2016 23rd International Conference on Pattern Recognition (ICPR) Cancún Center, Cancún, México, December 4-8, 2016

Computationally Efficient Template-Based Face Recognition Yue Wu,∗ Wael AdbAlmageed,∗ Stephen Rawls∗ , Prem Natarajan∗ Abstract— Classically, face recognition depends on computing the similarity (or distance) between a pair of face images and/or their respective representations, where each subject is represented by one image. Template-based face recognition was introduced by the release of IARPA’s Janus Benchmark-A (IJB-A) dataset, in which each enrolled subject is represented by a group of one or more images, called a template. The group of images comprising a template might have been acquired using different head poses, illuminations, ages and facial expressions. Template images could come from still images or video frames. Therefore, measuring the similarity between templates representing two subjects significantly increases the number of pairwise image comparisons (i.e., O(N M ), where N and M are the number of image templates being compared). As the number of enrolled subjects, K, increases, both computational and space requirements become computationally prohibitive. To address this challenge, we present a novel approximate nearest-neighbor (ANN) searchbased solution. Given a query template, ANN methods are used to find similar face images. Retrieved images are used to construct a template pool that is used to find the correct identity of the query subject. The proposed approach largely reduces the number of imposter template-pair comparisons. Experimental results on the IJB-A dataset show that the proposed approach achieves significant speed-up and storage savings, without sacrificing accuracy.

I. I NTRODUCTION Face recognition is an important and challenging computer vision problem, with many applications ranging from national security to daily life. A typical image-based face recognition system can be roughly decomposed into three core modules [17], [1]: 1) a preprocessing module which converts an input image into a canonical form (e.g., cropped, aligned and resized face patch); 2) a feature extractor which takes a preprocessed face image X and produces a feature vector f ; and 3) a recognition module which uses some metric ρf (·, ·) that measures the degree of similarity between two face feature vectors. Most face recognition research focuses on improving face image preprocessing and/or achieving a more robust and discriminative face representation, such as improved face detection [9], face frontalization [6], improved facial landmark detection [2], estimating facial attributes, (e.g., age and gender) [5], deep neural network features [1], etc. Other research attempts to find better similarity metrics [4], [7] for comparing face representations. Given a query (i.e., probe1 ) face image and a reference database that contains K enrolled gallery images, one image ∗ All authors are with the Information Sciences Institute, University of Southern California, 4676 Admiralty Way, Marina Del Rey, CA 90292.

{yue wu,wamageed,srawls,pnataraj}@isi.edu 1 From this point on, we will use query and probe interchangeably to indicate the subject with unknown identity. We will also use gallery and reference interchangeably to indicate enrolled subject.

978-1-5090-4847-2/16/$31.00 ©2016 IEEE

per subject, the search time is therefore linear in terms of the number of images. Nevertheless, in order to develop and deploy a large-scale face recognition system in which hundreds of thousands, or perhaps millions, of subjects are enrolled, the search scheme and similarity measure must be implemented efficiently. Recently, the face recognition problem has been reformulated with the introduction of IARPA’s Janus Benchmark-A (IJB-A) dataset [8], in which each subject (both query and reference) is represented by a template, rather than a single image. A template is a group of one or more images of the subject. Template images could have been acquired under different illumination conditions, at different ages, with different head poses and with different facial expressions. Therefore, measuring the similarity between two subjects entails comparing pairs of images that belong to a query template and reference template, which is O(N M ), where N and M are the number of images in the templates being compared. While the search complexity remains linear (i.e., O(K)) in the number of enrolled subjects, the overall complexity grows to O(KN M ), which is highly expensive as the number of subjects grows and the number of images in the template grows (e.g., by including video frames). One approach to reduce the computational complexity is to use feature fusion, in which all feature vectors extracted from template images are combined into one feature vector representing the given subject [15][10]. This approach reduces the computational complexity at the expense of losing important information contained in image features and in the pairwise image similarities. Moreover, it is often challenging to determine the best method for fusing feature vectors (e.g., max-pooling, average-pooling, etc.). Some pooling functions might be wellsuited for certain attributes, while not for others. For example, in [10] max-pooling is preferred over average-pooling, while in [15] average-pooling performs much better than max-pooling. Finally, this approach is not easy to support useful template operations, such as adding or removing a sample. However, despite the drawbacks of feature fusion techniques, approximate nearest-neighbor (ANN) methods [16][11][13] can be directly applied to feature fusion approaches to reduce the computational complexity of face recognition sublinearly. The other family of approaches is focused on similarity score fusion, in which all pairwise similarity scores are calculated and later fused to produce a template-pair similarity score. Classic ANN solutions become inappropriate since 1) the number of images (therefore features) may vary between query and reference templates, and 2) image neighbors are not necessarily template neighbors. Locality-sensitive hashing (LSH) methods [3][12] are widely

