Keywords:
- 2-D Face
- 2D attacks
- 2D Face Authentication
- 3D Face
- 3D Face Localisation
- 3D face recognition
- 3D Masks
- Accent Identification
- Adaboost
- adaptation
- AIM
- analysis biometrics python tool
- anomaly detection
- Anti-spoofing
- Attack
- audio and video classification
- Audio-visual person authentication
- audio-visual speaker recognition
- authentication
- authentication task
- Auto-encoder
- automatic eye detectors
- Automatic Speech Recognition
- Backdoor attack
- batch norm
- batch normalization
- BEAT
- behavioral recognition
- Benchmarking
- bi-modal authentication
- bias
- Binary features
- Biohashing
- biometric
- Biometric Authentication
- biometric recognition
- biometric template protection
- Biometrics
- biometrics (access control)
- biometry
- bob
- Bob toolbox
- boosting
- C++
- calibration
- calibration performance evaluation
- calibration performance metric
- Cascade
- categorical calibration
- CNN
- CNN Embeddings
- CNN visualization
- commercial face recognition systems
- Comparison studies
- Competition
- computational efficiency
- Computer Vision
- continuous speech recognition boosted binary features resource management
- Controlled Synthesis
- Convolutional neural network
- Counter-Measures
- Counter-Spoofing
- CPqD mobile biometric database
- cross-database
- cross-database testing
- cross-dataset evaluation
- crossmodal matching
- Custom 3D Silicon masks
- Custom Silicone Masks
- database
- decision trees
- deep features
- deep learning
- Deep neural network
- deep-networks
- deepfake detection
- Deepfakes
- Demographic
- detection
- diarization
- Differential Privacy
- DIHARD challenge
- Disguise
- Dishonest Acts
- dnn
- domain adaptation
- domain generalization
- embedding
- End-to-end learning
- error characteristics
- evaluation
- Expectation maximization
- eye detection
- eye localization errors
- eye location ambiguity
- Face
- Face Authentication
- Face Detection
- Face Editing
- Face Localisation
- face normalization
- Face Presentation Attack Detection
- Face presentation attack detection (PAD)
- face presentation-attacks
- Face Recognition
- face recognition algorithms
- face recognition performance
- face recognition system
- face reconstruction
- face spoofing
- face verification
- facial feature alignment
- Fairness
- Fairness Evaluation.
- Feature Distribution Modelling
- Feature Fusion
- feature selection
- Ferns
- Finger vein
- finger vein recognition
- forensic face recognition
- Forgery
- Formants
- French Regional Accents
- Fundamental frequency
- Fusion
- Gabor
- GANs
- Gaussian Mixture Models (GMM)
- generalization
- generative models
- GMM
- GMM Modelling
- GMM Parts-Based
- GMMs HMMs 3D facial data face verification feature distribution modelling techniques
- Haar features
- Hashing
- Hill-climbing attack
- HMM
- human assisted learning
- i-vectors
- Illumination Invariance
- Image analysis
- inconsistencies detection
- information fusion
- Integer Based Arithmetic
- Inter-session Variability Modelling
- iphoto
- Joint Factor Analysis
- Kaldi toolkit
- Keystroke
- Lifelong learning
- likelihood ratio
- likelihood ratio interpretation
- linear score transformation
- linear score transformation.
- linearly calibrated face recognition scores
- linkability
- lip-syncing
- Liveness Detection
- Local Binary Patterns
- long-term statistics
- LSTM
- LWIR
- LWIR.
- machine learning
- machine-learning software
- Makeup Attack Detection
- Makeup Attacks
- manual eye annotations
- Mask attack
- maximal leakage
- mobile biometrics
- mobile computing
- mobile environment
- MOBIO
- MOBIO database
- Modified Census Transform
- Morphing Attack
- MSU-MFSD
- Mult-channel sensors.
