Keywords:
- 2-D Face
- 2D attacks
- 2D Face Authentication
- 3D Face
- 3D Face Localisation
- 3D face recognition
- 3D Masks
- 3D-Rendered Datasets
- Accent Identification
- Adaboost
- adaptation
- AIM
- analysis biometrics python tool
- anomaly detection
- Anti-spoofing
- Attack
- attribution
- audio and video classification
- Audio-visual person authentication
- audio-visual speaker recognition
- authentication
- authentication task
- Auto-encoder
- automatic eye detectors
- Automatic Speech Recognition
- Backdoor attack
- backdoor attack detection
- batch norm
- batch normalization
- BEAT
- behavioral recognition
- Benchmarking
- bi-modal authentication
- bias
- bias mitigation
- Binary features
- Biohashing
- Biometric Authentication
- biometric recognition
- biometric template protection
- Biometrics
- biometrics (access control)
- biometry
- Blackbox
- bob
- Bob toolbox
- boosting
- C++
- calibration
- calibration performance evaluation
- calibration performance metric
- Cascade
- categorical calibration
- CNN
- CNN Embeddings
- CNN visualization
- commercial face recognition systems
- Comparison studies
- Competition
- computational efficiency
- computer vision
- continuous speech recognition boosted binary features resource management
- Controlled Synthesis
- Convolutional neural network
- Convolutional neural network.
- Counter-Measures
- Counter-Spoofing
- CPqD mobile biometric database
- cross-database
- cross-database testing
- cross-dataset evaluation
- crossmodal matching
- Custom 3D Silicon masks
- Custom Silicone Masks
- database
- decision trees
- deep features
- deep learning
- Deep neural network
- deep-networks
- deepfake detection
- Deepfakes
- Demographic
- Demographic bias
- detection
- diarization
- Differential Privacy
- DIHARD challenge
- Disguise
- Dishonest Acts
- dnn
- domain adaptation
- domain generalization
- embedding
- embedding translation
- End-to-end learning
- error characteristics
- evaluation
- Expectation maximization
- eye detection
- eye localization errors
- eye location ambiguity
- Face
- Face Authentication
- Face Detection
- Face Editing
- Face Localisation
- face morph
- face normalization
- Face Presentation Attack Detection
- Face presentation attack detection (PAD)
- face presentation-attacks
- Face Recognition
- face recognition algorithms
- face recognition performance
- face recognition system
- face recognition systems
- face reconstruction
- face spoofing
- face verification
- facial feature alignment
- Fairness
- Fairness Evaluation.
- Feature Distribution Modelling
- Feature Fusion
- feature selection
- Ferns
- Finger vein
- finger vein recognition
- forensic face recognition
- Forensics
- Forgery
- Formants
- French Regional Accents
- Full-view Authentication
- Fundamental frequency
- Fusion
- Gabor
- GANs
- Gaussian Mixture Models (GMM)
- generalization
- generative models
- GMM
- GMM Modelling
- GMM Parts-Based
- GMMs HMMs 3D facial data face verification feature distribution modelling techniques
- Haar features
- Hashing
- Hill-climbing attack
- HMM
- human assisted learning
- i-vectors
- Identity
- Illumination Invariance
- Image analysis
- image forensics
- Image-to-Image Translation
- inconsistencies detection
- information fusion
- information leakage
- Integer Based Arithmetic
- Inter-session Variability Modelling
- iphoto
- Iris Recognition
- Joint Factor Analysis
- Kaldi toolkit
- Keystroke
- Lifelong learning
- likelihood ratio
- likelihood ratio interpretation
- linear score transformation
- linear score transformation.
- linearly calibrated face recognition scores
- linkability
- lip-syncing
- Liveness Detection
- Local Binary Patterns
- long-term statistics
- LSTM
- LWIR
- LWIR.
- machine learning
- machine-learning software
- Makeup Attack Detection
- Makeup Attacks
- manual eye annotations
- Mask attack
- maximal leakage
- Membership Inference (MI) Attack
- Memorisation
- Miura-Match
- mobile biometrics
- mobile computing
- mobile environment
- MOBIO
- MOBIO database
- model pairing
- Modified Census Transform
- morphing
- Morphing Attack
- MSU-MFSD
- Mult-channel sensors.
