Search Results for author: Anderson Rocha

Found 30 papers, 12 papers with code

Detect and Locate: Exposing Face Manipulation by Semantic- and Noise-level Telltales

1 code implementation13 Jul 2021 Chenqi Kong, Baoliang Chen, Haoliang Li, Shiqi Wang, Anderson Rocha, Sam Kwong

The technological advancements of deep learning have enabled sophisticated face manipulation schemes, raising severe trust issues and security concerns in modern society.

Decision Making

Unsupervised and self-adaptative techniques for cross-domain person re-identification

1 code implementation IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2021 Gabriel Bertocco, Fernanda Andaló, Anderson Rocha

Person Re-Identification (ReID) across non-overlapping cameras is a challenging task and, for this reason, most works in the prior art rely on supervised feature learning from a labeled dataset to match the same person in different views.

Decision Making Person Re-Identification +2

Robust Domain Misinformation Detection via Multi-modal Feature Alignment

1 code implementation24 Nov 2023 Hui Liu, Wenya Wang, Hao Sun, Anderson Rocha, Haoliang Li

We also propose a framework that simultaneously considers application scenarios of domain generalization (in which the target domain data is unavailable) and domain adaptation (in which unlabeled target domain data is available).

Domain Generalization Misinformation

Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection

1 code implementation25 Nov 2018 Andrey Kuehlkamp, Allan Pinto, Anderson Rocha, Kevin Bowyer, Adam Czajka

The adoption of large-scale iris recognition systems around the world has brought to light the importance of detecting presentation attack images (textured contact lenses and printouts).

Cross-Domain Iris Presentation Attack Detection Iris Recognition +1

U-Phylogeny: Undirected Provenance Graph Construction in the Wild

1 code implementation31 May 2017 Aparna Bharati, Daniel Moreira, Allan Pinto, Joel Brogan, Kevin Bowyer, Patrick Flynn, Walter Scheirer, Anderson Rocha

Deriving relationships between images and tracing back their history of modifications are at the core of Multimedia Phylogeny solutions, which aim to combat misinformation through doctored visual media.

graph construction Misinformation

Leveraging Ensembles and Self-Supervised Learning for Fully-Unsupervised Person Re-Identification and Text Authorship Attribution

1 code implementation7 Feb 2022 Gabriel Bertocco, Antônio Theophilo, Fernanda Andaló, Anderson Rocha

We propose a strategy to tackle Person Re-Identification and Text Authorship Attribution by enabling learning from unlabeled data even when samples from different classes are not prominently diverse.

Authorship Attribution Authorship Verification +2

Temporally Sorting Images from Real-World Events

1 code implementation1 Jul 2021 Rafael Padilha, Fernanda A. Andaló, Bahram Lavi, Luís A.M. Pereira, Anderson Rocha

As smartphones become ubiquitous in modern life, every major event — from musical concerts to terrorist attempts — is massively captured by multiple devices and instantly uploaded to the Internet.

Image Classification

Few-shot Learning for Multi-modal Social Media Event Filtering

1 code implementation16 Nov 2022 José Nascimento, João Phillipe Cardenuto, Jing Yang, Anderson Rocha

To the best of our knowledge, this dataset is the first of its kind in event filtering that focuses on protests in multi-modal social media data, with most of the text in Portuguese.

Few-Shot Learning

M3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System

1 code implementation30 Jan 2023 Chenqi Kong, Kexin Zheng, Yibing Liu, Shiqi Wang, Anderson Rocha, Haoliang Li

Face presentation attacks (FPA), also known as face spoofing, have brought increasing concerns to the public through various malicious applications, such as financial fraud and privacy leakage.

Face Anti-Spoofing Face Recognition

Specialized Support Vector Machines for Open-set Recognition

no code implementations13 Jun 2016 Pedro Ribeiro Mendes Júnior, Terrance E. Boult, Jacques Wainer, Anderson Rocha

In the open-set scenario, however, a test sample can belong to none of the known classes and the classifier must properly reject it by classifying it as unknown.

General Classification Open Set Learning +1

Image Provenance Analysis at Scale

no code implementations19 Jan 2018 Daniel Moreira, Aparna Bharati, Joel Brogan, Allan Pinto, Michael Parowski, Kevin W. Bowyer, Patrick J. Flynn, Anderson Rocha, Walter J. Scheirer

Given a large corpus of images and a query image, an interesting further step is to retrieve the set of original images whose content is present in the query image, as well as the detailed sequences of transformations that yield the query image given the original images.

