Abdenour Hadid

ORCID: 0000-0001-9092-735X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Face recognition and analysis
  • Face and Expression Recognition
  • Biometric Identification and Security
  • Image Retrieval and Classification Techniques
  • Digital Media Forensic Detection
  • Emotion and Mood Recognition
  • Advanced Image and Video Retrieval Techniques
  • Video Surveillance and Tracking Methods
  • Human Pose and Action Recognition
  • Generative Adversarial Networks and Image Synthesis
  • Anomaly Detection Techniques and Applications
  • User Authentication and Security Systems
  • Gait Recognition and Analysis
  • Speech and Audio Processing
  • COVID-19 diagnosis using AI
  • Time Series Analysis and Forecasting
  • Advanced Image Processing Techniques
  • Remote-Sensing Image Classification
  • Hand Gesture Recognition Systems
  • Infant Health and Development
  • Stock Market Forecasting Methods
  • Traffic Prediction and Management Techniques
  • Gaze Tracking and Assistive Technology
  • Medical Image Segmentation Techniques
  • Music and Audio Processing

Sorbonne University Abu Dhabi
2022-2025

Sorbonne Université
2022-2024

University of Oulu
2013-2022

École Centrale de Lille
2019-2022

Institut d'électronique de microélectronique et de nanotechnologie
2019-2022

Université de Lille
2019-2022

Centre National de la Recherche Scientifique
2019-2022

Université Polytechnique Hauts-de-France
2019-2022

Northwestern Polytechnical University
2016-2019

Centre de Développement des Technologies Avancées
2000

This paper presents a novel and efficient facial image representation based on local binary pattern (LBP) texture features. The face is divided into several regions from which the LBP feature distributions are extracted concatenated an enhanced vector to be used as descriptor. performance of proposed method assessed in recognition problem under different challenges. Other applications extensions also discussed.

10.1109/tpami.2006.244 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2006-10-30

Current face biometric systems are vulnerable to spoo ing attacks. A spoofing attack occurs when a person tries masquerade as someone else by falsifying data and thereby gaining illegitimate access. Inspired image quality assessment, characterization of printing artifacts, differences in light reflection, we propose approach the problem detection from texture analysis point view. Indeed, prints usually contain defects that can be well detected using features. Hence, present novel based on...

10.1109/ijcb.2011.6117510 article EN 2011-10-01

Research on non-intrusive software-based face spoofing detection schemes has been mainly focused the analysis of luminance information images, hence discarding chroma component, which can be very useful for discriminating fake faces from genuine ones. This paper introduces a novel and appealing approach detecting using colour texture analysis. We exploit joint colour-texture chrominance channels by extracting complementary low-level feature descriptions different spaces. More specifically,...

10.1109/tifs.2016.2555286 article EN IEEE Transactions on Information Forensics and Security 2016-04-20

The vulnerabilities of face-based biometric systems to presentation attacks have been finally recognized but yet we lack generalized software-based face attack detection (PAD) methods performing robustly in practical mobile authentication scenarios. This is mainly due the fact that existing public PAD datasets are beginning cover a variety scenarios and acquisition conditions their standard evaluation protocols do not encourage researchers assess generalization capabilities across these...

10.1109/fg.2017.77 article EN 2017-05-01

Research on face spoofing detection has mainly been focused analyzing the luminance of images, hence discarding chrominance information which can be useful for discriminating fake faces from genuine ones. In this work, we propose a new anti-spoofing method based color texture analysis. We analyze joint color-texture and channels using local binary pattern descriptor. More specifically, feature histograms are extracted each image band separately. Extensive experiments two benchmark datasets,...

10.1109/icip.2015.7351280 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2015-09-01

Abstract Human activity recognition (HAR) systems attempt to automatically identify and analyze human activities using acquired information from various types of sensors. Although several extensive review papers have already been published in the general HAR topics, growing technologies field as well multi-disciplinary nature prompt need for constant updates field. In this respect, paper attempts summarize progress computer vision perspective. Indeed, most applications such interaction,...

10.1007/s11042-020-09004-3 article EN cc-by Multimedia Tools and Applications 2020-08-15

The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks and number countermeasures is gradually increasing. Fairly good results have been reported on publicly available databases but it reasonable assume that there exists no superior anti-spoofing technique due varying nature attack scenarios acquisition conditions. Therefore, we propose approach as a set attack-specific subproblems are solvable with proper combination...

10.1109/btas.2013.6712690 article EN 2013-09-01

Recently deep Convolutional Neural Networks have been successfully applied in many computer vision tasks and achieved promising results. So some works introduced the learning into face anti-spoofing. However, most approaches just use final fully-connected layer to distinguish real fake faces. Inspired by idea of each convolutional kernel can be regarded as a part filter, we extract partial features from neural network (CNN) In our prosed approach, CNN is fine-tuned firstly on spoofing...

10.1109/ipta.2016.7821013 article EN 2016-12-01

The vulnerabilities of face biometric authentication systems to spoofing attacks have received a significant attention during the recent years. Some proposed countermeasures achieved impressive results when evaluated on intratests, i.e., system is trained and tested same database. Unfortunately, most these techniques fail generalize well unseen attacks, e.g., one database then another This major concern in antispoofing research that mostly overlooked. In this letter, we propose novel...

