Baptiste Hemery

ORCID: 0000-0003-3923-1829
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biometric Identification and Security
  • Advanced Image and Video Retrieval Techniques
  • User Authentication and Security Systems
  • Image Retrieval and Classification Techniques
  • Peer-to-Peer Network Technologies
  • Face recognition and analysis
  • Robotics and Sensor-Based Localization
  • Complex Network Analysis Techniques
  • Blockchain Technology Applications and Security
  • Face and Expression Recognition
  • Digital Platforms and Economics
  • FinTech, Crowdfunding, Digital Finance
  • Gait Recognition and Analysis
  • Visual Attention and Saliency Detection
  • Privacy, Security, and Data Protection
  • Advanced Steganography and Watermarking Techniques
  • Spam and Phishing Detection
  • Advanced Neural Network Applications
  • Distributed and Parallel Computing Systems
  • Gaze Tracking and Assistive Technology
  • Domain Adaptation and Few-Shot Learning
  • Manufacturing Process and Optimization
  • Video Surveillance and Tracking Methods
  • Assembly Line Balancing Optimization
  • Banking stability, regulation, efficiency

Orange (France)
2020-2022

National Taiwan University
2021

University of Ottawa
2020

Graz University of Technology
2020

Poznań University of Technology
2020

Normandie Université
2014-2015

GREYC
2009-2015

École Nationale Supérieure d'Ingénieurs de Caen
2011-2015

Centre National de la Recherche Scientifique
2009-2015

Université de Caen Normandie
2009-2015

Biometric authentication methods are being increasingly used for many types of applications. Since such necessitate humans to interact with a device, effective implementation requires consideration the perceptions and responses end users. Towards this goal, we present in paper modality-independent evaluation methodology study users' acceptance satisfaction biometric systems. It is based on use questionnaire some data mining tools analysis. We have applied it two systems developed our...

10.1109/ccst.2010.5678678 preprint EN 2010-10-01

We propose in this paper a low cost multimodal biometric system combining keystroke dynamics and 2D face recognition. The objective of the proposed is to be used while keeping mind: good performances, acceptability, espect privacy. Different fusion methods have been (min, max, mul, svm, weighted sum configured with genetic algorithms, and, programming) on scores three algorithms two recognition ones. This improves rate comparison each individual method. On chimeric database composed 100...

10.1109/icpr.2010.282 preprint EN 2010-08-01

Mobile Money Transfer (MMT) services provided by mobile network operators enable funds transfers made on devices of end-users, using digital equivalent cash (electronic money) without any bank accounts involved. MMT simplifies banking relationships and facilitates financial inclusion, and, therefore, is rapidly expanding all around the world, especially in developing countries. systems are subject to same controls as those required for institutions, including detection Laundering (ML) - a...

10.1109/ares.2014.10 preprint EN 2014-09-01

Mobile payments become more and popular thus are very attractive targets for fraudsters. As the latter always find new ways to commit crimes avoid detection, research in field of fraud is evolving. However, transactional data feedback from existing services lacking. This article addresses this issue by proposing a synthetic generator. Our idea model behavior various actors generate testing that researchers can use evaluate approaches identifying fraudulent transactions. paper presents our...

10.1109/cts.2013.6567225 article EN 2013-05-01

This paper presents a modality-independent evaluation methodology to study users’ acceptance and satisfaction of biometric systems. It uses survey questionnaire for data collection, some data-mining tools their analysis. We have applied it on two systems developed in our research laboratory. The results from this show the necessity taking point view when designing evaluating A panel 100 volunteers was more satisfied keystroke system than face one. Users surprisingly considered that its...

10.1504/ijbm.2012.047644 article EN International Journal of Biometrics 2012-01-01

This paper presents an overview of a first-year PhD thesis. The main idea can be expressed as community detection issue in real network containing data from telecommunications operator. More precisely, mobile money transactions will studied, with view to detecting fraudulent ones. For this purpose, we propose address the problem by studying different approaches. Indeed, network, communities are constituted between users sharing common habits, therefore may appear unusual behaviors....

10.1109/snams52053.2020.9336578 article EN 2020-12-14

This paper deals with a comparative study of metrics allowing the evaluation results provided by object localization algorithms. We particularly focus on bounding box representation. 26 are studied in this paper. A protocol is presented for creation ground truths and synthetic These permit to simulate several inaccuracies (translation, scale errors... ) behaviors face considered alterations. Finally, some conclusions perspectives given.

10.1109/icig.2007.118 article EN 2007-08-01

We propose in this paper to study different color spaces for representing an image the face authentication application. used a generic algorithm based on matching of keypoints using sift descriptors computed one component. Ten have been studied four large and significant benchmark databases (ENSIB, FACES94, AR FERET). show that all do not provide same efficiency use information allows interesting improvement verification results.

10.1109/icpr.2010.311 preprint EN 2010-08-01

We propose in this paper a new evaluation metric that enables to quantify the quality of an image interpretation result.This takes into account priori knowledge used by algorithm and ground truth associated with original image.We combine two metrics evaluate localization recognition results each detected object.We show proposed fulfills some theoretical properties has correct behavior face empirical experiments on benchmark database.We think could be reliable reference for video...

10.1109/icip.2009.5413548 preprint EN 2009-11-01

This paper analyzes the benefit and limitations of using a particular biometric technology "namely face authentication" for banking applications. We present first general concepts banking. propose method in order to replace PIN code authentication by biometrics data. Biometric is then detailed. A recognition we developed presented revealing as itself candidate solution. show limits this approach be used real industrial context.

10.1109/achi.2008.17 preprint EN 2008-01-01

Many object descriptors have been proposed in the state of art. For many reasons (occlusion, point view, acquisition conditions...), local a better robustness for image understanding applications. The goal this paper is to make comparative study eight recent descriptors. objective here quantify their ability generate automatically an taxonomy. In order answer question, we use Caltech256 benchmark which provides large taxonomy used as reference. This shows that SIFT, differential invariants...

10.1109/icig.2009.38 preprint EN 2009-09-01

One of the main factors affecting performance biometric systems is quality acquired samples. Poor-quality samples increase enrollment failure, and decrease system performance. Therefore, it important for a to estimate Toward this goal, we present in paper multi-class SVM-based method predict sample quality. The proposed uses two types information: first one based on image second pattern-based using SIFT keypoints extracted from image. For experiments, use four large significant face...

10.1109/cibim.2011.5949212 preprint EN 2011-04-01

We present in this paper a comparative study of invariant descriptors for face recognition. Despite their multiple advantages (pose and scale characterization), few methods from the state art exploit kind features. A support vector machine is used training recognition steps. Experimental results show efficiency such on AR database. With proposed method, correctly achieved 97.4% cases

10.1109/icosp.2006.345723 preprint EN 2006-01-01

Networks have provided a representation for wide range of real systems, including communication flow, money transfer or biological to mention just few. Communities represent fundamental structures understanding the organization real-world networks. Uncovering coherent groups in these networks is goal community detection. A mesoscopic structure with nodes heavily connected within their by comparison other groups. might also overlap as they may share one multiple nodes. Evaluating results...

10.1109/lcn53696.2022.9843473 article EN 2022-08-26
Coming Soon ...