- Multi-channel face-PAD
- MultiLayer Perceptron (MLP)
- Multimodal
- Multimodal biometrics
- multispectral
- Naive Bayesian
- near-infrared
- NIR
- Noise Robustness
- Old-Age Makeups
- online
- Online Platform
- open science
- Open Source
- open source implementations
- pad eps epsc anti-spoofing fusion
- palm vein
- parts-based approach
- pattern recognition
- Performance Evaluation
- periocular biometrics
- person recognition
- Phoneme recognition
- photometric stereo
- picasa
- pittpatt
- PLDA
- pose estimation
- presentation attack
- Presentation Attack Detection
- presentation attacks
- Probablistic Model
- pruning
- python
- query phases
- raw waveforms
- recognition
- Remote photoplethysmography
- Replay
- Replay Attacks
- Replay-Attack
- Replay-Mobile
- Reproducibility Criteria
- Reproducible research
- residual CNN
- RGB/depth cameras
- rotation invariant cross-correlation
- score fusion
- security
- security of data
- session variability
- Shape descriptor
- signal processing
- single-channel and multi-channel speech
- Smartphones
- software
- Software Frameworks
- speaker anti-spoofing
- Speaker Authenitcation
- speaker database
- Speaker Diarization
- Speaker identification
- speaker recognition
- speaker recognition field
- speaker verification
- speaker verification ferns XM2VTS
- speaker-specific features
- spectral statistics
- Spoofing
- Spoofing Attacks
- Spoofing attacks fingervein
- statistical hypothesis testing
- StyleGAN 2
- supervised adaptation
- surveillance camera face databases
- SVM
- Synthetic Data
- Synthetic Dataset
- template
- template inversion
- template protection
- temporal pattern extraction
- test
- Texture Analysis
- Texture Descriptor
- thermal cameras
- tool
- toolbox
- transfer learning
- Trick
- trojan attack
- trustworthy
- Unseen Attack Detection.
- vascular biometrics
- vein enhancement
- vein segmentation
- verification
- VGG-Face
- Video tampering
- Vital signs monitoring
- voice biometrics
- vulnerability
- Vulnerability Analysis
- web- biometrics
- Wrist biometrics
- wrist vein recognition
- XCSMAD
Publications of Sébastien Marcel
2023
Approximating Optimal Morphing Attacks using Template Inversion, , and , Idiap-RR-07-2023 |
![]() |
Approximating Optimal Morphing Attacks using Template Inversion, , and , in: IEEE International Joint Conference on Biometric, 2023 |
![]() |
Bridging the Gap: Heterogeneous Face Recognition with Conditional Adaptive Instance Modulation, and , in: IJCB, 2023 |
![]() |
Can personalised hygienic masks be used to attack face recognition systems?, , , and , in: Proceedings of IEEE International Joint Conference on Biometrics (IJCB2023), 2023 |
![]() |
Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks Via 3D Face Reconstruction, and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023 |
[DOI] [URL] |
EFaR 2023: Efficient Face Recognition Competition, , , , and , in: IEEE International Joint Conference on Biometrics (IJCB 2023), 2023 |
![]() |
Idiap Scientific Report 2022, , , , , , , , , , , , , , , , , and , Idiap-RR-05-2023 |
![]() |
Measuring Linkability of Protected Biometric Templates Using Maximal Leakage, , and , in: IEEE Transactions on Information Forensics and Security, 18:2262 - 2275, 2023 |
[DOI] [URL] |
MLP-Hash: Protecting Face Templates via Hashing of Randomized Multi-Layer Perceptron, , and , in: Proceedings of the 31st European Signal Processing Conference, Helsinki, Finland, 2023 |
![]() |
Multi-IVE: Privacy Enhancement of Multiple Soft-Biometrics in Face Embeddings, , , , , , , and , in: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023 |
![]() [URL] |
SynthDistill: Face Recognition with Knowledge Distillation from Synthetic Data, , and , in: IEEE International Joint Conference on Biometrics (IJCB 2023), 2023 |
![]() |