- Multi-channel face-PAD
- Multi-view
- MultiLayer Perceptron (MLP)
- Multimodal
- Multimodal biometrics
- multispectral
- Naive Bayesian
- near-infrared
- NIR
- Noise Robustness
- Old-Age Makeups
- online
- Online Platform
- open science
- Open Source
- open source implementations
- open-set classifica- tion
- open-set classification
- pad eps epsc anti-spoofing fusion
- pairing
- palm vein
- parts-based approach
- pattern recognition
- Performance Evaluation
- periocular biometrics
- Periocular PAD
- Periocular Recognition
- person recognition
- Phoneme recognition
- photometric stereo
- Photorealism in Synthetic Data
- picasa
- pittpatt
- PLDA
- pose estimation
- presentation attack
- Presentation Attack Detection
- presentation attacks
- pretraining
- Probablistic Model
- pruning
- python
- query phases
- raw waveforms
- Realism Transfer
- recognition
- regularization
- Remote photoplethysmography
- Replay
- Replay Attacks
- Replay-Attack
- Replay-Mobile
- Reproducibility Criteria
- Reproducible research
- residual CNN
- RGB/depth cameras
- rotation invariant cross-correlation
- score fusion
- security
- security of data
- semantic segmentation
- session variability
- Shape descriptor
- signal processing
- single-channel and multi-channel speech
- Smartphones
- software
- Software Frameworks
- speaker anti-spoofing
- Speaker Authenitcation
- speaker database
- Speaker Diarization
- Speaker identification
- speaker recognition
- speaker recognition field
- speaker verification
- speaker verification ferns XM2VTS
- speaker-specific features
- spectral statistics
- Spoofing
- Spoofing Attacks
- Spoofing attacks fingervein
- statistical hypothesis testing
- StyleGAN 2
- supervised adaptation
- surveillance camera face databases
- SVM
- Synthetic Data
- Synthetic Dataset
- template
- template inversion
- template protection
- temporal pattern extraction
- test
- Texture Analysis
- Texture Descriptor
- thermal cameras
- tool
- toolbox
- transfer learning
- Trick
- Trojan
- trojan attack
- trustworthy
- Unseen Attack Detection.
- vascular biometrics
- vein enhancement
- Vein recognition
- vein segmentation
- verification
- VGG-Face
- Video tampering
- Virtual Reality Dataset
- Vital signs monitoring
- voice biometrics
- vulnerability
- Vulnerability Analysis
- vulnerability evaluation
- web- biometrics
- Wrist biometrics
- wrist vein recognition
- XCSMAD
Publications of Sébastien Marcel
2007
A Novel Statistical Generative Model Dedicated To Face Recognition, and , Idiap-RR-39-2007 |
|
Face Authentication with Salient Local Features and Static Bayesian Network, and , in: IEEE / IAPR Intl. Conf. On Biometrics (ICB), 2007 |
|
Face Authentication with Salient Local Features and Static Bayesian Network, and , Idiap-RR-04-2007 |
|
Google Portrait, , and , Idiap-Com-07-2007 |
|
Joint Bi-Modal Face and Speaker Authentication using Explicit Polynomial Expansion, , Idiap-RR-14-2007 |
|
On the Recent Use of Local Binary Patterns for Face Authentication, , and , in: International Journal on Image and Video Processing Special Issue on Facial Image Processing, 2007 |
|
Person Authentication using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation, and , in: IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE Special Issue on Biometrics, 2007 |
|
2006
Active Shape Models Using Local Binary Patterns, and , Idiap-RR-07-2006 |
|
Annotation of face detection: description of XML format and files, , , and , Idiap-Com-06-2006 |
|
Bi-Modal Face and Speech Authentication: a BioLogin Demonstration System, , , and , in: Workshop on Multimodal User Authentication (MMUA), 2006 |
|
Bi-Modal Face and Speech Authentication: a BioLogin Demonstration System, , , and , Idiap-RR-18-2006 |
|
Face Authentication Using Adapted Local Binary Pattern Histograms, and , in: 9th European Conference on Computer Vision (ECCV), 2006 |
|
Face Authentication Using Adapted Local Binary Pattern Histograms, and , Idiap-RR-06-2006 |
|
Hand Posture Classification and Recognition using the Modified Census Transform, , and , in: IEEE Int. Conf. on Automatic Face and Gesture Recognition (AFGR), 2006 |
