Search Results for author: Anderson Rocha

Found 24 papers, 9 papers with code

Few-shot Learning for Multi-modal Social Media Event Filtering

1 code implementation16 Nov 2022 José Nascimento, João Phillipe Cardenuto, Jing Yang, Anderson Rocha

To the best of our knowledge, this dataset is the first of its kind in event filtering that focuses on protests in multi-modal social media data, with most of the text in Portuguese.

Few-Shot Learning

Reasoning for Complex Data through Ensemble-based Self-Supervised Learning

no code implementations7 Feb 2022 Gabriel Bertocco, Antônio Theophilo, Fernanda Andaló, Anderson Rocha

We propose a strategy to tackle this problem, and to enable learning from unlabeled data even when samples from different classes are not prominently diverse.

Authorship Verification Person Re-Identification +1

Forensic Analysis of Synthetically Generated Western Blot Images

no code implementations16 Dec 2021 Sara Mandelli, Davide Cozzolino, Edoardo D. Cannas, Joao P. Cardenuto, Daniel Moreira, Paolo Bestagini, Walter J. Scheirer, Anderson Rocha, Luisa Verdoliva, Stefano Tubaro, Edward J. Delp

As a matter of fact, the generation of synthetic content is not restricted to multimedia data like videos, photographs or audio sequences, but covers a significantly vast area that can include biological images as well, such as western blot and microscopic images.

Scalable Fact-checking with Human-in-the-Loop

1 code implementation22 Sep 2021 Jing Yang, Didier Vega-Oliveros, Tais Seibt, Anderson Rocha

Researchers have been investigating automated solutions for fact-checking in a variety of fronts.

Fact Checking

Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-level Telltales

1 code implementation13 Jul 2021 Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong

The technological advancements of deep learning have enabled sophisticated face manipulation schemes, raising severe trust issues and security concerns in modern society.

Decision Making

Temporally Sorting Images from Real-World Events

1 code implementation1 Jul 2021 Rafael Padilha, Fernanda A. Andaló, Bahram Lavi, Luís A.M. Pereira, Anderson Rocha

As smartphones become ubiquitous in modern life, every major event — from musical concerts to terrorist attempts — is massively captured by multiple devices and instantly uploaded to the Internet.

Image Classification

Benchmarking Scientific Image Forgery Detectors

no code implementations26 May 2021 João P. Cardenuto, Anderson Rocha

To mitigate this bottleneck, we present an extendable open-source library that reproduces the most common image forgery operations reported by the research integrity community: duplication, retouching, and cleaning.

Unsupervised and self-adaptative techniques for cross-domain person re-identification

1 code implementation IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021 Gabriel Bertocco, Fernanda Andaló, Anderson Rocha

Person Re-Identification (ReID) across non-overlapping cameras is a challenging task and, for this reason, most works in the prior art rely on supervised feature learning from a labeled dataset to match the same person in different views.

Decision Making Person Re-Identification +2

Survey on Reliable Deep Learning-Based Person Re-Identification Models: Are We There Yet?

no code implementations30 Apr 2020 Bahram Lavi, Ihsan Ullah, Mehdi Fatan, Anderson Rocha

Intelligent video-surveillance (IVS) is currently an active research field in computer vision and machine learning and provides useful tools for surveillance operators and forensic video investigators.

Person Re-Identification Retrieval

Learning Transformation-Aware Embeddings for Image Forensics

no code implementations13 Jan 2020 Aparna Bharati, Daniel Moreira, Patrick Flynn, Anderson Rocha, Kevin Bowyer, Walter Scheirer

To establish the efficacy of the proposed approach, comparisons with state-of-the-art handcrafted and deep learning-based descriptors, and image matching approaches are made.

Image Forensics Object Recognition

An In-Depth Study on Open-Set Camera Model Identification

no code implementations11 Apr 2019 Pedro Ribeiro Mendes Júnior, Luca Bondi, Paolo Bestagini, Stefano Tubaro, Anderson Rocha

To deal with this issue, in this paper, we present the first in-depth study on the possibility of solving the camera model identification problem in open-set scenarios.