1424

used for reducing the computational complexity of image search problems. LSH is a mapping h(·) from a real-valued feature vector f to a binary feature vector b, i.e., b = h(f ). The fundamental property of LSH is that distances in the original feature space are preserved in the binary (i.e., Hamming) space, such that ρf (fi , fj ) ∝ ρb (bi , bj ), where ρb (·, ·) is a similarity measure for binary features (such as the Hamming distance). The main advantage of LSH is that the binary representation facilitates a more efficient search in the sense that one only needs to search nearby groups (or buckets) of binary vectors that are similar to the query binary feature. LSH can therefore be used for efficient ANN search to save both time and space [3]. A detailed review of LSH methods can be found in [14]. In this paper we introduce a novel ANN-based solution to computationally improve template-based face recognition in terms of both speed and space requirements. Our method first uses an ANN engine to find nearest-image neighbors for each image in a query template. Based on the identities of the subjects of nearest-image neighbors, we construct a pool of candidate templates. Finally, we reject all other templates and only compute similarity scores between the query template and candidate template pool. We show that the proposed method provides significant speed-up without degrading the recognition performance. The remainder of this paper is organized as follows. Section II briefly reviews ANN and image-based face recognition systems. In Section III we introduce our ANN-based method for improving the computational complexity of template-based face recognition approaches that use score fusion. Experimental results are introduced in Section IV. Section V concludes the paper and provides directions for future research.

Algorithm 1: ANN Search Engine

cosineDistance(x, y) = 1 − cosineSimilarity(x, y) where

(1)

Function E:index(g): Input : g, a real-value feature Output: b, a hashed binary feature

2

b ← h(g) % index a feature; Function E:enrollItem( g, i ): Input : g, a real-value feature Input : i, item associated with g

3

4 5 6 7 8

9 10 11 12

13 14 15 16

17 18 19

b ← E :index(g) % index a feature; associate b with item i; Function E:build(): prepare hashing tables for all enrolled items Function E:featDist(g, q): Input : g, a real-value feature Input : q, a real-value feature Output: d, approximated distance of ρf (g, q) bg ← E:index(g) ; bq ← E:index(q) ; d ← ρb (bg , bq ) Function E:kNeighbors(q, k): Input : q, a real-value feature Input : k, the number of retrievals Output: k nearest items and corresponding distances b ← E:index(q) % index a feature; compute distance for b and all index features in E; get the k nearest items; Function E:rRadius(q, t): Input : q, a real-value feature Input : t, the distance threshold Output: r nearest items and corresponding distances b ← E:index(q) % index a feature; compute distance for b and all index features in E; get the nearest items within distance r;

cosineSimilarity(x, y) = cos(θ) =

x·y kxkkyk

(2)

and x and y are two face feature vectors.

II. BACKGROUND Regardless of its detailed implementation, a minimal ANN image search engine E typically supports the methods described in Algorithm 1. It is worth noting that E:featDist() in ANN is not exact, because an ANN measures similarity between binary hashes ρb (·, ·) to approximate the similarity of real features ρf (·, ·). Furthermore, E:index() often involves multiple hashing functions in order to improve the accuracy of approximation to the original feature space. For a detailed description of ANN search engines for large-scale data, the reader is referred to [13]. It is therefore straightforward to build a face recognition system using ANN methods and adapt it for image-based face search. In particular, we need to add the methods described in Algorithm 2 to an ANN engine, which preprocesses and extracts a feature vector from the face image, and associates this feature with a subject ID. Furthermore, we must provide methods to compute similarities and distances between feature vectors. For example, cosine distance and cosine similarity are often used, as shown in Equation (1)

