Sébastien Marcel

Orcid: 0000-0002-2497-9140

According to our database1, Sébastien Marcel authored at least 231 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EdgeFace: Efficient Face Recognition Model for Edge Devices.
IEEE Trans. Biom. Behav. Identity Sci., April, 2024

ChatGPT and biometrics: an assessment of face recognition, gender detection, and age estimation capabilities.
CoRR, 2024

Model Pairing Using Embedding Translation for Backdoor Attack Detection on Open-Set Classification Tasks.
CoRR, 2024

Deep Variational Privacy Funnel: General Modeling with Applications in Face Recognition.
CoRR, 2024

2023
Comprehensive Vulnerability Evaluation of Face Recognition Systems to Template Inversion Attacks via 3D Face Reconstruction.
IEEE Trans. Pattern Anal. Mach. Intell., December, 2023

Facilitating free travel in the Schengen area - A position paper by the European Association for Biometrics.
IET Biom., March, 2023

Measuring Linkability of Protected Biometric Templates Using Maximal Leakage.
IEEE Trans. Inf. Forensics Secur., 2023

Biometric Template Protection for Neural-Network-Based Face Recognition Systems: A Survey of Methods and Evaluation Techniques.
IEEE Trans. Inf. Forensics Secur., 2023

Prepended Domain Transformer: Heterogeneous Face Recognition Without Bells and Whistles.
IEEE Trans. Inf. Forensics Secur., 2023

Towards lifelong human assisted speaker diarization.
Comput. Speech Lang., 2023

Multi-Channel Cross Modal Detection of Synthetic Face Images.
CoRR, 2023

FRCSyn Challenge at WACV 2024: Face Recognition Challenge in the Era of Synthetic Data.
CoRR, 2023

The Age of Synthetic Realities: Challenges and Opportunities.
CoRR, 2023

Benchmarking of Cancelable Biometrics for Deep Templates.
CoRR, 2023

Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection.
IEEE Access, 2023

Multi-IVE: Privacy Enhancement of Multiple Soft-Biometrics in Face Embeddings.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 2023

Face Reconstruction from Facial Templates by Learning Latent Space of a Generator Network.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Blackbox Face Reconstruction from Deep Facial Embeddings Using A Different Face Recognition Model.
Proceedings of the IEEE International Conference on Image Processing, 2023

Template Inversion Attack against Face Recognition Systems using 3D Face Reconstruction.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Toward responsible face datasets: modeling the distribution of a disentangled latent space for sampling face images from demographic groups.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Inversion of Deep Facial Templates using Synthetic Data.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

SynthDistill: Face Recognition with Knowledge Distillation from Synthetic Data.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Vulnerability of Automatic Identity Recognition to Audio-Visual Deepfakes.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Can personalised hygienic masks be used to attack face recognition systems?
Proceedings of the IEEE International Joint Conference on Biometrics, 2023


Bridging the Gap: Heterogeneous Face Recognition with Conditional Adaptive Instance Modulation.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023


Approximating Optimal Morphing Attacks using Template Inversion.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

MLP-Hash: Protecting Face Templates via Hashing of Randomized Multi-Layer Perceptron.
Proceedings of the 31st European Signal Processing Conference, 2023

Remote Cancelable Biometric System for Verification and Identification Applications.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2023

2022
Fairness in Biometrics: A Figure of Merit to Assess Biometric Verification Systems.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Master Face Attacks on Face Recognition Systems.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Domain-Specific Adaptation of CNN for Detecting Face Presentation Attacks in NIR.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Improving Generalization of Deepfake Detection With Data Farming and Few-Shot Learning.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Towards Protecting Face Embeddings in Mobile Face Verification Scenarios.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Eight Years of Face Recognition Research: Reproducibility, Achievements and Open Issues.
CoRR, 2022

A Comprehensive Evaluation on Multi-channel Biometric Face Presentation Attack Detection.
CoRR, 2022

Face Anthropometry Aware Audio-visual Age Verification.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Fairness Index Measures to Evaluate Bias in Biometric Recognition.
Proceedings of the Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges, 2022

Face Reconstruction from Deep Facial Embeddings using a Convolutional Neural Network.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Indexing Protected Deep Face Templates by Frequent Binary Patterns.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

Are GAN-based morphs threatening face recognition?
Proceedings of the IEEE International Conference on Acoustics, 2022

