Fusion of audio and video information for multi modal person authentication
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this thesis, we address the problem of face modelling by using dedicated statistical generative models, with an application to the face authentication task. Face authentication consists in either accepting or rejecting a user's claim supported by its fa ...
Speaker detection is an important component of a speech-based user interface. Audiovisual speaker detection, speech and speaker recognition or speech synthesis for example find multiple applications in human-computer interaction, multimedia content indexin ...
In this paper, a novel statistical generative model to describe a face is presented, and is applied on the face authentication task. Classical generative models used so far in face recognition, such as Gaussian Mixture Models (GMM) and Hidden Markov Models ...
This paper presents a new method for evaluating product designs at their early stage of development according to different criteria and a case-study-based project. The goal is to select among imprecisely defined design alternatives in a multicriteria conte ...
Floods are not only due to fatality. It is the responsibility of the human being to protect himself from heavy damages due to natural elements, and he sometimes has the chance to profit from a given situation to influence events. One of these possibilities ...
This paper focuses on the estimation of credence in the correctness of classification decisions produced by a biometric identity verification system. We adopt the concept of decision credence defined in terms of subjective Bayesian degree of belief. We dem ...
This document provides a methodical investigation of the main assessment steps that have led to the construction of Eurotunnel and it compares the results of the analyses that were achieved before the key decisions with the results of studies that have bee ...
Biometric authentication can be cast as a signal processing and statistical pattern recognition problem. As such, it relies on models of signal representations that can be used to discriminate between classes. One of the assumptions typically made by the p ...
The principal objective of this thesis is to investigate approaches toward a robust automatic face authentication (AFA) system in weakly constrained environments. In this context, we develop new algorithms based on local features and generative models. In ...
It has been previously demonstrated that systems based on Hidden Markov Models (HMMs) are suitable for face recognition. The proposed approaches in the literature are either HMMs with one-dimensional (1D-HMMs) or two-dimensional (2D-HMMs) topology. Both ha ...