We present two extensions of the algorithm by Broomhead et al [2] which is based on the idea that singular values that scale linearly with the radius of the data ball can be explo...
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
— In the last decade, face analysis, e.g. face recognition, face detection, face tracking and facial expression recognition, is a very lively and expanding research field. As com...
Do Hyoung Kim, Sung-Uk Jung, Kwang Ho An, Hui Sung...
The detection of faces in images is fundamentally a rare event detection problem. Cascade classifiers provide an efficient computational solution, by leveraging the asymmetry in t...
The face region immediately surrounding one, or both, eyes is called the periocular region. This paper presents an iris segmentation algorithm for challenging periocular images bas...