AIMC Topic: Biometric Identification

Clear Filters Showing 31 to 40 of 151 articles

Gait-Based Implicit Authentication Using Edge Computing and Deep Learning for Mobile Devices.

Sensors (Basel, Switzerland)
Implicit authentication mechanisms are expected to prevent security and privacy threats for mobile devices using behavior modeling. However, recently, researchers have demonstrated that the performance of behavioral biometrics is insufficiently accur...

Self-Training With Progressive Representation Enhancement for Unsupervised Cross-Domain Person Re-Identification.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
In recent years, person re-identification (re-ID) has achieved relatively good performance, benefiting from the revival of deep neural networks. However, due to the existence of domain bias which refers to the different data distributions between two...

Iterative Dynamic Generic Learning for Face Recognition From a Contaminated Single-Sample Per Person.

IEEE transactions on neural networks and learning systems
This article focuses on a new and practical problem in single-sample per person face recognition (SSPP FR), i.e., SSPP FR with a contaminated biometric enrolment database (SSPP-ce FR), where the SSPP-based enrolment database is contaminated by nuisan...

Person Reidentification via Unsupervised Cross-View Metric Learning.

IEEE transactions on cybernetics
Person reidentification (Re-ID) aims to match observations of individuals across multiple nonoverlapping camera views. Recently, metric learning-based methods have played important roles in addressing this task. However, metrics are mostly learned in...

Batch Coherence-Driven Network for Part-Aware Person Re-Identification.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Existing part-aware person re-identification methods typically employ two separate steps: namely, body part detection and part-level feature extraction. However, part detection introduces an additional computational cost and is inherently challenging...

Efficiently Updating ECG-Based Biometric Authentication Based on Incremental Learning.

Sensors (Basel, Switzerland)
Recently, the interest in biometric authentication based on electrocardiograms (ECGs) has increased. Nevertheless, the ECG signal of a person may vary according to factors such as the emotional or physical state, thus hindering authentication. We pro...

Multi-View Gait Image Generation for Cross-View Gait Recognition.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Gait recognition aims to recognize persons' identities by walking styles. Gait recognition has unique advantages due to its characteristics of non-contact and long-distance compared with face and fingerprint recognition. Cross-view gait recognition i...

Unsupervised Cross Domain Person Re-Identification by Multi-Loss Optimization Learning.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Unsupervised cross domain (UCD) person re-identification (re-ID) aims to apply a model trained on a labeled source domain to an unlabeled target domain. It faces huge challenges as the identities have no overlap between these two domains. At present,...

HOReID: Deep High-Order Mapping Enhances Pose Alignment for Person Re-Identification.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Despite the remarkable progress in recent years, person Re-Identification (ReID) approaches frequently fail in cases where the semantic body parts are misaligned between the detected human boxes. To mitigate such cases, we propose a novel High-Order ...

Complementary Pseudo Labels for Unsupervised Domain Adaptation On Person Re-Identification.

IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
In recent years, supervised person re-identification (re-ID) models have received increasing studies. However, these models trained on the source domain always suffer dramatic performance drop when tested on an unseen domain. Existing methods are pri...