• Aucun résultat trouvé

Invited Talk: Deep Learning in Biometry

N/A
N/A
Protected

Academic year: 2022

Partager "Invited Talk: Deep Learning in Biometry"

Copied!
1
0
0

Texte intégral

(1)

Deep Learning in Biometry

Peter Peer

Computer Vision Laboratory

Faculty of Computer and Information Science University of Ljubljana

Veˇcna pot 113, 1000 Ljubljana, Slovenia peter.peer@fri.uni-lj.si

Abstract

In the recent years we are witnessing a dominance of deep neural net- work learning approach in the machine learning field. Eventhough the neural network concept is more than 50 years old, only the recent developments enabled its wide use. Namely, availability of process- ing power, especially graphical processing units, availability of large databases, and the refined knowledge about the approach itself. Con- volutional neural network as a special case of deep learning approach is widely used in computer vision domain, also in biometry. A lot of image material is obtained through surveillance scenarios, where we can use modalities like face, gait, and ears for recognition, normally within a multibiometrics system. Each modality has to be first de- tected and then recognized. The following examples are discussed in this context: 1) network for ear detection in the wild, where, different from competing techniques from the literature, our approach does not simply return a bounding box around the detected ear, but provides accurate and detailed, pixel-wise information about the location of the ears in the image; 2) training network with limited training data for ear recognition in the wild, where we explore different strategies towards model training with limited amounts of training data and show that by selecting an appropriate model architecture, using aggressive data aug- mentation, and selective learning on existing (pre-trained) models, we are able to learn an effective model; 3) face deidentification (anonymiza- tion) with generative network that provides privacy guaranties and at the same time retains certain important characteristics of the data even after deidentification.

Copyrightc by the paper’s authors. Copying permitted for private and academic purposes.

In: A. Editor, B. Coeditor (eds.): Proceedings of the XYZ Workshop, Location, Country, DD-MMM-YYYY, published at http://ceur-ws.org

1

Copyrightc 2017 by the paper’s authors. Copying permitted for private and academic purposes.

In: S. H¨olldobler, A. Malikov, C. Wernhard (eds.): YSIP2 – Proceedings of the Second Young Scientist’s International Workshop on Trends in Information Processing, Dombai, Russian Federation, May 16–20, 2017, published at http://ceur-ws.org.

15

Références

Documents relatifs

En l'absence du lubrifiant, le test laisse sur le chrome une trace continue assez importante tant en longueur qu'en profondeur. L'usure du chrome est plus

– Convolution layers & Pooling layers + global architecture – Training algorithm + Dropout Regularization.. • Useful

Generally worse than unsupervised pre-training but better than ordinary training of a deep neural network (Bengio et al... Supervised Fine-Tuning

Here we present a deep learning framework for the prediction of the quantum mechanical wavefunction in a local basis of atomic orbitals from which all other ground-state properties

Contrary to the lack of clearly supported species clusters in the sequence analyses, the AFLP markers resolved the phylogeny with higher bootstrap and clade credibility support.

The algorithm has been incremented in an Smart Investment model that simulates the human brain with reinforcement learning for fast decisions, deep learning to memo- rize

In the paper, the authors took an attempt to briefly describe their experience in organizing work with data analysis using neural networks and machine

The proposed intrusion detection systems considers a general type of an attack scenario where malicious packets are injected into a SCADA network system composed of a