1

III. C OMPUTATIONALLY E FFICIENT T EMPLATE -BASED FACE R ECOGNITION USING LSH F ORESTS In [1] we presented a novel multi-pose face recognition algorithm for template-based systems (e.g., IJB-A) using score fusion, where pairwise matching scores are computed between all image pairs in query and reference templates, and then score fusion is used to produce a query-reference templatepair score. In [1] the query template is compared against all reference templates in the dataset. As explained in Section I, the computational complexity of this brute-force approach is O(KN M ). Our objective is to develop an efficient face identification/search technique for these template-based systems without sacrificing the recognition accuracy obtained by brute-force search, while minimizing the storage footprint. As mentioned in Section I, a template is simply a collection of images and videos (or video frames) belonging to the same subject. Figure 1 shows example templates from IJB-A. The main difficulty in applying the image-based face search engine in Algorithm 2 to the template-based search is that the number of images in a template varies between one subject and another. Therefore, we cannot obtain a fixed-length feature vector representing a given subject without using any additional feature pooling technique. For example, in IJB-A, the average number of images per template is approximately 11.4, and

1425

Algorithm 2: Image-Based Face Search Engine 1

2 3 4

5 6 7

8 9 10 11

Function E:representation( I ): Input : I, an input face image Output: f , a face feature X ← preproc(I) %preprocess; f ← featex(X) %feature extraction; Function E:enrollImage(I, id): Input : I, an input face image Input : id, subject identification f ←E:representation(I) ; E:enrollItem(f ,id); Function E:queryImage(Q, k): Input : Q, an input face image Input : k, the retrieved number of most similar subjects Output: knnIds and knnScores, k retrieved ids and scores. q ←E:representation(Q) ; knnIds, knnDist←E:kNeighbors(q,k); convert all d ∈ knnDist via E:distToScore as knnScores; Function E:distToScore(d): Input : d, feature distance Output: s, similarity score

(a)

(b)

Fig. 1: Sample subject templates selected from IJB-A dataset. (a) Emma Waston and (b) Yoyo Ma. Images are cropped and resized for viewing purposes

templates with single images exist as well as images with tens of images. We propose to decompose the problem into three levels. First, we find the k  K nearest enrolled template for each image in the query template. Second, we construct a pool of candidate templates. Third, we compute similarity scores between the query template and each template in the constructed pool. During the subject enrollment process (i.e., adding subject’s template to the reference dataset) of the K subjects, we build an LSH forest [3] of l LSH trees. The total number of indexed ¯ , where M ¯ is the feature vectors is approximately T u K M average number of images in a template. The computational cost of retrieving the cl nearest-neighbors of a query feature vector is O(l(c + log T )), where c is a constant representing the minimum number of index items used for comparison, irrespective of the shape of the LSH forest. Upon receiving a query template that contains N images, we retrieve the nearest-neighbor images for each image in the query template. The computational cost of this operation is therefore O(N l(c + log T )). Unique IDs of the reference templates to which the retrieved images belong are pooled into a candidate reference template pool of size k. In addition, the computational cost of computing the similarity between

N query template images and each image in a single nearestneighbor template is O(N M ), for a total of O(clN M ). The total retrieval and similarity cost is therefore O(N l(c+log T )+ clN M )  O(KN M ). In Section IV we provide an experimental evaluation of the recognition accuracy l, c and k. In order to compute the similarity score between the query template and each of the templates in the candidates pool, we use our multi-pose deep learning face recognition approach proposed in [1]. We use an image representation learned from a convolutional neural network. An input face image is represented by a 4000D real-valued feature vector. The similarity between pairs of feature vectors is computed using cosine similarity as shown in Equation 2. The template-wise similarity score is computed by fusing image-pair scores. There are many ways of performing score fusion — e.g., max and softmax. When we fuse scores using max, the templatewise similarity is determined by the most similar image pair from all pairs of images in a query template and a gallery template. This gives the exact same results as if we had first computed all template-wise similarity scores and then selected the k most similar gallery templates. This is because if a gallery template G is among the k nearest-neighbors of a query template Q, G must be among the k nearest-neighbors of at least one query image in Q. In fact, as long as a gallery template is in the candidate pool, the proposed solution will compute its template-wise similarity score. Fusing the image-pair similarity scores for the k candidate gallery templates produces k template-wise similarity scores si ∈ {s1 , s2 , . . . , sk }. For evaluation purposes, the similarity score between the query template and reference templates excluded from the candidate pool is set to 0. We then use softmax to fuse candidate template scores, as shown in Equation (3), where α = 10 is a positive scalar.  Pk s exp(αs )  i i S = softmax {si }i=1···m = Pi=1 k exp(αs ) i i=1

