For the last ten years, face biometric research has been intensively studied by the computer vision community. Face recognition systems have been used in mobile, banking, and surveillance systems. For face recognition systems, face spoofing attack detection is a crucial stage that could cause severe security issues in government sectors. Although effective methods for face presentation attack detection have been proposed so far, the problem is still unsolved due to the difficulty in the design of features and methods that can work for new spoofing attacks. In addition, existing datasets...
For the last ten years, face biometric research has been intensively studied by the computer vision community. Face recognition systems have been u...
This book presents and surveys normalization techniques with a deep analysis in training deep neural networks. In addition, the author provides technical details in designing new normalization methods and network architectures tailored to specific tasks. Normalization methods can improve the training stability, optimization efficiency, and generalization ability of deep neural networks (DNNs) and have become basic components in most state-of-the-art DNN architectures. The author provides guidelines for elaborating, understanding, and applying normalization...
This book presents and surveys normalization techniques with a deep analysis in training deep neural networks. In addition, the author p...
This book presents the first unified formalization for defining novelty across the span of machine learning, symbolic-reasoning, and control and planning-based systems. Dealing with novelty, things not previously seen by a system, is a critical issue for building vision-systems and general intelligent systems. The book presents examples of using this framework to define and evaluate in multiple domains including image recognition image-based open world learning, hand-writing and author analysis, CartPole Control, Image Captioning, and Monopoly. ...
This book presents the first unified formalization for defining novelty across the span of machine learning, symbolic-reasoning, and control and plann...
This book provides a comprehensive overview of the fine-grained image analysis research and modern approaches based on deep learning, spanning the full range of topics needed for designing operational fine-grained image systems. The author begins by providing detailed background information on FGIA, focusing on recognition and retrieval. The author also provides the fundamentals of convolutional neural networks to further make it easier for readers to understand the technical content in the book. The book introduces the main technical paradigms, technological developments, and representative...
This book provides a comprehensive overview of the fine-grained image analysis research and modern approaches based on deep learning, spanning the ful...
This book provides a thorough overview of recent progress in video object segmentation, providing researchers and industrial practitioners with thorough information on the most important problems and developed technologies in the area. Video segmentation is a fundamental topic for video understanding in computer vision. Segmenting unique objects in a given video is useful for a variety of applications, including video conference, video editing, surveillance, and autonomous driving. Given the revolution of deep learning in computer vision problems, numerous new tasks, datasets, and methods...
This book provides a thorough overview of recent progress in video object segmentation, providing researchers and industrial practitioners with thorou...
This book revises and expands upon the prior edition of Multi-Modal Face Presentation Attack Detection. The authors begin with fundamental and foundational information on face spoofing attack detection, explaining why the computer vision community has intensively studied it for the last decade. The authors also discuss the reasons that cause face anti-spoofing to be essential for preventing security breaches in face recognition systems. In addition, the book describes the factors that make it difficult to design effective methods of face presentation attack detection challenges. The...
This book revises and expands upon the prior edition of Multi-Modal Face Presentation Attack Detection. The authors begin with fundamental and ...
This book presents the first unified formalization for defining novelty across the span of machine learning, symbolic-reasoning, and control and planning-based systems. Dealing with novelty, things not previously seen by a system, is a critical issue for building vision-systems and general intelligent systems. The book presents examples of using this framework to define and evaluate in multiple domains including image recognition image-based open world learning, hand-writing and author analysis, CartPole Control, Image Captioning, and Monopoly. ...
This book presents the first unified formalization for defining novelty across the span of machine learning, symbolic-reasoning, and control and plann...
This book provides a thorough overview of recent progress in video object tracking, allowing researchers and industrial practitioners to gain a better understanding of the most important problems and developed technologies in the area. Video tracking is a key research area in computer vision and aims to track unique objects in a given video, which are useful for various applications such as video conference, video editing, surveillance, and autonomous driving. This book begins with an introduction to the task of video object tracking, including the most common problem settings. Given the...
This book provides a thorough overview of recent progress in video object tracking, allowing researchers and industrial practitioners to gain a better...