10.1109/lsp.2016.2630740 article EN IEEE Signal Processing Letters 2016-01-01

Abstract User authentication is an important step to protect information, and in this context, face biometrics potentially advantageous. Face natural, intuitive, easy use, less human-invasive. Unfortunately, recent work has revealed that vulnerable spoofing attacks using cheap low-tech equipment. This paper introduces a novel appealing approach detect the spatiotemporal (dynamic texture) extensions of highly popular local binary pattern operator. The key idea learn structure dynamics facial...

10.1186/1687-5281-2014-2 article EN cc-by EURASIP Journal on Image and Video Processing 2014-01-07

This paper presents a novel fully automatic bi-modal, face and speaker, recognition system which runs in real-time on mobile phone. The implemented Nokia N900 demonstrates the feasibility of performing both speaker We evaluate this publicly-available phone database provide well defined evaluation protocol. was captured almost exclusively using phones aims to improve research into deploying biometric techniques devices. show, database, that can be performed environment score fusion...

10.1109/icmew.2012.116 article EN IEEE International Conference on Multimedia and Expo workshops 2012-07-01

Biometrics already form a significant component of current and emerging identification technologies. systems aim to determine or verify the identity an individual from their behavioral and/or biological characteristics. Despite progress, some biometric fail meet multitude stringent security robustness requirements support deployment in practical scenarios. Among concerns are vulnerabilities spoofing?persons who masquerade as others gain illegitimate accesses protected data, services,...

10.1109/msp.2015.2437652 article EN IEEE Signal Processing Magazine 2015-08-14

We introduce a novel discriminative feature space which is efficient not only for face detection but also recognition. The representation based on local binary patterns (LBP) and consists of encoding both global facial characteristics into compact histogram. proposed invariant with respect to monotonic gray scale transformations can be derived in single scan through the image. Considering space, second-degree polynomial kernel SVM classifier was trained detect frontal faces images....

10.1109/cvpr.2004.1315246 article EN 2004-11-13

Current face biometric systems are vulnerable to spoofing attacks. A attack occurs when a person tries masquerade as someone else by falsifying data and thereby gaining illegitimate access. Inspired image quality assessment, characterisation of printing artefacts differences in light reflection, the authors propose approach problem detection from texture analysis point view. Indeed, prints usually contain defects that can be well detected using local shape features. Hence, present novel...

10.1049/iet-bmt.2011.0009 article EN IET Biometrics 2012-03-09

Automatic medical diagnosis is an emerging center of interest in computer vision as it provides unobtrusive objective information on a patient's condition. The face, mirror health status, can reveal symptomatic indications specific diseases. Thus, the detection facial abnormalities or atypical features at upmost importance when comes to diagnostics. This survey aims give overview recent developments diagnostics from images based methods. Various approaches have been considered assess...

10.1109/jbhi.2017.2754861 article EN IEEE Journal of Biomedical and Health Informatics 2017-10-05

In recent years, software-based face presentation attack detection (PAD) methods have seen a great progress. However, most existing schemes are not able to generalize well in more realistic conditions. The objective of this competition is evaluate and compare the generalization performances mobile PAD techniques under some real-world variations, including unseen input sensors, instruments (PAI) illumination conditions, on larger scale OULU-NPU dataset using its standard evaluation protocols...

10.1109/btas.2017.8272758 article EN 2017-10-01

Recent experiments, reported in the third edition of Fingerprint Liveness Detection competition (LivDet 2013), have clearly shown that fingerprint liveness detection is a very difficult and challenging task. Although number approaches large, none them can be claimed as able to detect traits with an acceptable error rate. In our opinion, order investigate at which extent this reduced, novel feature sets must proposed, and, eventually, integrated existing ones. paper, descriptor named "BSIF"...

10.1109/btas.2013.6712708 article EN 2013-09-01

Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems exist no comparative studies different same protocols and data. The motivation behind this competition compare performance state-of-the-art algorithms on database a unique evaluation method. Six teams from universities around world have participated in contest. Use or multiple motion, texture analysis liveness detection appears be trend competition. Most are able...

10.1109/ijcb.2011.6117509 article EN 2011-10-01

Facial occlusions, due for example to sunglasses, hats, scarf, beards etc., can significantly affect the performance of any face recognition system. Unfortunately, presence facial occlusions is quite common in real-world applications especially when individuals are not cooperative with system such as video surveillance scenarios. While there has been an enormous amount research on under pose/illumination changes and image degradations, problems caused by mostly overlooked. The focus this...

10.1109/fg.2011.5771439 article EN 2011-03-01

The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks. number countermeasures is gradually increasing and fairly good results have been reported on publicly available databases. There exists no superior antispoofing technique due varying nature attack scenarios acquisition conditions. Therefore, it important find out complementary study how they should be combined in order construct an easily extensible anti-spoofing...

10.1109/icb.2013.6612968 article EN 2013-06-01
Coming Soon ...