(3)

This approach can be implemented as shown in Algorithm 3. Method E:kTemplateNeighbors() (line 14 in Algorithm 3) is a naive example for explanation purposes. In this implementation, we reuse the ANN’s E:kNeighbors() method and keep increasing the number of required neighbors when retrieving image-level neighbors from the engine until k unique templates are found. However, one can easily improve the efficiency of this method by replacing the stop criterion of the E:kNeighbors() method — from criterion found k neighbors to criterion found k templates. Method E:templateDist(), is where score fusion occurs, and E:scoreFunction() is an abstract function where various fusion schemes could be adopted. Finally, since E:kTemplateNeighbors() retrieves template neighbors for given images, using E:kTemplateNeighbors() to retrieve neighbors of all images in a query template is easily parallelizable (see line 7 Algorithm 3). As mentioned earlier, E:queryTemplate() in Algorithm 3 is implemented such that we can use multiple threads to speed up the query process. However, we are only interested in k

1426

template neighbors, while the candidate pool composed by k template neighbors after querying for each image on an individual thread will be much larger than k. When only a single thread is available, one can use E:rRadius() to retrieve items whose feature distance is below a given threshold, and this threshold can be updated after retrieving gallery templates for every image in a query template. Algorithm 4 sketches this strategy. This way, we will obtain the exact k template neighbors. Because this strategy requires sequentially updating the radius threshold, it cannot be used in parallel computation.

Algorithm 3: Template-based Face Search Engine 1

2 3 4 5

6 7 8

IV. E XPERIMENTAL E VALUATION A. Dataset, Metrics and Baseline System We evaluated the proposed template-based face recognition system using the IJB-A dataset under the face identification protocol (i.e., 1 : K search2 ). Since IJB-A contains 10 splits, we evaluate the proposed approach on each split separately and summarize the performance across these splits. We use the standard accuracy metrics defined by IJB-A. These metrics are the true acceptance rates (TAR) at specific false acceptance rates (FAR) of 0.01, and 0.1, the retrieval rank at thresholds of 1, 5, and 10, as well as receiver operating characteristic (ROC) plots. It is worth noting that IJB-A was carefully designed to include challenging template pairs by ensuring that subjects of templates have the same gender, and that their skin colors do not differ more than one level. Detailed descriptions of the dataset, evaluation protocols and accuracy metrics can be found in [8]. To evaluate the computational efficiency improvements, we also report the template rejection rate (TRR), which is the number of gallery templates excluded from the candidate pool for a query template over the number of total gallery templates, as shown in Equation 4. k TRR = 1 − (4) K We only use the CPU for all-to-all matching to compute template-wise similarity scores. As a baseline for accuracy comparisons, we use our face recognition pipeline in [1]. More specifically, we use our pipeline labeled VGG19-AF in [1]. Finally, we evaluate the system’s performance against operational parameters l, c and k.

9 10 11 12 13 14

15 16 17 18 19 20 21 22 23 24 25

26 27 28 29 30 31 32 33 34

35 36 37 38 39 40 41

B. Results Figure 2 demonstrates the effect of varying different system parameters on retrieval accuracy (i.e., R1, R5 and R10). For each data point we average the system performance for all 10 splits of IJB-A. Clearly, the more LSH trees used, the more accurate the system becomes. This is expected, since the similarity approximation in the hashing space is proportional to the number of LSH trees. When we fix the c parameter, the more neighbors we use, the better the system performance. Similarly, when we fix the k parameter, the more candidates we evaluate, the better the system performance. 2 In IJB-A terminology, this is called 1 : N search, where N is the number of enrolled subject. In this paper, we use N to indicate the number of images in a template and K as the number of subjects. Therefore, we call it 1 : K search to avoid confusion