Custom Attribution Loss for Improving Generalization and Interpretability of Deepfake Detection.
Proceedings of the IEEE International Conference on Acoustics, 2022

Residual Feature Pyramid Network for Enhancement of Vascular Patterns.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

An anomaly detection approach for backdoored neural networks: face recognition as a case study.
Proceedings of the 21st International Conference of the Biometrics Special Interest Group, 2022

On the detection of morphing attacks generated by GANs.
Proceedings of the 21st International Conference of the Biometrics Special Interest Group, 2022

MASK-MORPH: Does Morphing of Custom 3D Face Masks Threatens the Face Recognition Systems?
Proceedings of the 18th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2022

The Threat of Deepfakes to Computer and Human Visions.
Proceedings of the Handbook of Digital Face Manipulation and Detection, 2022

2021
Learning One Class Representations for Face Presentation Attack Detection Using Multi-Channel Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Towards Protecting and Enhancing Vascular Biometric Recognition Methods via Biohashing and Deep Neural Networks.
IEEE Trans. Biom. Behav. Identity Sci., 2021

On the Recognition Performance of BioHashing on state-of-the-art Face Recognition models.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Improving Generalization of Deepfake Detection by Training for Attribution.
Proceedings of the 23rd International Workshop on Multimedia Signal Processing, 2021


On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing.
Proceedings of the International IEEE Joint Conference on Biometrics, 2021

On the use of automatically generated synthetic image datasets for benchmarking face recognition.
Proceedings of the International IEEE Joint Conference on Biometrics, 2021

Deep Auto-Encoding and Biohashing for Secure Finger Vein Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2021

Subjective and Objective Evaluation of Deepfake Videos.
Proceedings of the IEEE International Conference on Acoustics, 2021

Deep Convolutional Neural Networks: from recognition to anti-spoofing.
Proceedings of the Extraction et Gestion des Connaissances, 2021

Cross Modal Focal Loss for RGBD Face Anti-Spoofing.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Vein Enhancement with Deep Auto-Encoders to improve Finger Vein Recognition.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

2020
Biometric Face Presentation Attack Detection With Multi-Channel Convolutional Neural Network.
IEEE Trans. Inf. Forensics Secur., 2020

Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features.
IEEE Trans. Biom. Behav. Identity Sci., 2020

Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks.
IEEE Trans. Biom. Behav. Identity Sci., 2020

Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks.
CoRR, 2020

The High-Quality Wide Multi-Channel Attack (HQ-WMCA) database.
CoRR, 2020

Deepfake detection: humans vs. machines.
CoRR, 2020

Can Your Face Detector Do Anti-spoofing? Face Presentation Attack Detection with a Multi-Channel Face Detector.
CoRR, 2020

Multispectral Biometrics System Framework: Application to Presentation Attack Detection.
CoRR, 2020

Supervised Domain Adaptation for Text-Independent Speaker Verification Using Limited Data.
Proceedings of the Interspeech 2020, 2020

CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR.
Proceedings of the IEEE International Conference on Image Processing, 2020

Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems.
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020


Improving Cross-Dataset Performance of Face Presentation Attack Detection Systems Using Face Recognition Datasets.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Domain Adaptation for Generalization of Face Presentation Attack Detection in Mobile Settengs with Minimal Information.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
A Cross-Database Study of Voice Presentation Attack Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

Remote Blood Pulse Analysis for Face Presentation Attack Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

Evaluation Methodologies for Biometric Presentation Attack Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

Recent Advances in Face Presentation Attack Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

An Introduction to Vein Presentation Attacks and Detection.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2019

Heterogeneous Face Recognition Using Domain Specific Units.
IEEE Trans. Inf. Forensics Secur., 2019

Multispectral Deep Embeddings as a Countermeasure to Custom Silicone Mask Presentation Attacks.
IEEE Trans. Biom. Behav. Identity Sci., 2019

A Comprehensive Experimental and Reproducible Study on Selfie Biometrics in Multistream and Heterogeneous Settings.
IEEE Trans. Biom. Behav. Identity Sci., 2019

Smartphone Multi-modal Biometric Authentication: Database and Evaluation.
CoRR, 2019

The Speed Submission to DIHARD II: Contributions & Lessons Learned.
CoRR, 2019

Vulnerability of Face Recognition to Deep Morphing.
CoRR, 2019

Enhancing Trust in eAssessment - the TeSLA System Solution.
CoRR, 2019

Custom silicone Face Masks: Vulnerability of Commercial Face Recognition Systems & Presentation Attack Detection.
Proceedings of the 7th International Workshop on Biometrics and Forensics, 2019

