- Full text PDF available (12)
- This year (0)
- Last five years (0)
The paper presents results of the face verification contest that was organized in conjunction with International Conference on Pattern Recognition 2000 . Participants had to use identical data sets from a large, publicly available multimodal database XM2VTSDB. Training and evaluation was carried out according to an a priori known protocol ().… (More)
The paper presents the European ACTS project " M2VTS " which stands for Multi Modal Verification for Teleservices and Security Applications. The primary goal of this project is to address the issue of secured access to local and centralised services in a multimedia environment. The main objective is to extend the scope of application of network based… (More)
Biometric person identity authentication is gaining more and more attention. The authentication task performed by an expert is a binary classification problem: reject or accept identity claim. Combining experts, each based on a different modality (speech, face, fingerprint, etc.), increases the performance and robustness of identity authentication systems.… (More)
Personal computing and communication devices such as computers, PDAs, and Author: Please 1. spell out PAD here mobile phones are moving to their next generation in which the end user will be able to access a multitude of information with a single device either locally or through a network. One likely trend in future personal computing and personal… (More)
An algorithm for feature point extraction is presented. It is based on a scale-space representation of the image as well as a system for tracking across scales. Using synthetic and real images, it is shown that the proposed algorithm produces stable and well-localized feature points estimates two essential properties for video applications.
In this paper, we address the problem privacy in video surveillance. We propose an efficient solution based on transform-domain scrambling of regions of interest in a video sequence. More specifically, the sign of selected transform coefficients is flipped during encoding. We address more specifically the case of Motion JPEG 2000. Simulation results show… (More)
Multi-modal person identity authentication is gaining more and more attention in the biometrics area. Combining diierent modalities increases the performance and robustness of identity authentication systems. The authentication problem is a binary classiication problem. The fusion of diierent modalities can be therefore performed by binary classiiers. We… (More)
This paper presents a video-based camera tracker that combines marker-based and feature point-based cues within a particle filter framework. The framework relies on their complementary performances. On the one hand, marker-based trackers can robustly recover camera position and orientation when a reference (marker) is available but fail once the reference… (More)
This paper presents a new approach to the detection of shot boundaries. The video is characterized through the tracking of feature points, extracted from the video sequence. The rate of the feature points that are lost or initiated is used as a criterion for shot boundary detection.