The Unconstrained Ear Recognition Challenge 2023: Maximizing Performance and Minimizing Bias, and , in: IEEE International Joint Conference on Biometrics (IJCB 2023), 2023 |
![]() |
Toward responsible face datasets: modeling the distribution of a disentangled latent space for sampling face images from demographic groups, , and , in: IEEE International Joint Conference on Biometrics, 2023 |
![]() |
Towards High-Resolution Face Image Generation From Coded Aperture Camera, , and , in: IEEE Sensors Letters, 2023 |
![]() [DOI] [URL] |
Vulnerability of Automatic Identity Recognition to Audio-Visual Deepfakes, , , and , in: IEEE International Joint Conference on Biometrics, 2023 |
![]() |
2022
A Comprehensive Evaluation on Multi-channel Biometric Face Presentation Attack Detection, , and , Idiap-RR-02-2022 |
![]() |
An anomaly detection approach for backdoored neural networks: face recognition as a case study, and , Idiap-RR-08-2022 |
![]() [URL] |
An anomaly detection approach for backdoored neural networks: face recognition as a case study, and , in: 21st International Conference of the Biometrics Special Interest Group (BIOSIG 2022), Darmstadt, Germany, 2022 |
![]() |
Are GAN-based Morphs Threatening Face Recognition?, , , and , in: International Conference on Acoustics, Speech and Signal Processing, 2022 |
![]() |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
![]() [URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: IEEE Transactions on Information Forensics and Security, 2022 |
![]() |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
![]() [URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
![]() [URL] |
Custom attribution loss for improving generalization and interpretability of deepfake detection, , and , in: International Conference on Acoustics, Speech, and Signal Processing, 2022 |
![]() |
Domain-Specific Adaptation of CNN for Detecting Face Presentation Attacks in NIR, , , , , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2022 |
![]() |
Eight Years of Face Recognition Research: Reproducibility, Achievements and Open Issues, , , , , and , Idiap-RR-09-2022 |
![]() [URL] |
Face Anthropometry Aware Audio-visual Age Verification, and , in: ACM Multimedia, 2022 |
![]() |
Face Reconstruction from Deep Facial Embeddings using a Convolutional Neural Network, , and , in: Proceedings of the 2022 IEEE International Conference on Image Processing (ICIP), Bordeaux, France, IEEE, 2022 |
![]() [DOI] [URL] |
Fairness Index Measures to Evaluate Bias in Biometric Recognition, and , in: International Conference on Pattern Recognition Workshops, 2022 |
![]() |
Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics, , , , , and , in: Proceedings of the 2022 International Joint Conference on Biometrics (IJCB), Abu Dhabi, United Arab Emirates (UAE), IEEE, 2022 |
![]() [DOI] [URL] |
Indexing Protected Deep Face Templates by Frequent Binary Patterns, , , , and , in: Proceedings of the 2022 International Joint Conference on Biometrics (IJCB), Abu Dhabi, United Arab Emirates (UAE), IEEE, 2022 |
![]() [DOI] [URL] |
On the detection of morphing attacks generated by GANs, and , Idiap-RR-07-2022 |
![]() |
On the detection of morphing attacks generated by GANs, and , in: 21st International Conference of the Biometrics Special Interest Group (BIOSIG 2022), 2022 |
![]() |
Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles, , and , in: IEEE Transactions on Information Forensics and Security, 2022 |
![]() |
Residual Feature Pyramid Network for Enhancement of Vascular Patterns, and , in: IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022 |
![]() |
Robust Face Presentation Attack Detection with Multi-channel Neural Networks, and , Idiap-RR-03-2022 |
![]() |
Towards Lifelong Human Assisted Speaker Diarization, , , , , , , , , , , , and , in: Computer Speech & Language, 2022 |
[DOI] [URL] |