Manish Srivastava, and Sanyam Gupta. "Face Identification System." In 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE, 2019. http://dx.doi.org/10.1109/icict46931.2019.8977684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Beumier, Charles, and Marc P. J. Acheroy. "Automatic face identification." In SPIE's 1995 International Symposium on Optical Science, Engineering, and Instrumentation, edited by Andrew G. Tescher. SPIE, 1995. http://dx.doi.org/10.1117/12.217414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Sandesh, Shashank Kapoor, and Phalguni Gupta. "Frontal face generation from profile face image." In 2011 International Conference on Anti-Counterfeiting, Security and Identification (2011 ASID). IEEE, 2011. http://dx.doi.org/10.1109/asid.2011.5967417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Donghyun, Matthias Hernandez, Jongmoo Choi, and Gerard Medioni. "Deep 3D face identification." In 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2017. http://dx.doi.org/10.1109/btas.2017.8272691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chatzikyriakidis, Efstathios, Christos Papaioannidis, and Ioannis Pitas. "Adversarial Face De-Identification." In 2019 IEEE International Conference on Image Processing (ICIP). IEEE, 2019. http://dx.doi.org/10.1109/icip.2019.8803803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, D. C. H., and Yu-Long Lin. "Face Identification of Objects in Wireframe Representation." In ASME 1994 Design Technical Conferences collocated with the ASME 1994 International Computers in Engineering Conference and Exhibition and the ASME 1994 8th Annual Database Symposium. American Society of Mechanical Engineers, 1994. http://dx.doi.org/10.1115/detc1994-0080.

Full text
Abstract:
Abstract In this paper a method for the face identification of wireframe models has been proposed. The method is based on a new definition of the connectivity matrix. The main idea of this definition is that each element of the connectivity matrix carries the information of the number of faces adjacent to the element. A face identification algorithm is subsequently developed. The algorithm is based on graph theory, and two anomalous detection methods, namely, a remaining connectivity matrix method and an inner product method. The inner product method is used for identifying cross-intersected pseudo interior faces, and the remaining connectivity matrix method, for other types of pseudo interior faces. The results show that this method is systematic and comprehensive.
APA, Harvard, Vancouver, ISO, and other styles
8

Dos Santos, Cassio Elias, and William Robson Schwartz. "Extending Face Identification to Open-Set Face Recognition." In 2014 27th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI). IEEE, 2014. http://dx.doi.org/10.1109/sibgrapi.2014.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tonchev, Krasimir, Slavcho Neshev, Radostina Petkova, Agata Manolova, and Vladimir Poulkov. "Person and Face Re-Identification Using Semantic Information and Single Shot Face Identification." In 2023 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT & NCON). IEEE, 2023. http://dx.doi.org/10.1109/ectidamtncon57770.2023.10139406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Dianting, Zongying Ou, Guoqiang Wang, Shungang Hua, and Tieming Su. "Face Recognition Using Hierarchical Isomap." In 2007 IEEE Workshop on Automatic Identification Advanced Technologies. IEEE, 2007. http://dx.doi.org/10.1109/autoid.2007.380601.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Face identification"

1

Grother, Patrick, Austin Hom, Mei Ngan, and Kayee Hanaoka. Face Recognition Vendor Test (FRVT) Part 7: Identification for Paperless Travel and Immigration. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gallardo Montoya, María Lourdes, Arturo Muente, and Eugenia Valdez. Building Scenarios for the Future of Digital Identification Systems in Latin America and the Caribbean. Inter-American Development Bank, February 2023. http://dx.doi.org/10.18235/0004729.