Understanding and Visualizing Raw Waveform-Based CNNs.
Proceedings of the Interspeech 2019, 2019

Domain Adaptation in Multi-Channel Autoencoder based Features for Robust Face Anti-Spoofing.
Proceedings of the 2019 International Conference on Biometrics, 2019

Vulnerability assessment and detection of Deepfake videos.
Proceedings of the 2019 International Conference on Biometrics, 2019

Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection.
Proceedings of the 2019 International Conference on Biometrics, 2019

2018
Deeply vulnerable: a study of the robustness of face recognition to presentation attacks.
IET Biom., 2018

Biometrics: In Search of Identity and Security (Q & A).
IEEE Multim., 2018

DeepFakes: a New Threat to Face Recognition? Assessment and Detection.
CoRR, 2018

Low-latency speaker spotting with online diarization and detection.
Proceedings of the Odyssey 2018: The Speaker and Language Recognition Workshop, 2018

Fast cross-correlation based wrist vein recognition algorithm with rotation and translation compensation.
Proceedings of the 2018 International Workshop on Biometrics and Forensics, 2018

Towards quantifying the entropy of fingervein patterns across different feature extractors.
Proceedings of the IEEE 4th International Conference on Identity, 2018

On the use of convolutional neural networks for speech presentation attack detection.
Proceedings of the IEEE 4th International Conference on Identity, 2018

On Learning Vocal Tract System Related Speaker Discriminative Information from Raw Signal Using CNNs.
Proceedings of the Interspeech 2018, 2018

On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing.
Proceedings of the 2018 International Conference on Biometrics, 2018

Towards Directly Modeling Raw Speech Signal for Speaker Verification Using CNNS.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Speaker Inconsistency Detection in Tampered Video.
Proceedings of the 26th European Signal Processing Conference, 2018

Pulse-based Features for Face Presentation Attack Detection.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

Spoofing Deep Face Recognition with Custom Silicone Masks.
Proceedings of the 9th IEEE International Conference on Biometrics Theory, 2018

2017
Long-Term Spectral Statistics for Voice Presentation Attack Detection.
IEEE ACM Trans. Audio Speech Lang. Process., 2017

Impact of Score Fusion on Voice Biometrics and Presentation Attack Detection in Cross-Database Evaluations.
IEEE J. Sel. Top. Signal Process., 2017

A Reproducible Study on Remote Heart Rate Measurement.
CoRR, 2017

BEAT: An Open-Source Web-Based Open-Science Platform.
CoRR, 2017

Bob Speaks Kaldi.
Proceedings of the Interspeech 2017, 2017

Cross-eyed 2017: Cross-spectral iris/periocular recognition competition.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

End-to-End convolutional neural network-based voice presentation attack detection.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017


Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

On the Generalization of Fused Systems in Voice Presentation Attack Detection.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

What You Can't See Can Help You - Extended-Range Imaging for 3D-Mask Presentation Attack Detection.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

2016
Keystroke Biometrics Ongoing Competition.
IEEE Access, 2016

Face presentation attack detection across spectrum using time-frequency descriptors of maximal response in Laplacian scale-space.
Proceedings of the Sixth International Conference on Image Processing Theory, 2016

Cross-Database Evaluation of Audio-Based Spoofing Detection Systems.
Proceedings of the Interspeech 2016, 2016

Heterogeneous Face Recognition Using Inter-Session Variability Modelling.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016


Joint operation of voice biometrics and presentation attack detection.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Presentation Attack Detection Using Long-Term Spectral Statistics for Trustworthy Speaker Verification.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

The Replay-Mobile Face Presentation-Attack Database.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

Face Recognition in Challenging Environments: An Experimental and Reproducible Research Survey.
Proceedings of the Face Recognition Across the Imaging Spectrum, 2016

Face Recognition Systems Under Spoofing Attacks.
Proceedings of the Face Recognition Across the Imaging Spectrum, 2016

2015
Anti-spoofing, Evaluation Methodologies.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Anti-spoofing, Face Databases.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Joint Speaker Verification and Antispoofing in the i-Vector Space.
IEEE Trans. Inf. Forensics Secur., 2015

Guest Editorial Special Issue on Biometric Spoofing and Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2015

Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned.
IEEE Signal Process. Mag., 2015

