Search For:

Displaying 1-22 out of 22 total
Enhanced Human Face Image Searching System using Relevance Feedback
Found in: Automatic Face and Gesture Recognition, IEEE International Conference on
By Pong C. Yuen, C. H. Man
Issue Date:May 2004
pp. 177
This paper addresses the problems of face recognition using sketch. All existing face sketch recognition systems focus on the sketch to mug shot matching. However, one of the key problems is that very often witness cannot reconstruct the sketch well. In tu...
 
Kernel Subspace LDA with Optimized Kernel Parameters on Face Recognition
Found in: Automatic Face and Gesture Recognition, IEEE International Conference on
By Jian Huang, Pong C Yuen, Wen-Sheng Chen, J H Lai
Issue Date:May 2004
pp. 327
This paper addresses the problem of selection of Kernel parameters in Kernel Fisher Discriminant for face recognition. We propose a new criterion and derive a new formation in optimizing the parameters in RBF kernel based on the gradient descent algorithm....
 
Binary Discriminant Analysis for Face Template Protection
Found in: Pattern Recognition, International Conference on
By Yi C. Feng, Pong C. Yuen
Issue Date:August 2010
pp. 874-877
Biometric cryptosystem (BC) is a very secure approach for template protection because the stored template is encrypted. The key issues in BC approach include(i) limited capability in handling intra-class variations and (ii) binary input is required. To ove...
 
Shot Boundary Detection: An Information Saliency Approach
Found in: Image and Signal Processing, Congress on
By X. Wu, Pong C. Yuen, C. Liu, J. Huang
Issue Date:May 2008
pp. 808-812
This paper proposes a new approach for shot boundary detection using information saliency. Both temporal and spatial saliency are considered to generate an information saliency map (ISM). The shot detection (both abrupt changes and gradual transitions) is ...
 
Interpolatory Mercer kernel construction for kernel direct LDA on face recognition
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Pong C. Yuen
Issue Date:April 2009
pp. 857-860
This paper proposes a novel methodology on Mercer kernel construction using interpolatory strategy. Based on a given symmetric and positive semi-definite matrix (Gram matrix) and Cholesky decomposition, it first constructs a nonlinear mapping Φ, which is w...
 
Linear dependency modeling for feature fusion
Found in: Computer Vision, IEEE International Conference on
By Andy J H Ma,Pong C Yuen
Issue Date:November 2011
pp. 2041-2048
This paper addresses the independent assumption issue in fusion process. In the last decade, dependency modeling techniques were developed under a specific distribution of classifiers. This paper proposes a new framework to model the dependency between fea...
 
Virtual View Face Image Synthesis Using 3D Spring-Based Face Model from a Single Image
Found in: Automatic Face and Gesture Recognition, IEEE International Conference on
By G.C. Feng, Pong C Yuen, J.H. Lai
Issue Date:March 2000
pp. 530
It is known that 2D views of a person can be synthesis if the face 3D model of that person is available. This paper proposes a new method, called 3D Spring-Based Face Model (SBFM), to determine the precise face model of a person with different poses and fa...
 
Domain Transfer Support Vector Ranking for Person Re-identification without Target Camera Label Information
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Andy J. Ma,Pong C. Yuen,Jiawei Li
Issue Date:December 2013
pp. 3567-3574
This paper addresses a new person re-identification problem without the label information of persons under non-overlapping target cameras. Given the matched (positive) and unmatched (negative) image pairs from source domain cameras, as well as unmatched (n...
 
Learning the Relationship Between High and Low Resolution Images in Kernel Space for Face Super Resolution
Found in: Pattern Recognition, International Conference on
By Wilman W.W. Zou, Pong C. Yuen
Issue Date:August 2010
pp. 1152-1155
This paper proposes a new nonlinear face super resolution algorithm to address an important issue in face recognition from surveillance video namely, recognition of low resolution face image with nonlinear variations. The proposed method learns the nonline...
 
Face illumination normalization on large and small scale features
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Jianhuang Lai, Pong C. Yuen
Issue Date:June 2008
pp. 1-8
It is well known that the effect of illumination is mainly on the large-scale features (low-frequency components) of a face image. In solving the illumination problem for face recognition, most (if not all) existing methods either only use extracted small-...
 
Generating Novel Information Salient Maps for Foreground Object Detection in Video
Found in: Image and Signal Processing, Congress on
By Chang Liu, Pong C. Yuen, Guoping Qiu
Issue Date:May 2008
pp. 196-200
The conceptual model of visual saliency in human vision system has been employed in extracting salient features from images and multimedia data in the last decade. This paper proposes to employ the visual saliency for moving object detection. The crucial f...
 
