Handbook of Face Recognition, 2nd Edition

This highly anticipated new edition provides a comprehensive account of face recognition research and technology, spanning the full range of topics needed for designing operational face recognition systems. After a thorough introductory chapter, each of the following chapters focus on a specific topic, reviewing background information, up-to-date techniques, and recent results, as well as offering challenges and future directions. Features: fully updated, revised and expanded, covering the entire spectrum of concepts, methods, and algorithms for automated face detection and recognition systems; provides comprehensive coverage of face detection, tracking, alignment, feature extraction, and recognition technologies, and issues in evaluation, systems, security, and applications; contains numerous step-by-step algorithms; describes a broad range of applications; presents contributions from an international selection of experts; integrates numerous supporting graphs, tables, charts, and performance data.

[1]  Gregory D. Hager,et al.  Efficient Region Tracking With Parametric Models of Geometry and Illumination , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[2]  Rama Chellappa,et al.  A generic approach to simultaneous tracking and verification in video , 2002, IEEE Trans. Image Process..

[3]  David J. Fleet,et al.  Robust online appearance models for visual tracking , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[4]  K. Etemad,et al.  Discriminant analysis for recognition of human face images , 1997 .

[5]  Demetri Terzopoulos,et al.  Multi-camera Control through Constraint Satisfaction for Persistent Surveillance , 2008, 2008 IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance.

[6]  Xiaoming Liu,et al.  An intelligent video framework for homeland protection , 2007, SPIE Defense + Commercial Sensing.

[7]  Jian Zhao,et al.  Anonymous Biometric Access Control , 2009, EURASIP J. Inf. Secur..

[8]  Takeo Kanade,et al.  Resolution-Aware Fitting of Active Appearance Models to Low Resolution Images , 2006, ECCV.

[9]  Heinrich Niemann,et al.  Statistical modeling and performance characterization of a real-time dual camera surveillance system , 2000, Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662).

[10]  Patrick J. Flynn,et al.  A survey of approaches and challenges in 3D and multi-modal 3D + 2D face recognition , 2006, Comput. Vis. Image Underst..

[11]  C. Diehl,et al.  Scheduling an active camera to observe people , 2004, VSSN '04.

[12]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[13]  Sudeep Sarkar,et al.  Outdoor recognition at a distance by fusing gait and face , 2007, Image Vis. Comput..

[14]  B. Anderson,et al.  Optimal Filtering , 1979, IEEE Transactions on Systems, Man, and Cybernetics.

[15]  Rama Chellappa,et al.  Human and machine recognition of faces: a survey , 1995, Proc. IEEE.

[16]  Michel Dhome,et al.  A simple and efficient template matching algorithm , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[17]  Harry Shum,et al.  Accurate Face Alignment using Shape Constrained Markov Network , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[18]  Alberto Del Bimbo,et al.  Learning Foveal Sensing Strategies in Unconstrained Surveillance Environments , 2006, 2006 IEEE International Conference on Video and Signal Based Surveillance.

[19]  Xiaoming Liu,et al.  Video-based face model fitting using Adaptive Active Appearance Model , 2010, Image Vis. Comput..

[20]  J. Elder,et al.  Towards Face Recognition at a Distance , 2006 .

[21]  Xiaoming Liu,et al.  Discriminative Face Alignment , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[23]  Demetri Terzopoulos,et al.  Surveillance in Virtual Reality: System Design and Multi-Camera Control , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[24]  Edoardo M. Airoldi,et al.  Integrating Utility into Face De-identification , 2005, Privacy Enhancing Technologies.

[25]  Jonathan Warrell,et al.  Tied Factor Analysis for Face Recognition across Large Pose Differences , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[26]  Henning Heiselberg,et al.  Long distance high accuracy 3-D laser radar and person identification , 2005, SPIE Defense + Commercial Sensing.

[27]  Peter Danielson Video surveillance for the rest of us: proliferation, privacy, and ethics education , 2002, IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293).

[28]  Jongmoo Choi,et al.  Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred Three-Dimensional Face Models , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[29]  Zhong Zhang,et al.  The Intelligent vision sensor: Turning video into information , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.

[30]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[31]  Rama Chellappa,et al.  Face reconstruction from monocular video using uncertainty analysis and a generic model , 2003, Comput. Vis. Image Underst..

[32]  Luc Van Gool,et al.  A distributed camera system for multi-resolution surveillance , 2009, 2009 Third ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC).

[33]  Marco Zennaro,et al.  Large-scale privacy protection in Google Street View , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[34]  Simon J. Godsill,et al.  On sequential Monte Carlo sampling methods for Bayesian filtering , 2000, Stat. Comput..

[35]  Rama Chellappa,et al.  Structure from Motion Using Sequential Monte Carlo Methods , 2004, International Journal of Computer Vision.

[36]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[37]  Xavier Boyen,et al.  Tractable Inference for Complex Stochastic Processes , 1998, UAI.