42 43 44 45

46

Function E:enrollTemplate(T, id): Input : T = {G1 , · · · , Gm }, a template with m images Input : id, associated subject id for j = 1..m do E:enrollImage(Gi , (id,j) ) % enroll each image; end Function E:queryTemplate(T, k): Input : T = {Q1 , · · · , Qn }, a query template with n images Input : k, the retrieved number of most similar subjects Output: knnIds and knnScores, k retrieved ids and scores. listIds← [] % initialize empty list; for j = 1..n do % obtain the k-nearest neighbors for each image (parallelizable); q ←E:representation(Q) ; kIds←E:kTemplateNeighbors(q,k); append (kIds) to listIds ; end knnIds, knnScores← E:templateRanking( listIds, T, k); Function E:kTemplateNeighbors(q, k): Input : q, a query image Input : k, the retrieved number of most similar subjects Output: kIds, k nearest template ids % just a straight-forward but inefficient implementation; j ← 2, c ← 0 %initialization; repeat j ← j + 1, m ← jk ; % find m most similar face images mImgIds, mImgDist← E :kNeighbors(q,m) ; mTempltIds←unique subject ids in mImgIds; mTempltDist←corresponding minimum dist in mImgDist; c ← the number of ids in mTempltIds; until c ≥ k; kIds← the smallest k template ids among mTempltIds; Function E:templateRanking( listIds, T,k ): Input : listIds, list of subject ids Input : T = {Q1 , · · · , Qn }, a query template with n images Input : k, the retrieved number of most similar subjects Output: knnIds, knnScores, list of k nearest template ids & scores lut← {} % initialize empty dictionary ; BQ ← all indexed features from T ; for id in listIds do s ← E:templateDist(id, BQ ) ; lut{id} ← s; end sort ids in lut w.r.t. values; top k subjects’ ids and values as knnIds, knnScores; Function E:templateDist(id, BQ ): Input : id, an enrolled template id Input : BQ = {bq,1 , · · · , bq,n }, a collection of n indexed features Output: s, fused template-wise similarity score listScores ← [] % initialize empty ; BG = {bg,1 , · · · , bg,m } % retrieve indexed features belong to gallery template of id; for j = 1..m do for i = 1..n do d ← ρb (bg,j , bq,i ); s ← E :distToScore(d); append s to listScores; end end s ← E :scoreFusion(listScores); Function E:scoreFusion(listScores): Input : listScores, list of similarity scores Output: S, a fused score % place holder to fuse a list of score to a single score;

In terms of execution time and disk storage, we list comparison results in Table I, where we fixed the parameters k and c to 30 and 50, respectively. Reported statistics again are those averaged from all testing splits. As explained in the theoretical discussions of algorithmic complexity and storage, execution time and storage space are both nearly linearly dependent on the number of LSH trees.

1427

TABLE I: Execution time and storage comparison.

Algorithm 4: Query Template Using a Single Thread 1

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17

Expt. baseline l=10 l=20 l=50 l=100 l=200

Function E:queryTemplate(T, k): Input : T = {Q1 , · · · , Qn }, a template with n images Input : k, the number of knn templates isFirst←True ; lut← {} ; for j = 1..n do q ←E:representation(Q) ; if isFirst : isFirst←False ; kIds,kDist←E:kTemplateNeighbors’(q,k); t ← max( kDist ); update lut using ( key, value ) = (kIds kDist ); else: % find all template neighbors within distance t rIds,rDist←E:kTemplateRadius(q,t); update lut using ( key, value ) = (rIds rDist ); sort lut according to value and only keep the smallest k items; t ← max( value in lut) ; end knnIds, knnScores← E:templateRanking( listIds, T, k);

c = 50

Time (hh:mm:ss) 1:27:31 0:04:31 0:05:26 0:13:00 0:25:04 0:39:36

Storage (Mb) 132.0 0.16 0.32 0.82 1.64 3.27

summarizes the performance of the baseline system and the proposed LSH forest-based system with this parameter setting. The table shows that the proposed ANN system achieves face recognition accuracy comparable to the baseline system, which uses all-to-all matching. This is mainly because the proposed method rejects the majority of reference templates, without computing template-wise similarities.

