Open main menu

CDOT Wiki β

Changes

Augmented Reality

4,365 bytes added, 10:13, 4 November 2010
Research Notes
= Research Notes =
 
'''Introduction & Definition of Face Recognition Technology'''
 
http://en.wikipedia.org/wiki/Facial_recognition_system#Early_development
 
'''''How does the technology work (overview)?
'''''
 
Effectiveness of Point Distribution Model and Active Shape Models:
“The point distribution model can be used for Face detection and face recognition.”
 
ROKITA, JOANNA, ADAM KRZYŻAK, and CHING Y. SUEN. "MULTIMODAL BIOMETRICS BY FACE
AND HAND IMAGES TAKEN BY A CELL PHONE CAMERA." International Journal of Pattern
Recognition & Artificial Intelligence 22.3 (2008): 411-429. Academic Search Premier. EBSCO. Web. 1
Nov. 2010.
 
'''''Uses of the technology.'''''
 
'''Facial recognition for personal security:'''
 
“ face detection methods can be categorized into the following two large groups:
 
1) heuristic-based methods and 2) classification-based methods.”
 
“The following two popular ways of doing the face registration can be found in the literature: 1) holistic
 
methods and 2) local methods.”
 
“Illumination normalization, therefore, is a very important preprocessing step before verification.”
 
Face Verification is math heavy
This calculates thresholds (I think). We will worry about that later. Even Chris would love to explain this
heavy math, if we need his help.
 
'''Information Fusion'''
 
“From each frame, we obtain a value of its likelihood ratio and compare it to a threshold to make the
decision”
 
'''Facial recognition for fighting terrorism:'''
 
“A technique such as face recognition could, at least in principle, be used to recognize people
 
“passively,” without their knowledge or cooperation.”
 
“Instead of a person continuously monitoring the video, the goal is to have a computer monitor the
 
video and alert a human operator if an “interesting person” is in view.”
 
'''System Dependencies:'''
“the system can only recognize the persons whose images have been enrolled in the gallery”
 
“If a terrorist is known by name and reputation, but no picture of the terrorist is available, then the face
 
recognition system is useless.”
 
“system must be able to acquire face images of reasonable quality to use as probes.”
 
“system has a sensitivity threshold that must be set appropriately.”
 
Bowyer, Kevin W. "Face Recognition Technology: Security versus Privacy." IEEE Technology & Society
Magazine 23.1 (2004): 9-20. Academic Search Premier. EBSCO. Web. 1 Nov. 2010.
 
'''''Facial recognition for search realistically.'''''
 
“Imagine never forgetting a face, and always being able to recognize a friend-of-a-friend on the street.
And because the systems arelinked to the Internet, once AR recognized someone, you could easily
pull up his or her online footprint, such as a Facebook page.”
 
Cascio, Jamais. "Seeing Too Much." Atlantic Monthly (10727825) 304.4 (2009): 34. Academic Search
Premier. EBSCO. Web. 1 Nov. 2010.
 
'''''Problems due to technology.'''''
 
Facial recognition vs. privacy in social media driven world:
 
1. “The United States Constitution declares a level of protection for the rights of individual citizens
 
against oppression by their government that has made the U.S. unique. The right to privacy is
one right that has become a firmly entrenched American value, even though it is not explicitly
enumerated in the Constitution. Since face recognition systems represent leading-edge and
rapidly changing technology, this technology is currently a major issue in the area of social
impact of technology.”
 
Bowyer, Kevin W. "Face Recognition Technology: Security versus Privacy." IEEE Technology &
Society Magazine 23.1 (2004): 9-20. Academic Search Premier. EBSCO. Web. 1 Nov. 2010.
 
2. 2. “We don’t regard ourselves as ‘Big Brother’. We’re more like a friendly uncle or aunt
 
watching over you.”
 
Hale, Benjamin. "Identity crisis: Face recognition technology and freedom of the will." Ethics,
Place & Environment 8.2 (2005): 141-158. Academic Search Premier. EBSCO. Web. 1 Nov.
2010.
 
'''''Facial recognition false positives.'''''
 
“Distinctiveness of a face predicts both miss errors (MEs) and false positives (FPs) but correlations
 
between these errors are low”
 
Lewis, Michael B. "Familiarity, Target Set and False Positives in Face Recognition." European Journal of
Cognitive Psychology 9.4 (1997): 437-459. Academic Search Premier. EBSCO. Web. 1 Nov. 2010.
1
edit