Automatic Acquisition of Context Models and its Application to Video Surveillance
Found in: Pattern Recognition, International Conference on
By Oliver Brdiczka, Pong C. Yuen, Sofia Zaidenberg, Patrick Reignier, James L. Crowley
Issue Date:August 2006
pp. 1175-1178
This paper addresses the problem of automatically acquiring context models from data. Context and human behavior are represented using a state model, called situation model. This model consists of different layers referring to entities, filters, roles, rel...
 
Weakly Supervised Learning on Pre-image Problem in Kernel Methods
Found in: Pattern Recognition, International Conference on
By Wei-Shi Zheng, Jian-Huang Lai, Pong C. Yuen
Issue Date:August 2006
pp. 711-715
This paper presents a novel alternative approach, namely weakly supervised learning (WSL), to learn the pre-image of a feature vector in the feature space induced by a kernel. It is known that the exact preimage may typically seldom exist, since the input ...
 
Protecting Face Biometric Data on Smartcard with Reed-Solomon Code
Found in: Computer Vision and Pattern Recognition Workshop
By Yi Cheng Feng, Pong C Yuen
Issue Date:June 2006
pp. 29
This paper addresses the biometric security problem on smartcard and proposes a new method to protect face biometric data against attack. The proposed method is developed based on the Reed-Solomon codes, with two modifications. First, to handle the image v...
 
Multi-template ASM Method for Feature Points Detection of Facial Image with Diverse Expressions
Found in: Automatic Face and Gesture Recognition, IEEE International Conference on
By Ying Li, J H Lai, Pong C Yuen
Issue Date:April 2006
pp. 435-440
This paper proposed a multi-template ASM algorithm addressing facial feature points detection under nonlinear shape variation of facial images with various kinds of expression. By adding texture information, adopting asymmetric sampling strategy for the fe...
 
Mouth State Estimation in Mobile Computing Environment
Found in: Automatic Face and Gesture Recognition, IEEE International Conference on
By Pong C. Yuen, J. H. Lai, Q. Y. Huang
Issue Date:May 2004
pp. 705
This paper discusses a vision-based human understanding application in mobile devices and reports an efficient mouth boundary detection and mouth state estimation algorithm. The proposed algorithm is insensitive to the illumination changes. 400 head-&-...
 
Component-based LDA Method for Face Recognition with One Training Sample
Found in: Analysis and Modeling of Faces and Gestures, IEEE International Workshop on
By Jian Huang, Pong C Yuen, Wen-Sheng Chen, J H Lai
Issue Date:October 2003
pp. 120
Many face recognition algorithms/systems have been developed in the last decade and excellent performances are also reported when there is sufficient number of representative training samples. In many real-life applications, only one training sample is ava...
 
Recovery of Writing Sequence of Static Images of Handwriting using UWM
Found in: Document Analysis and Recognition, International Conference on
By K K Lau, Pong C Yuen, Yuan Y Tang
Issue Date:August 2003
pp. 1123
It is generally agreed that an on-line recognition system is always reliable than an off-line one. It is due to the availability of the dynamic information, especially the writing sequence of the strokes. This paper presents a new statistical method to rec...
 
Stroke Extraction and Stroke Sequence Estimation on Signatures
Found in: Pattern Recognition, International Conference on
By K K Lau, Pong C Yuen, Yuan Y Tang
Issue Date:August 2002
pp. 30119
This article addresses the problem in strokes extraction and stroke sequence estimation from a static signature. A new algorithm is proposed based on a simple but effective writer model. The results are encouraging.
 
Robust Facial Feature Point Detection Under Nonlinear Illuminations
Found in: Recognition, Analysis, & Tracking of Faces & Gestures in Real -Time Systems, IEEE ICCV Workshop on
By JianHuang Lai, Pong C Yuen, WenSheng Chen, Shihong Lao, Masato Kawade
Issue Date:August 2001
pp. 0168
Abstract: This paper addresses the problem of facial feature point detection under different lighting conditions. Our goal is to develop an efficient detection algorithm, which is suitable for practical applications. The problems that we need to overcome i...
 
EDT Based Tracing Maximum Thinning Algorithm on Grey Scale Images
Found in: Pattern Recognition, International Conference on
By K.K. Lau, Pong C. Yuen, Y.Y. Tang
Issue Date:September 2000
pp. 2863
Most of the thinning algorithms nowadays are based on bi-level images. In recognition of hand-written words, such as signatures, the use of grey-scale image is better because much data is available from the image. In this article, we propose an efficient t...
 
Finger gesture recognition through sweep sensor
Found in: Proceedings of the 1st international workshop on Interactive multimedia for consumer electronics (IMCE '09)
By Hoson H.S. Lam, Kelvin K.F. Wong, Pong C. Yuen, S. B. Zhang, W. W. Zou
Issue Date:October 2009
pp. 11-18
Fingerprint sensor becomes more and more popular, and has been installed in many electronic devices, ranging from portable mobile devices to high-end personal computers. With the high penetration power of fingerprint sensor, this paper proposes to make use...
     
 1