Ssd-6d: Making rgb-based 3d detection and 6d pose estimation great again

W Kehl, F Manhardt, F Tombari… - Proceedings of the …, 2017 - openaccess.thecvf.com
We present a novel method for detecting 3D model instances and estimating their 6D poses
from RGB data in a single shot. To this end, we extend the popular SSD paradigm to cover …

Ocular biometrics in the visible spectrum: A survey

A Rattani, R Derakhshani - Image and Vision Computing, 2017 - Elsevier
Ocular biometrics encompasses the imaging and use of characteristic features extracted
from the eyes for personal recognition. Ocular biometric modalities in visible light have …

The fall of one, the rise of many: a survey on multi-biometric fusion methods

LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …

Towards contactless palmprint recognition: A novel device, a new benchmark, and a collaborative representation based identification approach

L Zhang, L Li, A Yang, Y Shen, M Yang - Pattern Recognition, 2017 - Elsevier
Biometric authentication has been found to be an effective method for recognizing a
person's identity with a high confidence. In this field, the use of palmprint represents a recent …

Multi-biometric template protection based on homomorphic encryption

M Gomez-Barrero, E Maiorana, J Galbally, P Campisi… - Pattern Recognition, 2017 - Elsevier
In spite of the advantages of biometrics as an identity verification technology, some concerns
have been raised due to the high sensitivity of biometric data: any information leakage …

Overview of the combination of biometric matchers

A Lumini, L Nanni - Information Fusion, 2017 - Elsevier
Biometric identity verification refers to technologies used to measure human physical or
behavioral characteristics, which offer a radical alternative to passports, ID cards, driving …

Matching software-generated sketches to face photographs with a very deep CNN, morphed faces, and transfer learning

C Galea, RA Farrugia - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Sketches obtained from eyewitness descriptions of criminals have proven to be useful in
apprehending criminals, particularly when there is a lack of evidence. Automated methods to …

Security keys: Practical cryptographic second factors for the modern web

J Lang, A Czeskis, D Balfanz, M Schilder… - … Cryptography and Data …, 2017 - Springer
Abstract “Security Keys” are second-factor devices that protect users against phishing and
man-in-the-middle attacks. Users carry a single device and can self-register it with any …

Evaluación de las respuestas emocionales a la publicidad televisiva desde el Neuromarketing= Evaluation of Emotional Responses to Television Advertising through …

A Baraybar, M Baños, Ó Barquero, R Goya… - … de Comunicación y …, 2017 - torrossa.com
Desde el siglo pasado hemos presenciado una evolución constante de las técnicas de
comunicación publicitarias en un intento de adaptación a las nuevas realidades sociales …

Evaluation of emotional responses to television advertising through neuromarketing

A Baraybar-Fernández, M Baños-González… - … : Revista Científica de …, 2017 - educa.fcc.org.br
Evaluación de las respuestas emocionales a la publicidad televisiva desde el
Neuromarketing | Evaluation of Emotional Responses Page 1 Evaluación de las respuestas …