Biometrics Security and Privacy Protection [From the Guest Editors].
IEEE Signal Process. Mag., 2015

Impact of eye detection error on face recognition performance.
IET Biom., 2015

Gender Classification by LUT Based Boosting of Overlapping Block Patterns.
Proceedings of the Image Analysis - 19th Scandinavian Conference, 2015

The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks.
Proceedings of the International Conference on Biometrics, 2015

On the vulnerability of palm vein recognition to spoofing attacks.
Proceedings of the International Conference on Biometrics, 2015

Finger vein liveness detection using motion magnification.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Periocular biometrics in mobile environment.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

On the vulnerability of speaker verification to realistic voice spoofing.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

Palm Vein Database and Experimental Framework for Reproducible Research.
Proceedings of the BIOSIG 2015, 2015

2014
Introduction.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Evaluation Methodologies.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Face Anti-spoofing: Visual Approach.
Proceedings of the Handbook of Biometric Anti-Spoofing, 2014

Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.
IEEE Trans. Image Process., 2014

Spoofing Face Recognition With 3D Masks.
IEEE Trans. Inf. Forensics Secur., 2014

Biometrics Evaluation Under Spoofing Attacks.
IEEE Trans. Inf. Forensics Secur., 2014

Bi-modal biometric authentication on mobile phones in challenging conditions.
Image Vis. Comput., 2014

Score calibration in face recognition.
IET Biom., 2014

Motion-based counter-measures to photo attacks in face recognition.
IET Biom., 2014

Face liveness detection using dynamic texture.
EURASIP J. Image Video Process., 2014

Biometric Antispoofing Methods: A Survey in Face Recognition.
IEEE Access, 2014

Swiss French Regional Accent Identification.
Proceedings of the Odyssey 2014: The Speaker and Language Recognition Workshop, 2014

Hierarchical speaker clustering methods for the NIST i-vector Challenge.
Proceedings of the Odyssey 2014: The Speaker and Language Recognition Workshop, 2014

Within- and cross- database evaluations for face gender classification via befit protocols.
Proceedings of the IEEE 16th International Workshop on Multimedia Signal Processing, 2014

Introducing i-vectors for joint anti-spoofing and speaker verification.
Proceedings of the INTERSPEECH 2014, 2014

Face Anti-spoofing Based on General Image Quality Assessment.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Audio-visual gender recognition in uncontrolled environment using variability modeling techniques.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

Spear: An open source toolbox for speaker recognition based on Bob.
Proceedings of the IEEE International Conference on Acoustics, 2014

On the Vulnerability of Finger Vein Recognition to Spoofing.
Proceedings of the BIOSIG 2014, 2014

2013
Mobile Biometrics: Combined Face and Voice Verification for a Mobile Platform.
IEEE Pervasive Comput., 2013

A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Session variability modelling for face authentication.
IET Biom., 2013

Alternative search techniques for face detection using location estimation and binary features.
Comput. Vis. Image Underst., 2013


Can face anti-spoofing countermeasures work in a real world scenario?
Proceedings of the International Conference on Biometrics, 2013

Complementary countermeasures for detecting scenic face spoofing attacks.
Proceedings of the International Conference on Biometrics, 2013




Anti-spoofing in Action: Joint Operation with a Verification System.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

Spoofing 2D Face Recognition Systems with 3D Masks.
Proceedings of the 2013 BIOSIG, 2013

2012
Cross-Pollination of Normalization Techniques From Speaker to Face Authentication Using Gaussian Mixture Models.
IEEE Trans. Inf. Forensics Secur., 2012

A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers.
IEEE Trans. Inf. Forensics Secur., 2012

Bob: a free signal processing and machine learning toolbox for researchers.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Boosting localized binary features for speech recognition.
Proceedings of the 2012 Symposium on Machine Learning in Speech and Language Processing, 2012

Bi-modal authentication in mobile environments using session variability modelling.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Bi-Modal Person Recognition on a Mobile Phone: Using Mobile Phone Data.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

An Open Source Framework for Standardized Comparisons of Face Recognition Algorithms.
Proceedings of the Computer Vision - ECCV 2012. Workshops and Demonstrations, 2012

Face Verification using Gabor filtering and adapted Gaussian Mixture Models.
Proceedings of the 2012 BIOSIG, 2012

On the effectiveness of local binary patterns in face anti-spoofing.
Proceedings of the 2012 BIOSIG, 2012