k = 10

TABLE II: Face recognition performance before and after using the proposed ANN search (l = 50, k = 10, c = 50). METRICS TAR@FAR=0.1% TAR@FAR=1% FAR@TAR=85% RANK@1 RANK@5 RANK@10 TRR%

Baseline System min max med mean 62.2% 68.6% 66.1% 65.8% 80.9% 84.5% 83.5% 83.3% 1.1% 1.9% 1.3% 1.4% 75.2% 79.4% 78.0% 77.9% 86.9% 89.6% 88.5% 88.4% 89.5% 91.8% 91.1% 91.0% N/A N/A N/A N/A

Proposed ANN System min max med mean 62.4% 68.6% 66.1% 66.0% 81.5% 84.9% 83.7% 83.5% 1.0% 1.7% 1.3% 1.3% 75.7% 79.6% 78.47% 78.2% 87.3% 89.5% 89.1% 88.7% 89.2% 91.6% 90.7% 90.8% 84.1% 85.8% 85.2% 85.2%

To better understand the effects of the proposed ANN system, we also provide the genuine vs. impostor score distributions for both the baseline system and the proposed ANN system in Figure 3. We can see that the genuine distribution of the proposed ANN system is very similar to that of the baseline system, indicting that our proposed solution does not eliminate potentially similar subject templates, and they all survive until we compute template-wise similarity scores. In contrast, the impostor distribution changes significantly in the way that many non-zero impostor scores in the baseline system are suppressed to zeros in the proposed system. More precisely, 97.5% of impostor scores are suppressed, implying that we significantly reduced the number of unnecessary evaluations. This is expected because many unlikely subject templates are rejected early in the proposed system, and similarity scores will not be computed at all. Fig. 2: Accuracy performance of the proposed system under various parameter settings, namely l ∈ {10, 20, 50, 100, 200}, k ∈ {10, 30, 50} and c ∈ {10, 30, 50}. From top to bottom, the metrics used are Rank 1 (R1), Rank 5 (R5), and Rank 10 (R10), respectively. The left column fixes the parameter c to 50, while the right column fixes the parameter k to 10.

From the top right plot in Figure 2, we can see that a parameter combination of (l = 50, k = 10, c = 50) achieves approximately the same R10 performance as the brute-force baseline system of [1]. We use this parameter set to compare other accuracy metrics against the baseline system. Table II

V. C ONCLUSIONS We introduced an LSH forest-based solution for the template-based face recognition problem. It decomposes the template-based face recognition problem into three levels: 1) finding the nearest-neighbor for each image in a query template, 2) constructing a candidate template pool, and 3) computing the similarity score only for the surviving templates. Experimental evaluations on the recently released templatebased IJB-A show that the proposed approach achieves significant computational and space savings without sacrificing recognition accuracy.

1428

(a)

(b)

Fig. 3: Sample genuine vs. impostor distributions of the baseline and proposed system on split 1. (a) baseline. (b) proposed ANN system (l = 50, k = 10, c = 50). Note: to unify the percentile range for both figures, the percentile for the impostor class at score 0.0 in (b) is truncated, and its original value is 0.975.

ACKNOWLEDGEMENT

[11] A. V. Savchenko. Face recognition in real-time applications: A comparison of directed enumeration method and kd trees. In Perspectives in Business Informatics Research, pages 187–199. Springer, 2012. [12] M. Slaney and M. Casey. Locality-sensitive hashing for finding nearest neighbors [lecture notes]. Signal Processing Magazine, IEEE, 25(2):128– 131, 2008. [13] A. Torralba, R. Fergus, and W. T. Freeman. 80 million tiny images: A large data set for nonparametric object and scene recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 30(11):1958– 1970, 2008. [14] J. Wang, H. T. Shen, J. Song, and J. Ji. Hashing for similarity search: A survey. arXiv preprint arXiv:1408.2927, 2014. [15] J. Yang, P. Ren, D. Chen, F. Wen, H. Li, and G. Hua. Neural aggregation network for video face recognition. arXiv preprint arXiv:1603.05474, 2016. [16] Z. Zeng, T. Fang, S. Shah, and I. A. Kakadiaris. Local feature hashing for face recognition. In Proceedings of the 3rd IEEE International Conference on Biometrics: Theory, Applications and Systems, BTAS’09, pages 119–126, Piscataway, NJ, USA, 2009. IEEE Press. [17] W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld. Face recognition: A literature survey. ACM Comput. Surv., 35(4):399–458, Dec. 2003.

