Detail publikace

Thermal Face Recognition - Fusion of common used methods

Originální název

Thermal Face Recognition - Fusion of common used methods

Anglický název

Thermal Face Recognition - Fusion of common used methods

Jazyk

en

Originální abstrakt

One of underused biometric methods is the face recognition based on thermal images. Nevertheless, in the applications such as liveness detection or fever scan, the thermal face recognition is used as a standalone module, or as a part of a multimodal biometric system. This article presents an overview and comparison of various statistical methods for thermal facial image analysis and recognition. It also proposes an approach to fusion of some methods to improve the overall performance.

Anglický abstrakt

One of underused biometric methods is the face recognition based on thermal images. Nevertheless, in the applications such as liveness detection or fever scan, the thermal face recognition is used as a standalone module, or as a part of a multimodal biometric system. This article presents an overview and comparison of various statistical methods for thermal facial image analysis and recognition. It also proposes an approach to fusion of some methods to improve the overall performance.

BibTex


@inproceedings{BUT96968,
  author="Štěpán {Mráček} and Jan {Váňa} and Svetlana {Yanushkevich} and Martin {Drahanský} and Radim {Dvořák}",
  title="Thermal Face Recognition - Fusion of common used methods",
  annote="
One of underused biometric methods is the face
recognition based on thermal images. Nevertheless, in the
applications such as liveness detection or fever scan, the
thermal face recognition is used as a standalone module,
or as a part of a multimodal biometric system. This article
presents an overview and comparison of various
statistical methods for thermal facial image analysis and
recognition. It also proposes an approach to fusion of
some methods to improve the overall performance.",
  address="IEEE Computer Society",
  booktitle="Proceedings of the Emerging Security Technologies (EST 2012)",
  chapter="96968",
  doi="10.1109/EST.2012.24",
  edition="NEUVEDEN",
  howpublished="print",
  institution="IEEE Computer Society",
  year="2012",
  month="august",
  pages="1--4",
  publisher="IEEE Computer Society",
  type="conference paper"
}