[38]  Tomoji Toriyama,et al.  Factors on the sense of privacy in video surveillance , 2006, CARPE '06.

[39]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[40]  Sharath Pankanti,et al.  Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .

[41]  Peter H. Tu,et al.  Face Model Fitting on Low Resolution Images , 2006, BMVC.

[42]  Michael Elad,et al.  Fast and robust multiframe super resolution , 2004, IEEE Transactions on Image Processing.

[43]  Carlo S. Regazzoni,et al.  Dual camera system for face detection in unconstrained environments , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[44]  Sean Borman,et al.  Topics in Multiframe Superresolution Restoration , 2004 .

[45]  Irfan Essa,et al.  A System for Tracking and Recognizing Multiple People with Multiple Cameras , 1998 .

[46]  Michael Isard,et al.  Contour Tracking by Stochastic Propagation of Conditional Density , 1996, ECCV.

[47]  Sami Romdhani,et al.  Face Identification by Fitting a 3D Morphable Model Using Linear Shape and Texture Error Functions , 2002, ECCV.

[48]  Aly A. Farag,et al.  Distant face recognition based on sparse-stereo reconstruction , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[49]  M. Abidi,et al.  High Magnification and Long Distance Face Recognition: Database Acquisition, Evaluation, and Enhancement , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[50]  D. Brin The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? , 1998 .

[51]  Yi Yao,et al.  Improving long range and high magnification face recognition: Database acquisition, evaluation, and enhancement , 2008, Comput. Vis. Image Underst..

[52]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[53]  Demetri Terzopoulos,et al.  Smart Camera Networks in Virtual Reality , 2008, Proc. IEEE.

[54]  Chalapathy Neti,et al.  Recent advances in the automatic recognition of audiovisual speech , 2003, Proc. IEEE.

[55]  N. Gordon,et al.  Novel approach to nonlinear/non-Gaussian Bayesian state estimation , 1993 .

[56]  Ralph Gross,et al.  Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[57]  Rama Chellappa,et al.  Rank constrained recognition under unknown illuminations , 2003, 2003 IEEE International SOI Conference. Proceedings (Cat. No.03CH37443).

[58]  Alice J. O'Toole,et al.  FRVT 2006 and ICE 2006 large-scale results , 2007 .

[59]  Peter H. Tu,et al.  Face recognition at a distance system for surveillance applications , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[60]  Ting Yu,et al.  Collaborative Real-Time Control of Active Cameras in Large Scale Surveillance Systems , 2008 .

[61]  Takeo Kanade,et al.  Limits on Super-Resolution and How to Break Them , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[62]  Timothy F. Cootes,et al.  Active Shape Models: Evaluation of a Multi-Resolution Method for Improving Image Search , 1994, BMVC.

[63]  Larry S. Davis,et al.  Task Scheduling in Large Camera Networks , 2007, ACCV.

[64]  Timothy F. Cootes,et al.  Active Appearance Models , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[65]  David J. Kriegman,et al.  Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.

[66]  Nalini Venkatasubramanian,et al.  Privacy-protecting video surveillance , 2005, IS&T/SPIE Electronic Imaging.

[67]  Alice J. O'Toole,et al.  A video database of moving faces and people , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[68]  Rong Yan,et al.  Protecting Personal Identification in Video , 2009, Protecting Privacy in Video Surveillance.

[69]  Jongmoo Choi,et al.  Non-Cooperative Persons Identification at a Distance with 3D Face Modeling , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[70]  Max Lu,et al.  Acquiring Multi-Scale Images by Pan-Tilt-Zoom Control and Automatic Multi-Camera Calibration , 2005, 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION'05) - Volume 1.

[71]  P. Anandan,et al.  Hierarchical Model-Based Motion Estimation , 1992, ECCV.

[72]  Carman Neustaedter,et al.  Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.

[73]  James W. Davis,et al.  An adaptive focus-of-attention model for video surveillance and monitoring , 2007, Machine Vision and Applications.

[74]  Michael A. Caloyannides Society cannot function without privacy , 2003, IEEE Security & Privacy Magazine.

[75]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[76]  James L. Crowley,et al.  CoMedi: using computer vision to support awareness and privacy in mediaspaces , 1999, CHI EA '99.

[77]  Rama Chellappa,et al.  Probabilistic recognition of human faces from video , 2002, Proceedings. International Conference on Image Processing.

[78]  Patrick J. Flynn,et al.  Face Recognition Using 2D and 3D Facial Data , 2003 .

[79]  Ming Zhao,et al.  Audiovisual celebrity recognition in unconstrained web videos , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[80]  Ralph Gross,et al.  Mining Images in Publicly-Available Cameras for Homeland Security , 2005, AAAI Spring Symposium: AI Technologies for Homeland Security.

[81]  Timothy F. Cootes,et al.  Trainable method of parametric shape description , 1992, Image Vis. Comput..

