Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

PDF

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Series

Computer Vision

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Learning Domain Invariant Information To Enhance Presentation Attack Detection In Visible Face Recognition Systems, Jennifer Hamblin Apr 2022

Learning Domain Invariant Information To Enhance Presentation Attack Detection In Visible Face Recognition Systems, Jennifer Hamblin

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Face signatures, including size, shape, texture, skin tone, eye color, appearance, and scars/marks, are widely used as discriminative, biometric information for access control. Despite recent advancements in facial recognition systems, presentation attacks on facial recognition systems have become increasingly sophisticated. The ability to detect presentation attacks or spoofing attempts is a pressing concern for the integrity, security, and trust of facial recognition systems. Multi-spectral imaging has been previously introduced as a way to improve presentation attack detection by utilizing sensors that are sensitive to different regions of the electromagnetic spectrum (e.g., visible, near infrared, long-wave infrared). Although multi-spectral presentation attack …


An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace Aug 2020

An End-To-End Trainable Method For Generating And Detecting Fiducial Markers, J Brennan Peace

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Existing fiducial markers are designed for efficient detection and decoding. The methods are computationally efficient and capable of demonstrating impressive results, however, the markers are not explicitly designed to stand out in natural environments and their robustness is difficult to infer from relatively limited analysis. Worsening performance in challenging image capture scenarios - such as poorly exposed images, motion blur, and off-axis viewing - sheds light on their limitations. The method introduced in this work is an end-to-end trainable method for designing fiducial markers and a complimentary detector. By introducing back-propagatable marker augmentation and superimposition into training, the method learns …