1 code implementation • 16 Nov 2022 • José Nascimento, João Phillipe Cardenuto, Jing Yang, Anderson Rocha
To the best of our knowledge, this dataset is the first of its kind in event filtering that focuses on protests in multi-modal social media data, with most of the text in Portuguese.
no code implementations • 7 Feb 2022 • Gabriel Bertocco, Antônio Theophilo, Fernanda Andaló, Anderson Rocha
We propose a strategy to tackle this problem, and to enable learning from unlabeled data even when samples from different classes are not prominently diverse.
no code implementations • 16 Dec 2021 • Sara Mandelli, Davide Cozzolino, Edoardo D. Cannas, Joao P. Cardenuto, Daniel Moreira, Paolo Bestagini, Walter J. Scheirer, Anderson Rocha, Luisa Verdoliva, Stefano Tubaro, Edward J. Delp
As a matter of fact, the generation of synthetic content is not restricted to multimedia data like videos, photographs or audio sequences, but covers a significantly vast area that can include biological images as well, such as western blot and microscopic images.
no code implementations • 11 Oct 2021 • Jing Yang, Didier Vega-Oliveros, Taís Seibt, Anderson Rocha
Misleading or false information has been creating chaos in some places around the world.
1 code implementation • 22 Sep 2021 • Jing Yang, Didier Vega-Oliveros, Tais Seibt, Anderson Rocha
Researchers have been investigating automated solutions for fact-checking in a variety of fronts.
1 code implementation • 13 Jul 2021 • Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong
The technological advancements of deep learning have enabled sophisticated face manipulation schemes, raising severe trust issues and security concerns in modern society.
1 code implementation • 1 Jul 2021 • Rafael Padilha, Fernanda A. Andaló, Bahram Lavi, Luís A.M. Pereira, Anderson Rocha
As smartphones become ubiquitous in modern life, every major event — from musical concerts to terrorist attempts — is massively captured by multiple devices and instantly uploaded to the Internet.
no code implementations • 26 May 2021 • João P. Cardenuto, Anderson Rocha
To mitigate this bottleneck, we present an extendable open-source library that reproduces the most common image forgery operations reported by the research integrity community: duplication, retouching, and cleaning.
1 code implementation • IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021 • Gabriel Bertocco, Fernanda Andaló, Anderson Rocha
Person Re-Identification (ReID) across non-overlapping cameras is a challenging task and, for this reason, most works in the prior art rely on supervised feature learning from a labeled dataset to match the same person in different views.
Ranked #1 on
Unsupervised Domain Adaptation
on Market to MSMT
1 code implementation • IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2022 • Rafael Padilha, Tawfiq Salem, Scott Workman, Fernanda A. Andaló, Anderson Rocha, Nathan Jacobs
Finally, we demonstrate how the proposed method can be employed to estimate a possible time-of-capture in scenarios in which the timestamp is missing from the metadata.
no code implementations • 30 Apr 2020 • Bahram Lavi, Ihsan Ullah, Mehdi Fatan, Anderson Rocha
Intelligent video-surveillance (IVS) is currently an active research field in computer vision and machine learning and provides useful tools for surveillance operators and forensic video investigators.
no code implementations • 13 Jan 2020 • Aparna Bharati, Daniel Moreira, Patrick Flynn, Anderson Rocha, Kevin Bowyer, Walter Scheirer
To establish the efficacy of the proposed approach, comparisons with state-of-the-art handcrafted and deep learning-based descriptors, and image matching approaches are made.
no code implementations • 11 Apr 2019 • Pedro Ribeiro Mendes Júnior, Luca Bondi, Paolo Bestagini, Stefano Tubaro, Anderson Rocha
To deal with this issue, in this paper, we present the first in-depth study on the possibility of solving the camera model identification problem in open-set scenarios.
no code implementations • 24 Mar 2019 • Joel Brogan, Aparna Bharati, Daniel Moreira, Kevin Bowyer, Patrick Flynn, Anderson Rocha, Walter Scheirer
Images from social media can reflect diverse viewpoints, heated arguments, and expressions of creativity, adding new complexity to retrieval tasks.
no code implementations • 7 Feb 2019 • Rodrigo Bresan, Allan Pinto, Anderson Rocha, Carlos Beluzo, Tiago Carvalho
Techniques that rely on trespassing these kind of systems by using a forged biometric sample, such as a printed paper or a recorded video of a genuine access, are known as presentation attacks, but may be also referred in the literature as face spoofing.
1 code implementation • 25 Nov 2018 • Andrey Kuehlkamp, Allan Pinto, Anderson Rocha, Kevin Bowyer, Adam Czajka
The adoption of large-scale iris recognition systems around the world has brought to light the importance of detecting presentation attack images (textured contact lenses and printouts).
Cross-Domain Iris Presentation Attack Detection
Iris Recognition
+1
no code implementations • 9 Jul 2018 • Aparna Bharati, Daniel Moreira, Joel Brogan, Patricia Hale, Kevin W. Bowyer, Patrick J. Flynn, Anderson Rocha, Walter J. Scheirer
Creative works, whether paintings or memes, follow unique journeys that result in their final form.
no code implementations • 19 Jan 2018 • Daniel Moreira, Aparna Bharati, Joel Brogan, Allan Pinto, Michael Parowski, Kevin W. Bowyer, Patrick J. Flynn, Anderson Rocha, Walter J. Scheirer
Given a large corpus of images and a query image, an interesting further step is to retrieve the set of original images whose content is present in the query image, as well as the detailed sequences of transformations that yield the query image given the original images.
1 code implementation • 1 Jun 2017 • Allan Pinto, Daniel Moreira, Aparna Bharati, Joel Brogan, Kevin Bowyer, Patrick Flynn, Walter Scheirer, Anderson Rocha
Departing from traditional digital forensics modeling, which seeks to analyze single objects in isolation, multimedia phylogeny analyzes the evolutionary processes that influence digital objects and collections over time.
1 code implementation • 31 May 2017 • Aparna Bharati, Daniel Moreira, Allan Pinto, Joel Brogan, Kevin Bowyer, Patrick Flynn, Walter Scheirer, Anderson Rocha
Deriving relationships between images and tracing back their history of modifications are at the core of Multimedia Phylogeny solutions, which aim to combat misinformation through doctored visual media.
no code implementations • 1 May 2017 • Joel Brogan, Paolo Bestagini, Aparna Bharati, Allan Pinto, Daniel Moreira, Kevin Bowyer, Patrick Flynn, Anderson Rocha, Walter Scheirer
As image tampering becomes ever more sophisticated and commonplace, the need for image forensics algorithms that can accurately and quickly detect forgeries grows.
no code implementations • 17 Nov 2016 • Guilherme Folego, Marcus A. Angeloni, José Augusto Stuchi, Alan Godoy, Anderson Rocha
Cross-domain biometrics has been emerging as a new necessity, which poses several additional challenges, including harsh illumination changes, noise, pose variation, among others.
no code implementations • 13 Jun 2016 • Pedro Ribeiro Mendes Júnior, Terrance E. Boult, Jacques Wainer, Anderson Rocha
In the open-set scenario, however, a test sample can belong to none of the known classes and the classifier must properly reject it by classifying it as unknown.
no code implementations • 8 Oct 2014 • David Menotti, Giovani Chiachia, Allan Pinto, William Robson Schwartz, Helio Pedrini, Alexandre Xavier Falcao, Anderson Rocha
We assume a very limited knowledge about biometric spoofing at the sensor to derive outstanding spoofing detection systems for iris, face, and fingerprint modalities based on two deep learning approaches.