Full text
Abstract:
Digital identification systems unlock tremendous benefits from digital government initiatives. However, governments across the globe, including in Latin America and the Caribbean, have been slow to implement them in the face of constantly changing technologies. This report describes the results of a novel process--the building of future scenarios--aimed at helping governments advance reform in the face of technological and other uncertainties. The Innovation in Citizen Services Division and Knowledge Innovation and Communication Sector of the Inter-American Development Bank proposed these future scenarios to improve strategic decision making and encourage an open discussion on the future of digital identification systems from a non-traditional point of view. The results of this and future scenario-building exercises should spark innovative ideas that allow governments, public and private sector organizations, civil society, and citizens at large to re-think their role in the digital identification ecosystem in the next 10 years.
APA, Harvard, Vancouver, ISO, and other styles
3

Kasper, Eric, and Mina Chiang. Barriers and Opportunities for More Effective Identification of Victims of Human Trafficking: Insights from Bangladesh, Cambodia, and Taiwan. Winrock International, June 2022. http://dx.doi.org/10.19088/ids.2022.033.

Full text
Abstract:
Every year, countless people become victims of human trafficking. The number is countless because the vast majority of those cases go unidentified and unreported. As a result, victims remain invisible, go unsupported, continue to suffer abuses, and continue to face stigma and trauma even after finding their way out of trafficking. This lack of visibility also makes it difficult to really understand how trafficking works, which seriously hinders international counter trafficking efforts.
APA, Harvard, Vancouver, ISO, and other styles
4

Varastehpour, Soheil, Hamid Sharifzadeh, Iman Ardekani, and Abdolhossein Sarrafzadeh. Human Biometric Traits: A Systematic Review Focusing on Vascular Patterns. Unitec ePress, December 2020. http://dx.doi.org/10.34074/ocds.086.

Full text
Abstract:
Authentication methods based on human traits, including fingerprint, face, iris, and palm print, have developed significantly, and currently they are mature enough to be reliably considered for human identification purposes. Recently, as a new research area, a few methods based on non-facial skin features such as vein patterns have been developed. This literature review paper explores some key biometric systems such as face recognition, iris recognition, fingerprint, and palm print, and discusses their respective advantages and disadvantages; then by providing a comprehensive analysis of these traits, and their applications, vein pattern recognition is reviewed.
APA, Harvard, Vancouver, ISO, and other styles
5

Schattman, Rachel, Vern Grubinger, Lisa McKaeg, and Katie Nelson. Whole Farm Water Use: A Survey of Vegetable Producers in New England States | 2018. USDA Northeast Climate Hub, June 2018. http://dx.doi.org/10.32747/2018.6938606.ch.

Full text
Abstract:
Produce safety and climate change are two overlapping risks that face vegetable producers in the northeastern United States. Because of recent public health outbreaks (and subsequent litigation) traced back to fresh produce, food safety hazard identification and risk mitigation has become the focus of significant regulatory changes in the United States (FDA 2015)
APA, Harvard, Vancouver, ISO, and other styles
6

GONZALEZ, JAZMIN ALEJANDRA ORGAZ, ROSA MARIA OSTIGUIN MELENDEZ, GLADIS PATRICIA ARISTIZABAL HOYOS, and ARIEL VILCHIS REYES. Facilitators and obstacles of diabetes self-management programs from implementation sciences. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, April 2023. http://dx.doi.org/10.37766/inplasy2023.4.0092.

Full text
Abstract:
Review question / Objective: What are the facilitators and obstacles of diabetes self-management programs from implementation sciences? Rationale: Diabetes is a chronic disease that affects millions of people around the world, it is a complex disease that requires a comprehensive approach in management and treatment. Self-management of diabetes is essential to control the disease and prevent complications. There are many programs designed to help people manage diabetes, but not all of them are effective in practice. Identifying the barriers and facilitators that patients face when using diabetes self-management programs can help identify factors that influence the implementation and success of these programs, such as accessibility, adherence, education, and support. social support. This will allow the identification of best practices and effective strategies to improve the implementation of these programs.
APA, Harvard, Vancouver, ISO, and other styles
7

Gurevitz, Michael, William A. Catterall, and Dalia Gordon. Learning from Nature How to Design Anti-insect Selective Pesticides - Clarification of the Interacting Face between Insecticidal Toxins and their Na-channel Receptors. United States Department of Agriculture, January 2010. http://dx.doi.org/10.32747/2010.7697101.bard.