|
Hand Posture Classification and Recognition using the Modified Census Transform, , and , Idiap-RR-02-2006 |
|
Local Binary Patterns as an Image Preprocessing for Face Authentication, , and , in: IEEE Int. Conf. on Automatic Face and Gesture Recognition (AFGR), 2006 |
|
On the Recent Use of Local Binary Patterns for Face Authentication, , and , Idiap-RR-34-2006 |
|
Robust-to-Illumination Face Localisation using Active Shape Models and Local Binary Patterns, , and , Idiap-RR-47-2006 |
|
2005
Efficient Diffusion-based Illumination Normalization for Face Verification, , and , Idiap-RR-46-2005 |
|
Lighting Normalization Algorithms for Face Verification, , and , Idiap-Com-03-2005 |
|
Local Binary Patterns as an Image Preprocessing for Face Authentication, , and , Idiap-RR-76-2005 |
|
Multiview Face Detection, , and , Idiap-RR-49-2005 |
|
Person Authentication using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation, and , Idiap-RR-81-2005 |
|
Two-Handed Gesture Recognition, and , Idiap-RR-24-2005 |
|
2004
A Symmetric Transformation for LDA-based Face Verification, , in: Proceedings of the 6th International Conference on Automatic Face and Gesture Recognition, IEEE Computer Society Press, 2004 |
|
A video package for Torch, and , Idiap-Com-02-2004 |
|
Boosting Pixel-based Classifiers for Face Verification, and , in: Biometric Authentication Workshop of the 8th European Conference on Computer Vision, BIOAW2004, Springer-Verlag, 2004 |
|
Face Authentication using Client-specific Matching Pursuit, , , and , Idiap-RR-78-2004 |
|
HMM and IOHMM for the Recognition of Mono- and Bi-Manual 3D Hand Gestures, , and , Idiap-RR-39-2004 |
|
On Performance Evaluation of Face Detection and Localization Algorithms, , , and , in: 17th International Conference on Pattern Recognition (ICPR), 2004 |
|
Recognition of Isolated Complex Mono- and Bi-Manual 3D Hand Gestures, , and , in: Proc. of the sixth International Conference on Automatic Face and Gesture Recognition, 2004 |
|
2003
A Symmetric Transformation for LDA-based Face Verification, , Idiap-RR-67-2003 |
|
Boosting Pixel-based Classifiers for Face Verification, and , Idiap-RR-65-2003 |
|
Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS, , and , in: 4th International Conference on AUDIO- and VIDEO-BASED BIOMETRIC PERSON AUTHENTICATION, 2003 |
|
Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS, , and , Idiap-RR-10-2003 |
|
Face Verification using LDA and MLP on the BANCA database, , Idiap-RR-66-2003 |
|
Improving Face Authetication Using Virtual Samples, , and , in: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003 |
|
Improving Face Verification using Symmetric Transformation, , Idiap-RR-68-2003 |
|
On Performance Evaluation of Face Detection and Localization Algorithms, , , and , Idiap-RR-80-2003 |
|
Recognition of Isolated Complex Mono- and Bi-Manual 3D Hand Gestures, , and , Idiap-RR-63-2003 |
|
Reconnaissance de gestes 3D bi-manuels, , , and , Idiap-RR-79-2003 |
|
Speech & Face Based Biometric Authentication at IDIAP, , , , , , , and , in: Proceedings of the 2003 IEEE International Conference on Multimedia & Expo (ICME-03), 2003 |
Speech & Face Based Biometric Authentication at IDIAP, , , , , , , and , Idiap-RR-13-2003 |
|
2002
A State-of-the-art Neural Network for Robust Face Verification, , and , in: Proceedings of the COST275 Workshop on The Advent of Biometrics on the Internet, 2002 |
|
A State-of-the-art Neural Network for Robust Face Verification, , and , Idiap-RR-36-2002 |
|
Confidence Measures for Multimodal Identity Verification, , , and , in: Information Fusion, 3(04), 2002 |
|
Evaluation Protocols and Comparative Results for the Triesch Hand Posture Database, , Idiap-RR-50-2002 |
|
Face Verification using MLP and SVM, and , in: XI Journees NeuroSciences et Sciences pour l'Ingenieur (NSI 2002), 2002 |
|
Face Verification using MLP and SVM, and , Idiap-RR-21-2002 |
|
Gestures for Multi-Modal Interfaces: A Review, , Idiap-RR-34-2002 |
|