LBP - TOP Based Countermeasure against Face Spoofing Attacks.
Proceedings of the Computer Vision - ACCV 2012 Workshops, 2012

2011
Introduction to the special issue on image and video retrieval: theory and applications.
Multim. Tools Appl., 2011

Inter-session variability modelling and joint factor analysis for face authentication.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Fast speaker verification on mobile phone data using boosted slice classifiers.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011



Counter-measures to photo attacks in face recognition: A public database and a baseline.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

Phoneme recognition using Boosted Binary Features.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
An Evaluation of Video-to-Video Face Verification.
IEEE Trans. Inf. Forensics Secur., 2010

Feature distribution modelling techniques for 3D face verification.
Pattern Recognit. Lett., 2010

On the vulnerability of face verification systems to hill-climbing attacks.
Pattern Recognit., 2010

A novel statistical generative model dedicated to face recognition.
Image Vis. Comput., 2010

Visual processing-inspired fern-audio features for noise-robust speaker verification.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Torchvision the machine-vision package of torch.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-overlapping Audio and Video Streams.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions.
Proceedings of the 20th International Conference on Pattern Recognition, 2010


An alternative scanning strategy to detect faces.
Proceedings of the IEEE International Conference on Acoustics, 2010

Boosted binary features for noise-robust speaker verification.
Proceedings of the IEEE International Conference on Acoustics, 2010

Introducing crossmodal biometrics: Person identification from distinct audio & visual streams.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010

A principled approach to remove false alarms by modelling the context of a face detector.
Proceedings of the British Machine Vision Conference, 2010

2009
A comparative study of two state-of-the-art sequence processing techniques for hand gesture recognition.
Comput. Vis. Image Underst., 2009


Parts-Based Face Verification Using Local Frequency Bands.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Bayesian Networks to Combine Intensity and Color Information in Face Recognition.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Media on the web, in post-production and broadcasting: the practitioner day of the ACM 2009 International Conference on Image and Video Retrieval.
Proceedings of the 8th ACM International Conference on Image and Video Retrieval, 2009

Haar Local Binary Pattern Feature for Fast Illumination Invariant Face Detection.
Proceedings of the British Machine Vision Conference, 2009

2007
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation.
IEEE Trans. Pattern Anal. Mach. Intell., 2007

Face Authentication with Salient Local Features and Static Bayesian Network.
Proceedings of the Advances in Biometrics, International Conference, 2007

2006

Performance Characterisation of Face Recognition Algorithms and Their Sensitivity to Severe Illumination Changes.
Proceedings of the Advances in Biometrics, International Conference, 2006

Hand Posture Classification and Recognition using the Modified Census Transform.
Proceedings of the Seventh IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2006), 2006

Local Binary Patterns as an Image Preprocessing for Face Authentication.
Proceedings of the Seventh IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2006), 2006

Face Authentication Using Adapted Local Binary Pattern Histograms.
Proceedings of the Computer Vision, 2006

2004
On Performance Evaluation of Face Detection and Localization Algorithms.
Proceedings of the 17th International Conference on Pattern Recognition, 2004


Face Authentication Competition on the BANCA Database.
Proceedings of the Biometric Authentication, First International Conference, 2004

A Symmetric Transformation for LDA-based Face Verification.
Proceedings of the Sixth IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2004), 2004

Recognition of Isolated Complex Mono- and Bi-Manual 3D Hand Gestures.
Proceedings of the Sixth IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2004), 2004

Biometric Face Authentication Using Pixel-Based Weak Classifiers.
Proceedings of the Biometric Authentication, 2004

HMM and IOHMM for the Recognition of Mono- and Bi-Manual 3D Hand Gestures.
Proceedings of the British Machine Vision Conference, 2004

2003
Speech & face based biometric authentication at IDIAP.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Improving face authentication using virtual samples.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003


Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS.
Proceedings of the Audio-and Video-Based Biometrie Person Authentication, 2003

2002
Confidence measures for multimodal identity verification.
Inf. Fusion, 2002

Improving Face Verification Using Skin Color Information.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2000
Hand Gesture Recognition Using Input-Output Hidden Markov Models.
Proceedings of the 4th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2000), 2000

1999
Hand Posture Recognition in a Body-Face Centered Space.
Proceedings of the Gesture-Based Communication in Human-Computer Interaction, 1999

Hand posture recognition in a body-face centered space.
Proceedings of the CHI '99 Extended Abstracts on Human Factors in Computing Systems, 1999


  Loading...