2008
Proceedings Articles
Rok Gajšek; Anja Podlesek; Luka Komidar; Grekor Sočan; Boštjan Bajec; Vitomir Štruc; Valentin Bucik; France Mihelič
AvID: audio-video emotional database Proceedings Article
V: Proceedings of the 11th International Multi-conference Information Society (IS'08), str. 70-74, Ljubljana, Slovenia, 2008.
@inproceedings{JJ2008,
title = {AvID: audio-video emotional database},
author = {Rok Gajšek and Anja Podlesek and Luka Komidar and Grekor Sočan and Boštjan Bajec and Vitomir Štruc and Valentin Bucik and France Mihelič},
year = {2008},
date = {2008-01-01},
booktitle = {Proceedings of the 11th International Multi-conference Information Society (IS'08)},
volume = {C},
pages = {70-74},
address = {Ljubljana, Slovenia},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2007
Journal Articles
Vitomir Štruc; Nikola Pavešić
Impact of image degradations on the face recognition accuracy Članek v strokovni reviji
V: Electrotechnical Review, vol. 74, no. 3, str. 145-150, 2007.
@article{EV-Struc_2007,
title = {Impact of image degradations on the face recognition accuracy},
author = {Vitomir Štruc and Nikola Pavešić},
url = {https://lmi.fe.uni-lj.si/en/impactofimagedegradationsonthefacerecognitionaccuracy/},
year = {2007},
date = {2007-01-01},
urldate = {2007-01-01},
journal = {Electrotechnical Review},
volume = {74},
number = {3},
pages = {145-150},
abstract = {The accuracy of automatic face recognition systems depends on various factors among which robustness and accuracy of the face localization procedure, choice of an appropriate face-feature extraction procedure, as well as use of a suitable matching algorithm are the most important. Current systems perform relatively well whenever test images to be recognized are captured under conditions similar to those of the training images. However, they are not robust enough if there is a difference between test and training images. Changes in image characteristics such as noise, colour depth, background and compression all cause a drop in performance of even the best systems of today. At this point the main question is which image characteristics are the most important in terms of face recognition performance and how they affect the recognition accuracy. This paper addresses these issues and presents performance evaluation (Table 2.) of three popular subspace methods (PCA, LDA and ICA) using ten degraded versions of the XM2VTS face image database [10]. The presented experimental results show the effects of different changes in image characteristics on four score level fusion rules, namely, the maximum, minimum, sum and product rule. All of the feature extraction procedures as well as the fusion strategies are rather insensitive to the presence of noise, JPEG compression, colour depth reduction, and so forth, while on the other hand they all exhibit great sensitivity to degradations such as face occlusion and packet loss simulation},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Proceedings Articles
Nikola Pavešić Vitomir Štruc France Mihelič
Color spaces for face recognition Proceedings Article
V: Proceedings of the International Electrotechnical and Computer Science Conference (ERK'07), str. 171-174, Portorož, Slovenia, 2007.
@inproceedings{ERK2007,
title = {Color spaces for face recognition},
author = {Nikola Pavešić Vitomir Štruc France Mihelič},
url = {https://lmi.fe.uni-lj.si/en/colorspacesforfacerecognition/},
year = {2007},
date = {2007-01-01},
urldate = {2007-01-01},
booktitle = {Proceedings of the International Electrotechnical and Computer Science Conference (ERK'07)},
pages = {171-174},
address = {Portorož, Slovenia},
abstract = {The paper investigates the impact that the face-image color space has on the verification performance of two popular face recognition procedures, i.e., the Fisherface approach and the Gabor-Fisher classifier - GFC. Experimental results on the XM2VTS database show that the Fisherface technique performs best when features are extracted from the Cr component of the YCbCr color space, while the performance of the Gabor-Fisher classifier is optimized when grey-scale intensity face-images are used for feature extraction. Based on these findings, a novel face recognition framework that combines the Fisherface and the GFC method is introduced in this paper and its feasibility demonstrated in a comparative study where, in addition to the proposed method, six widely used feature extraction techniques were tested for their face verification performance.},
key = {ERK2007},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
2004
Journal Articles
Boštjan Murovec; Peter Šuhel
A repairing technique for the local search of the job-shop problem Članek v strokovni reviji
V: European Journal of Operational Research, vol. 153, no. 1, str. 220 - 238, 2004, ISSN: 0377-2217, (Timetabling and Rostering).