Full text
Abstract:
Structural details on the interacting faces of toxins and sodium channels (Navs), and particularly identification of elements that confer specificity for insects, are difficult to approach and require suitable experimental systems. Therefore, natural toxins capable of differential recognition of insect and mammalian Navs are valuable leads for design of selective compounds in insect control. We have characterized several scorpion toxins that vary in preference for insect and mammalian Navs, and identified residues important for their action. However, despite many efforts worldwide, only little is known about the receptor sites of these toxins, and particularly on differences between these sites on insect and mammalian Navs. Another problem arises from the massive overuse of chemical insecticides, which increases resistance buildup among various insect pests. A possible solution to this problem is to combine different insecticidal compounds, especially those that provide synergic effects. Our recent finding that combinations of insecticidal receptor site-3 toxins (sea anemone and scorpion alpha) with scorpion beta toxins or their truncated derivatives are synergic in toxicity to insects is therefore timely and strongly supports this approach. Our ability to produce toxins and various Navs in recombinant forms, enable thorough analysis and structural manipulations of both toxins and receptors. On this basis we propose to (1) restrict by mutagenesis the activity of insecticidal scorpion -toxins and sea anemone toxins to insects, and clarify the molecular basis of their synergic toxicity with antiinsect selective -toxins; (2) identify Nav elements that interact with scorpion alpha and sea anemone toxins and those that determine toxin selectivity to insects; (3) determine toxin-channel pairwise side-chain interactions by thermodynamic mutant cycle analysis using our large collection of mutant -toxins and Nav mutants identified in aim 2; (4) clarify the mode of interaction of truncated -toxins with insect Navs, and elucidate how they enhance the activity of insecticidal site-3 toxins. This research may lead to rational design of novel anti-insect peptidomimetics with minimal impact on human health and the environment, and will establish the grounds for a new strategy in insect pest control, whereby a combination of allosterically interacting compounds increase insecticidal action and reduce risks of resistance buildup.
APA, Harvard, Vancouver, ISO, and other styles
8

Gurevitz, Michael, William A. Catterall, and Dalia Gordon. face of interaction of anti-insect selective toxins with receptor site-3 on voltage-gated sodium channels as a platform for design of novel selective insecticides. United States Department of Agriculture, December 2013. http://dx.doi.org/10.32747/2013.7699857.bard.

Full text
Abstract:
Voltage-gated sodium channels (Navs) play a pivotal role in excitability and are a prime target of insecticides like pyrethroids. Yet, these insecticides are non-specific due to conservation of Navs in animals, raising risks to the environment and humans. Moreover, insecticide overuse leads to resistance buildup among insect pests, which increases misuse and risks. This sad reality demands novel, more selective, insect killers whose alternative use would avoid or reduce this pressure. As highly selective insect toxins exist in venomous animals, why not exploit this gift of nature and harness them in insect pest control? Many of these peptide toxins target Navs, and since their direct use via transformed crop plants or mediator microorganisms is problematic in public opinion, we focus on the elucidation of their receptor binding sites with the incentive of raising knowledge for design of toxin peptide mimetics. This approach is preferred nowadays by agro-industries in terms of future production expenses and public concern. However, characterization of a non-continuous epitope, that is the channel receptor binding site for such toxins, requires a suitable experimental system. We have established such a system within more than a decade and reached the stage where we employ a number of different insect-selective toxins for the identification of their receptor sites on Navs. Among these toxins we wish to focus on those that bind at receptor site-3 and inhibit Nav inactivation because: (1) We established efficient experimental systems for production and manipulation of site-3 toxins from scorpions and sea anemones. These peptides vary in size and structure but compete for site-3 on insect Navs. Moreover, these toxins exhibit synergism with pyrethroids and with other channel ligands; (2) We determined their bioactive surfaces towards insect and mammalian receptors (see list of publications); (3) We found that despite the similar mode of action on channel inactivation, the preference of the toxins for insect and mammalian channel subtypes varies greatly, which can direct us to structural features in the basis of selectivity; (4) We have identified by channel loop swapping and point mutagenesis extracellular segments of the Navinvolved with receptor site-3. On this basis and using channel scanning mutagenesis, neurotoxin binding, electrophysiological analyses, and structural data we offer: (i) To identify the residues that form receptor site-3 at insect and mammalian Navs; (ii) To identify by comparative analysis differences at site-3 that dictate selectivity toward various Navs; (iii) To exploit the known toxin structures and bioactive surfaces for modeling their docking at the insect and mammalian channel receptors. The results of this study will enable rational design of novel anti-insect peptide mimetics with minimized risks to human health and to the environment. We anticipate that the release of receptor site-3 molecular details would initiate a worldwide effort to design peptide mimetics for that site. This will establish new strategies in insect pest control using alternative insecticides and the combined use of compounds that interact allosterically leading to increased efficiency and reduced risks to humans or resistance buildup among insect pests.
APA, Harvard, Vancouver, ISO, and other styles
9