This research is primarily based on work supported by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Agency (IARPA), via grant 2014-14071600011. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of ODNI, IARPA, or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for governmental purposes, notwithstanding any copyright annotation thereon. We thank the NVIDIA Corporation for its donation of the Tesla K40 GPU. R EFERENCES [1] W. AbdAlmageed, Y. Wu, S. Rawls, S. Harel, T. Hassner, I. Masi, J. Choi, J. Lekust, J. Kim, P. Natarajan, R. Nevatia, and G. Medioni. Face recognition using deep multi-pose representations. In Proceedings of IEEE Winter Conference on Applications of Computer Vision (WACV), Lake Placid, NY, 2016. IEEE Computer Society, IEEE Computer Society. [2] T. Baltrusaitis, P. Robinson, and L.-P. Morency. Constrained local neural fields for robust facial landmark detection in the wild. In Proceedings of the 2013 IEEE International Conference on Computer Vision Workshops, ICCVW ’13, pages 354–361, Washington, DC, USA, 2013. IEEE Computer Society. [3] M. Bawa, T. Condie, and P. Ganesan. Lsh forest: self-tuning indexes for similarity search. In Proceedings of the 14th international conference on World Wide Web, pages 651–660. ACM, 2005. [4] Q. Cao, Y. Ying, and P. Li. Similarity metric learning for face recognition. In Proceedings of the IEEE International Conference on Computer Vision, pages 2408–2415, 2013. [5] E. Eidinger, R. Enbar, and T. Hassner. Age and gender estimation of unfiltered faces. Information Forensics and Security, IEEE Transactions on, 9(12):2170–2179, 2014. [6] T. Hassner, S. Harel, E. Paz, and R. Enbar. Effective face frontalization in unconstrained images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 4295–4304, 2015. [7] Z. Huang, R. Wang, S. Shan, and X. Chen. Face recognition on largescale video in the wild with hybrid euclidean-and-riemannian metric learning. Pattern Recognition, 48(10):3113–3124, 2015. [8] B. F. Klare, B. Klein, E. Taborsky, A. Blanton, J. Cheney, K. Allen, P. Grother, A. Mah, M. Burge, and A. K. Jain. Pushing the frontiers of unconstrained face detection and recognition: Iarpa janus benchmark a. In Computer Vision and Pattern Recognition (CVPR), 2015 IEEE Conference on, pages 1931–1939. IEEE, 2015. [9] H. Li, Z. Lin, X. Shen, J. Brandt, and G. Hua. A convolutional neural network cascade for face detection. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2015. [10] A. RoyChowdhury, T.-Y. Lin, S. Maji, and E. Learned-Miller. Face identification with bilinear cnns. arXiv preprint arXiv:1506.01342, 2015.

1429

Computationally Efficient Template-Based Face ... - IEEE Xplore

head poses, illuminations, ages and facial expressions. Template images could come from still images or video frames. Therefore, measuring the similarity ...

3MB Sizes 0 Downloads 360 Views

Recommend Documents

Energy-Efficient Opportunistic Interference Alignment - IEEE Xplore
Abstract—We introduce an energy-efficient distributed op- portunistic interference alignment (OIA) scheme that greatly improves the sum-rates in multiple-cell ...

IEEE Photonics Technology - IEEE Xplore
Abstract—Due to the high beam divergence of standard laser diodes (LDs), these are not suitable for wavelength-selective feed- back without extra optical ...

Energy Efficient Content Distribution in an ISP Network - IEEE Xplore
The content data is delivered towards the clients following a path on the tree from the root, i.e., the Internet peering point. A storage cache can be located at each node of the network, providing a potential facility for storing data. Moreover, cac

Bandwidth-Efficient WDM Channel Allocation for Four ... - IEEE Xplore
52, NO. 12, DECEMBER 2004. Bandwidth-Efficient WDM Channel Allocation for. Four-Wave Mixing-Effect Minimization. Vrizlynn L. L. Thing, P. Shum, and M. K. ...

