Frequency aware face hallucination generative adversarial network with semantic structural constraint

Shailza Sharma, Abhinav Dhall, Vinay Kumar

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

In this paper, we address the issue of face hallucination. Most current face hallucination methods rely on two-dimensional facial priors to generate high resolution face images from low resolution face images. These methods are only capable of assimilating global information into the generated image. Still there exist some inherent problems in these methods, such as, local features, subtle structural details and depth information are missing in final output image. This work proposes a generative adversarial network (GAN) based novel progressive face hallucination (FH) network to address these issues present among current methods. The generator of the proposed model comprises of FH network and two sub-networks, assisting FH network to generate high resolution images. The first sub-network leverages on explicitly adding high frequency components into the model. To explicitly encode the high frequency components, an auto encoder is proposed to generate high resolution coefficients of discrete cosine transform (DCT). To add three dimensional parametric information into the network, second sub-network is proposed. This network uses a shape model of 3D morphable models (3DMM) to add structural constraint to the FH network. Extensive experimentation evaluation show the usefulness of proposed architecture in the form of state-of-the-art quantitative results.

Original languageEnglish
Article number103553
JournalComputer Vision and Image Understanding
Volume223
Early online date5 Sept 2022
DOIs
Publication statusPublished - Oct 2022
Externally publishedYes

Keywords

  • 3D morphable models
  • Discrete cosine transform
  • Face hallucination
  • Generative adversarial networks
  • Super resolution

Fingerprint

Dive into the research topics of 'Frequency aware face hallucination generative adversarial network with semantic structural constraint'. Together they form a unique fingerprint.

Cite this