@article{MUROVEC2004220,
title = {A repairing technique for the local search of the job-shop problem},
author = {Boštjan Murovec and Peter Šuhel},
url = {http://www.sciencedirect.com/science/article/pii/S0377221702007336},
doi = {https://doi.org/10.1016/S0377-2217(02)00733-6},
issn = {0377-2217},
year = {2004},
date = {2004-01-01},
journal = {European Journal of Operational Research},
volume = {153},
number = {1},
pages = {220 - 238},
abstract = {The local search technique has become a widely used tool for solving many combinatorial optimization problems. In the case of the job-shop the implementation of such a technique is not straightforward at all due to the existence of the technological constraints among the operations that belong to the same job. Their presence renders a certain set of schedules infeasible. Consequently, special attention is required when defining optimization algorithms to prevent the possibility of reaching an infeasible schedule during execution. Traditionally, the problem is tackled on the neighborhood level by using only a limited set of moves for which feasibility inherently holds. This paper proposes an alternative way to avoid infeasibility by incorporating a repairing technique into the mechanism for applying moves to a schedule. Whenever an infeasible move is being applied, a repairing mechanism rearranges the underlying schedule in such a way that the feasibility of the move is restored. The possibility of reaching infeasible solutions is, therefore, eliminated on the lowest possible conceptual level. Consequently, neighborhood functions need not to be constrained to a limited set of feasible moves any more.},
note = {Timetabling and Rostering},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
0000
Journal Articles
Blaz Meden, Peter Rot, Philipp Terhorst, Naser Damer, Arjan Kuijper, Walter J. Scheirer, Arun Ross, Peter Peer, Vitomir Srruc
Privacy-Enhancing Face Biometrics: A Comprehensive Survey Članek v strokovni reviji
V: IEEE Transactions on Information Forensics and Security, vol. vol. 16, str. 4147-4183, 0000.
@article{TIFS_PrivacySurvey,
title = {Privacy-Enhancing Face Biometrics: A Comprehensive Survey},
author = {Blaz Meden, Peter Rot, Philipp Terhorst, Naser Damer, Arjan Kuijper, Walter J. Scheirer, Arun Ross, Peter Peer, Vitomir Srruc},
url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9481149
https://lmi.fe.uni-lj.si/en/visual_privacy_of_faces__a_survey_preprint-compressed/},
doi = {10.1109/TIFS.2021.3096024},
journal = {IEEE Transactions on Information Forensics and Security},
volume = {vol. 16},
pages = {4147-4183},
abstract = {Biometric recognition technology has made significant advances over the last decade and is now used across a number of services and applications. However, this widespread deployment has also resulted in privacy concerns and evolving societal expectations about the appropriate use of the technology. For example, the ability to automatically extract age, gender, race, and health cues from biometric data has heightened concerns about privacy leakage. Face recognition technology, in particular, has been in the spotlight, and is now seen by many as posing a considerable risk to personal privacy. In response to these and similar concerns, researchers have intensified efforts towards developing techniques and computational models capable of ensuring privacy to individuals, while still facilitating the utility of face recognition technology in several application scenarios. These efforts have resulted in a multitude of privacy--enhancing techniques that aim at addressing privacy risks originating from biometric systems and providing technological solutions for legislative requirements set forth in privacy laws and regulations, such as GDPR. The goal of this overview paper is to provide a comprehensive introduction into privacy--related research in the area of biometrics and review existing work on textit{Biometric Privacy--Enhancing Techniques} (B--PETs) applied to face biometrics. To make this work useful for as wide of an audience as possible, several key topics are covered as well, including evaluation strategies used with B--PETs, existing datasets, relevant standards, and regulations and critical open issues that will have to be addressed in the future. },
keywords = {},
pubstate = {published},
tppubtype = {article}
}