Bain, Rachel, Richard Styles, and Jared Lopes. Ship-induced waves at Tybee Island, Georgia. Engineer Research and Development Center (U.S.), December 2022. http://dx.doi.org/10.21079/11681/46140.

Full text
Abstract:
Commercial vessels transiting the Savannah entrance channel intermittently generate large wake events at Tybee Island, Georgia, creating a potential hazard for beachgoers. However, not all commercial vessels generate large wakes, and the relationship between vessel dimensions, operating conditions, wake height, and drawdown magnitude is unclear. This study evaluates bathymetric data, high-frequency wave and vessel wake measurements, and broadcast vessel identification over a 4-month period with the goal of providing a quantitative characterization of vessel wake conditions at Tybee Island. Data from 1,386 cargo vessel passages and 202 tanker passages indicate that vessel dimensions (length and beam) are positively correlated with drawdown magnitude and secondary wake height, although large vessels do not consistently generate large wakes. Container ships, which tended to travel faster than tankers, corresponded to the largest wakes in the dataset. A further hypothesis is that tidally modulated energy dissipation may favor smaller vessel wake uprush at low tide and larger uprush at high tide, but this idea cannot be confirmed without additional measurements to quantify nonlinear wave propagation on the beach face. Based on the collected data, the study concludes with four recommendations for reducing risk to beachgoers.
APA, Harvard, Vancouver, ISO, and other styles
10

Possidónio, Catarina, Ana Rita Farias, Samuel Domingos, Bernardo Cruz, Sílvia Luís, and Ana Loureiro. Exploring supply-side barriers for commercialization of new biopolymer production technologies: A systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, May 2023. http://dx.doi.org/10.37766/inplasy2023.5.0076.

Full text
Abstract:
Review question / Objective: What are the multi-level supply-side barriers to the commercialization of new biopolymer production technologies? Condition being studied: Biopolymers are sustainable and environmentally friendly alternatives to traditional petroleum-based polymers, and their use is becoming increasingly important for reducing the negative impact of plastic waste on the environment. Despite the potential benefits of biopolymers, their commercialization might face several supply-side barriers. This systematic review aims the identification and characterization of these barriers. The focus is on understanding the challenges involved in the commercialization of new biopolymer production technologies, which may include technological, economic, regulatory, and social factors that can affect the adoption and use of biopolymers in various industries. The question studied in this systematic review is relevant to a broad range of stakeholders, including researchers, policymakers, and industry professionals involved in the development, production, and commercialization of new biopolymer technologies. By providing a comprehensive synthesis of the existing literature on the multi-level supply-side barriers that can hinder the commercialization of new biopolymer production technologies, this systematic review aims to inform future research, policy, and practice to facilitate the successful implementation of these technologies.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography