User Tools

Site Tools



This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
projects:year5:16.05 [2019/08/21 09:17]
sally.johnson [Project - Summary]
projects:year5:16.05 [2019/08/22 10:48] (current)
sally.johnson [Project - Documents]
Line 12: Line 12:
 </WRAP> </WRAP>
 ===== Project - Team ===== ===== Project - Team =====
-^ Team Member           ^ Role        ^ Email                   ^ Phone Number       ^ Academic Site/IAB   +^ Team Member      ^ Role              ^ Email          ^ Phone Number   ^ Academic Site/IAB  
-Moncef Gabbouj        | PI          |  | +358 (400) 736613  | Tampere University +Xiaohua Tony Hu  | PI                | Not available  | Not available  Drexel University 
-| Alexandros Iosifidis  Co-PI       | Not available           | Not available      Tampere University +Xiaoli Song      Graduate Student  | Not available  | Not available Drexel University  |
-Honglei Zhang         Researcher  | Not available           | Not available      | Tampere University  | +
-| Muhammad Adeel Waris  | Researcher  | Not available           | Not available      | Tampere University  |+
Line 22: Line 20:
 ===== Project - Impact and Uses/Benefits ===== ===== Project - Impact and Uses/Benefits =====
 <WRAP leftalign box > <WRAP leftalign box >
-The use of face verification systems as a primary source of authentication has been very common over the past few years. Despite the advance in face recognition systems, there are still many open problems in this areaAccurate and fast recognitionsurveillance, learning and spoofing detection in large face databases with the cheapest possible way are essential to most industry sectors to maximize their security, revenues and competitiveness. Our research done in this project proved that the combined system can be easily adapted by industry. Our industry partners have established projects to integrate the system into their own and will showcase the integrated system in an important national event. +We evaluated the proposed robust dimensional reduction, sampling and visualization with high level of performance in purpose of generating useful knowledge in big data applications on social mediaHoweverour model can be applied to a wide variety of problems 
- +
-Our reserach also shows the limitation of spoofing detection using noise patterns and presents the future direction of providing reliable spoofing attack detection systems. We have also shown the limitations of the proposed systems in partially occulded faces and in the case of training with a few samples. Such limitations will be mitigated in the next 2017-2018 CVDI project.+
 </WRAP> </WRAP>
Line 32: Line 28:
 ===== Project - Documents ===== ===== Project - Documents =====
projects/year5/16.05.1566397024.txt.gz · Last modified: 2019/08/21 09:17 by sally.johnson