Open Set Learning

Dynamic Spatial Verification for Large-Scale Object-Level Image Retrieval

no code implementations24 Mar 2019 Joel Brogan, Aparna Bharati, Daniel Moreira, Kevin Bowyer, Patrick Flynn, Anderson Rocha, Walter Scheirer

Images from social media can reflect diverse viewpoints, heated arguments, and expressions of creativity, adding new complexity to retrieval tasks.

Content-Based Image Retrieval object-detection +2

FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning

no code implementations7 Feb 2019 Rodrigo Bresan, Allan Pinto, Anderson Rocha, Carlos Beluzo, Tiago Carvalho

Techniques that rely on trespassing these kind of systems by using a forged biometric sample, such as a printed paper or a recorded video of a genuine access, are known as presentation attacks, but may be also referred in the literature as face spoofing.

Face Recognition Meta-Learning

Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection

1 code implementation25 Nov 2018 Andrey Kuehlkamp, Allan Pinto, Anderson Rocha, Kevin Bowyer, Adam Czajka

The adoption of large-scale iris recognition systems around the world has brought to light the importance of detecting presentation attack images (textured contact lenses and printouts).

Cross-Domain Iris Presentation Attack Detection Iris Recognition +1

Image Provenance Analysis at Scale

no code implementations19 Jan 2018 Daniel Moreira, Aparna Bharati, Joel Brogan, Allan Pinto, Michael Parowski, Kevin W. Bowyer, Patrick J. Flynn, Anderson Rocha, Walter J. Scheirer

Given a large corpus of images and a query image, an interesting further step is to retrieve the set of original images whose content is present in the query image, as well as the detailed sequences of transformations that yield the query image given the original images.

Authorship Verification Fact Checking

Provenance Filtering for Multimedia Phylogeny

1 code implementation1 Jun 2017 Allan Pinto, Daniel Moreira, Aparna Bharati, Joel Brogan, Kevin Bowyer, Patrick Flynn, Walter Scheirer, Anderson Rocha

Departing from traditional digital forensics modeling, which seeks to analyze single objects in isolation, multimedia phylogeny analyzes the evolutionary processes that influence digital objects and collections over time.

U-Phylogeny: Undirected Provenance Graph Construction in the Wild

1 code implementation31 May 2017 Aparna Bharati, Daniel Moreira, Allan Pinto, Joel Brogan, Kevin Bowyer, Patrick Flynn, Walter Scheirer, Anderson Rocha

Deriving relationships between images and tracing back their history of modifications are at the core of Multimedia Phylogeny solutions, which aim to combat misinformation through doctored visual media.

graph construction Misinformation

Cross-Domain Face Verification: Matching ID Document and Self-Portrait Photographs

no code implementations17 Nov 2016 Guilherme Folego, Marcus A. Angeloni, José Augusto Stuchi, Alan Godoy, Anderson Rocha

Cross-domain biometrics has been emerging as a new necessity, which poses several additional challenges, including harsh illumination changes, noise, pose variation, among others.

Face Verification

Specialized Support Vector Machines for Open-set Recognition

no code implementations13 Jun 2016 Pedro Ribeiro Mendes Júnior, Terrance E. Boult, Jacques Wainer, Anderson Rocha

In the open-set scenario, however, a test sample can belong to none of the known classes and the classifier must properly reject it by classifying it as unknown.

General Classification Open Set Learning +1

Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

no code implementations8 Oct 2014 David Menotti, Giovani Chiachia, Allan Pinto, William Robson Schwartz, Helio Pedrini, Alexandre Xavier Falcao, Anderson Rocha

We assume a very limited knowledge about biometric spoofing at the sensor to derive outstanding spoofing detection systems for iris, face, and fingerprint modalities based on two deep learning approaches.

Person Identification

Cannot find the paper you are looking for? You can Submit a new open access paper.