[82]  Alex Pentland,et al.  Bayesian Modeling of Facial Similarity , 1998, NIPS.

[83]  Michael J. Black,et al.  A Probabilistic Framework for Matching Temporal Trajectories: CONDENSATION-Based Recognition of Gestures and Expressions , 1998, ECCV.

[84]  Li Zhang,et al.  Recognition of Non-Cooperative Individuals at a Distance with 3D Face Modeling , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[85]  G. Casella,et al.  Statistical Inference , 2003, Encyclopedia of Social Network Analysis and Mining.

[86]  T. Kanade,et al.  A master-slave system to acquire biometric imagery of humans at distance , 2003, IWVS '03.

[87]  Xiaoli Zhou,et al.  Feature Fusion of Face and Gait for Human Recognition at a Distance in Video , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[88]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[89]  Shwetak N. Patel,et al.  BlindSpot: Creating Capture-Resistant Spaces , 2009, Protecting Privacy in Video Surveillance.

[90]  Ting Yu,et al.  Monitoring, recognizing and discovering social networks , 2009, CVPR.

[91]  Mongi Abidi,et al.  Super-resolution for high magnification face images , 2007, SPIE Defense + Commercial Sensing.

[92]  Alberto Del Bimbo,et al.  Towards on-line saccade planning for high-resolution image sensing , 2006, Pattern Recognit. Lett..

[93]  Joachim M. Buhmann,et al.  Distortion Invariant Object Recognition in the Dynamic Link Architecture , 1993, IEEE Trans. Computers.

[94]  James H. Elder,et al.  Pre-Attentive and Attentive Detection of Humans in Wide-Field Scenes , 2007, International Journal of Computer Vision.

[95]  Massimo Tistarelli,et al.  Handbook of Remote Biometrics: for Surveillance and Security , 2009 .

[96]  Jack Brassil Using mobile communications to assert privacy from video surveillance , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[97]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[98]  Xiaoli Zhou,et al.  Integrating Face and Gait for Human Recognition at a Distance in Video , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[99]  Sen-Ching S. Cheung,et al.  Video Data Hiding for Managing Privacy Information in Surveillance Systems , 2009, EURASIP J. Inf. Secur..

[100]  Terrance E. Boult,et al.  Into the woods: visual surveillance of noncooperative and camouflaged targets in complex outdoor settings , 2001, Proc. IEEE.

[101]  Ralph Gross,et al.  Face De-identification , 2009, Protecting Privacy in Video Surveillance.

[102]  Touradj Ebrahimi,et al.  Scrambling for Video Surveillance with Privacy , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[103]  W. Eric L. Grimson,et al.  Learning Patterns of Activity Using Real-Time Tracking , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[104]  Josef Kittler,et al.  A 3-D assisted generative model for facial texture super-resolution , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[105]  Xiaoming Liu,et al.  Multi-Frame Super-Resolution for Face Recognition , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[106]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[107]  Samuel S. Blackman,et al.  Design and Analysis of Modern Tracking Systems , 1999 .

[108]  Sharath Pankanti,et al.  Face cataloger: multi-scale imaging for relating identity to location , 2003, Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance, 2003..

[109]  Stephen J. McKenna,et al.  Tracking interacting people , 2000, Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580).

[110]  Aly A. Farag,et al.  Face recognition at-a-distance based on sparse-stereo reconstruction , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[111]  G. Kitagawa Monte Carlo Filter and Smoother for Non-Gaussian Nonlinear State Space Models , 1996 .

[112]  Tim J. Ellis,et al.  Multi camera image tracking , 2006, Image Vis. Comput..

[113]  J. Sullivan,et al.  Guiding random particles by deterministic search , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[114]  Alex Pentland,et al.  Probabilistic Visual Learning for Object Representation , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[115]  Ser-Nam Lim,et al.  Constructing task visibility intervals for a surveillance system , 2005, VSSN@MM.

[116]  Sharath Pankanti,et al.  Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.

[117]  James W. Davis,et al.  Building Adaptive Camera Models for Video Surveillance , 2007, 2007 IEEE Workshop on Applications of Computer Vision (WACV '07).

[118]  Hitoshi Kiya,et al.  One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images , 2009, EURASIP J. Inf. Secur..

[119]  P. L. Venetianer,et al.  Video verification of point of sale transactions , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.

[120]  Shai Avidan,et al.  Blind Vision , 2006, ECCV.

[121]  Hari Kalva,et al.  Compression Independent Reversible Encryption for Privacy in Video Surveillance , 2009, EURASIP J. Inf. Secur..

[122]  Shai Avidan,et al.  Efficient Methods for Privacy Preserving Face Detection , 2006, NIPS.

[123]  Noboru Babaguchi,et al.  Psychological Study for Designing Privacy Protected Video Surveillance System: PriSurv , 2009, Protecting Privacy in Video Surveillance.