AIMC Topic: Biometric Identification

Clear Filters Showing 31 to 40 of 153 articles

LHPE-nets: A lightweight 2D and 3D human pose estimation model with well-structural deep networks and multi-view pose sample simplification method.

PloS one
The cross-view 3D human pose estimation model has made significant progress, it better completed the task of human joint positioning and skeleton modeling in 3D through multi-view fusion method. The multi-view 2D pose estimation part of this model is...

A Two-Stream Dynamic Pyramid Representation Model for Video-Based Person Re-Identification.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Video-based person re-identification (Re-ID) leverages rich spatio-temporal information embedded in sequence data to further improve the retrieval accuracy comparing with single image Re-ID. However, it also brings new difficulties. 1) Both spatial a...

Gait-Based Implicit Authentication Using Edge Computing and Deep Learning for Mobile Devices.

Sensors (Basel, Switzerland)
Implicit authentication mechanisms are expected to prevent security and privacy threats for mobile devices using behavior modeling. However, recently, researchers have demonstrated that the performance of behavioral biometrics is insufficiently accur...

Self-Training With Progressive Representation Enhancement for Unsupervised Cross-Domain Person Re-Identification.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
In recent years, person re-identification (re-ID) has achieved relatively good performance, benefiting from the revival of deep neural networks. However, due to the existence of domain bias which refers to the different data distributions between two...

Iterative Dynamic Generic Learning for Face Recognition From a Contaminated Single-Sample Per Person.

IEEE transactions on neural networks and learning systems
This article focuses on a new and practical problem in single-sample per person face recognition (SSPP FR), i.e., SSPP FR with a contaminated biometric enrolment database (SSPP-ce FR), where the SSPP-based enrolment database is contaminated by nuisan...

Person Reidentification via Unsupervised Cross-View Metric Learning.

IEEE transactions on cybernetics
Person reidentification (Re-ID) aims to match observations of individuals across multiple nonoverlapping camera views. Recently, metric learning-based methods have played important roles in addressing this task. However, metrics are mostly learned in...

Batch Coherence-Driven Network for Part-Aware Person Re-Identification.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Existing part-aware person re-identification methods typically employ two separate steps: namely, body part detection and part-level feature extraction. However, part detection introduces an additional computational cost and is inherently challenging...

Efficiently Updating ECG-Based Biometric Authentication Based on Incremental Learning.

Sensors (Basel, Switzerland)
Recently, the interest in biometric authentication based on electrocardiograms (ECGs) has increased. Nevertheless, the ECG signal of a person may vary according to factors such as the emotional or physical state, thus hindering authentication. We pro...

Multi-View Gait Image Generation for Cross-View Gait Recognition.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Gait recognition aims to recognize persons' identities by walking styles. Gait recognition has unique advantages due to its characteristics of non-contact and long-distance compared with face and fingerprint recognition. Cross-view gait recognition i...

Unsupervised Cross Domain Person Re-Identification by Multi-Loss Optimization Learning.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Unsupervised cross domain (UCD) person re-identification (re-ID) aims to apply a model trained on a labeled source domain to an unlabeled target domain. It faces huge challenges as the identities have no overlap between these two domains. At present,...