Efficient MR Inhomogeneity Correction by Regularized ... - IEEE Xplore
Magnetic Resonance (MR) images usually exhibit intensity inhomogeneity (bias field) due to non-uniformity generated from RF coils or radiation-patient ...

An Energy Efficient Multi-channel MAC Protocol for ... - IEEE Xplore
Department of Computer Engineering, Kyung Hee University, 449-701, ... Department of Electronics and Communications Engineering, Kwangwoon University, ...

A Gram-Based String Paradigm for Efficient Video ... - IEEE Xplore
Mar 13, 2013 - semination of video data has created an urgent demand for the large-scale ... video sequence, retrieval is performed by transforming the query.

Efficient Multiple Hypothesis Tracking by Track Segment ... - IEEE Xplore
Burlington, MA, USA. {chee.chong, greg.castanon, nathan.cooprider, shozo.mori balasubramaniam.ravichandran}@baesystems.com. Robert Macior. Air Force ...

An Efficient Geometric Algorithm to Compute Time ... - IEEE Xplore
An Efficient Geometric Algorithm to Compute Time-optimal trajectories for a Car-like Robot. Huifang Wang, Yangzhou Chen and Philippe Sou`eres.

Efficient Estimation of Critical Load Levels Using ... - IEEE Xplore
4, NOVEMBER 2011. Efficient Estimation of Critical Load Levels. Using Variable Substitution Method. Rui Bo, Member, IEEE, and Fangxing Li, Senior Member, ...

Efficient Pattern Matching Algorithm for Memory ... - IEEE Xplore
intrusion detection system must have a memory-efficient pat- tern-matching algorithm and hardware design. In this paper, we propose a memory-efficient ...

wright layout - IEEE Xplore
tive specifications for voice over asynchronous transfer mode (VoATM) [2], voice over IP. (VoIP), and voice over frame relay (VoFR) [3]. Much has been written ...

Device Ensembles - IEEE Xplore
Dec 2, 2004 - time, the computer and consumer electronics indus- tries are defining ... tered on data synchronization between desktops and personal digital ...

wright layout - IEEE Xplore
ACCEPTED FROM OPEN CALL. INTRODUCTION. Two trends motivate this article: first, the growth of telecommunications industry interest in the implementation ...

A Peak Power Efficient Cooperative Diversity Using Star ... - IEEE Xplore
Abstract—In this paper, we propose a new simple relaying strategy with bit-interleaved convolutionally coded star quadra- ture amplitude modulation (QAM).

Tree Filtering: Efficient Structure-Preserving Smoothing ... - IEEE Xplore
Dec 17, 2013 - Linchao Bao, Yibing Song, Qingxiong Yang, Member, IEEE, Hao Yuan, and Gang ... joint filtering, minimum spanning tree, structure-preserving.

Efficient Computation of Transfer Function Dominant ... - IEEE Xplore
Jan 12, 2006 - and produce good modal equivalents automatically, without any ... modal equivalents, model reduction, poorly-damped oscillations,.

Efficient Computation of Transfer Function Dominant ... - IEEE Xplore
Jan 12, 2006 - dominant poles of a high-order scalar transfer function. The al- gorithm ... power system dynamics, small-signal stability, sparse eigenanal-.

Evolutionary Computation, IEEE Transactions on - IEEE Xplore
search strategy to a great number of habitats and prey distributions. We propose to synthesize a similar search strategy for the massively multimodal problems of ...

PACE: Pattern Accurate Computationally Efficient ... - GitHub
More generally, disclosure of software vulnerabilities falls into three categories: ... and “off-the-shelf” tools are used to identify and classify vulnerability entities.

I iJl! - IEEE Xplore
Email: [email protected]. Abstract: A ... consumptions are 8.3mA and 1.lmA for WCDMA mode .... 8.3mA from a 1.5V supply under WCDMA mode and.

Gigabit DSL - IEEE Xplore
(DSL) technology based on MIMO transmission methods finds that symmetric data rates of more than 1 Gbps are achievable over four twisted pairs (category 3) ...

IEEE CIS Social Media - IEEE Xplore
Feb 2, 2012 - interact (e.g., talk with microphones/ headsets, listen to presentations, ask questions, etc.) with other avatars virtu- ally located in the same ...