Publications:Evaluation Protocol for the DXM2VTS Database and Performance Comparison of Face Detection and Face Tracking on Video

From ISLAB/CAISR
Revision as of 11:01, 27 June 2014 by Slawek (talk | contribs) (Created page with "<div style='display: none'> == Do not edit this section == </div> {{PublicationSetupTemplate|Author=Dereje Teferi, Josef Bigun |PID=728430 |Name=Teferi, Dereje [dete] (Högsko...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Do not edit this section

Property "Publisher" has a restricted application area and cannot be used as annotation property by a user. Property "Author" has a restricted application area and cannot be used as annotation property by a user. Property "Author" has a restricted application area and cannot be used as annotation property by a user.

Keep all hand-made modifications below

Title Evaluation Protocol for the DXM2VTS Database and Performance Comparison of Face Detection and Face Tracking on Video
Author
Year 2009
PublicationType Book Chapter
Journal
HostPublication Proceedings SSBA '09 : Symposium on Image Analysis, Halmstad University, Halmstad, March 18-20, 2009
Conference
DOI
Diva url http://hh.diva-portal.org/smash/record.jsf?searchId=1&pid=diva2:728430
Abstract

Video databases and their corresponding evaluation protocols are used to compare classifiers, such as face detection an tracking. In this paper, a six level evaluation protocol for the Damascened XM2VTS (DXM2VTS) database is presented to measure face detection and tracking performance. Additionally, a novel database containing thousands of videos is created by combining video from the XM2VTS database with a set of newly recorded standardized real-life video used as background and with several realistic degradations, such as motion blur, noise, etc. Moreover, two publicly available and published face detection algorithms, are tested on the six suggested difficulty levels of the protocol. Their performance on video in terms of false acceptance, false rejection, correct detection, and repeatability, are reported and conclusions are drawn.