Authorship Verification Fact Checking

Provenance Filtering for Multimedia Phylogeny

1 code implementation1 Jun 2017 Allan Pinto, Daniel Moreira, Aparna Bharati, Joel Brogan, Kevin Bowyer, Patrick Flynn, Walter Scheirer, Anderson Rocha

Departing from traditional digital forensics modeling, which seeks to analyze single objects in isolation, multimedia phylogeny analyzes the evolutionary processes that influence digital objects and collections over time.

Cross-Domain Face Verification: Matching ID Document and Self-Portrait Photographs

no code implementations17 Nov 2016 Guilherme Folego, Marcus A. Angeloni, José Augusto Stuchi, Alan Godoy, Anderson Rocha

Cross-domain biometrics has been emerging as a new necessity, which poses several additional challenges, including harsh illumination changes, noise, pose variation, among others.

Face Verification

Deep Representations for Iris, Face, and Fingerprint Spoofing Detection

no code implementations8 Oct 2014 David Menotti, Giovani Chiachia, Allan Pinto, William Robson Schwartz, Helio Pedrini, Alexandre Xavier Falcao, Anderson Rocha

We assume a very limited knowledge about biometric spoofing at the sensor to derive outstanding spoofing detection systems for iris, face, and fingerprint modalities based on two deep learning approaches.

Person Identification

FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning

no code implementations7 Feb 2019 Rodrigo Bresan, Allan Pinto, Anderson Rocha, Carlos Beluzo, Tiago Carvalho

Techniques that rely on trespassing these kind of systems by using a forged biometric sample, such as a printed paper or a recorded video of a genuine access, are known as presentation attacks, but may be also referred in the literature as face spoofing.

Face Recognition Meta-Learning

Dynamic Spatial Verification for Large-Scale Object-Level Image Retrieval

no code implementations24 Mar 2019 Joel Brogan, Aparna Bharati, Daniel Moreira, Kevin Bowyer, Patrick Flynn, Anderson Rocha, Walter Scheirer

Images from social media can reflect diverse viewpoints, heated arguments, and expressions of creativity, adding new complexity to retrieval tasks.

Clustering Content-Based Image Retrieval +3

An In-Depth Study on Open-Set Camera Model Identification

no code implementations11 Apr 2019 Pedro Ribeiro Mendes Júnior, Luca Bondi, Paolo Bestagini, Stefano Tubaro, Anderson Rocha

To deal with this issue, in this paper, we present the first in-depth study on the possibility of solving the camera model identification problem in open-set scenarios.

Open Set Learning

Learning Transformation-Aware Embeddings for Image Forensics

no code implementations13 Jan 2020 Aparna Bharati, Daniel Moreira, Patrick Flynn, Anderson Rocha, Kevin Bowyer, Walter Scheirer

To establish the efficacy of the proposed approach, comparisons with state-of-the-art handcrafted and deep learning-based descriptors, and image matching approaches are made.

Image Forensics Object Recognition

Survey on Reliable Deep Learning-Based Person Re-Identification Models: Are We There Yet?

no code implementations30 Apr 2020 Bahram Lavi, Ihsan Ullah, Mehdi Fatan, Anderson Rocha

Intelligent video-surveillance (IVS) is currently an active research field in computer vision and machine learning and provides useful tools for surveillance operators and forensic video investigators.

Person Re-Identification Retrieval

Benchmarking Scientific Image Forgery Detectors

no code implementations26 May 2021 João P. Cardenuto, Anderson Rocha

To mitigate this bottleneck, we present an extendable open-source library that reproduces the most common image forgery operations reported by the research integrity community: duplication, retouching, and cleaning.

Benchmarking

Scalable Fact-checking with Human-in-the-Loop

1 code implementation22 Sep 2021 Jing Yang, Didier Vega-Oliveros, Tais Seibt, Anderson Rocha

Researchers have been investigating automated solutions for fact-checking in a variety of fronts.

Fact Checking

Forensic Analysis of Synthetically Generated Western Blot Images

no code implementations16 Dec 2021 Sara Mandelli, Davide Cozzolino, Edoardo D. Cannas, Joao P. Cardenuto, Daniel Moreira, Paolo Bestagini, Walter J. Scheirer, Anderson Rocha, Luisa Verdoliva, Stefano Tubaro, Edward J. Delp

As a matter of fact, the generation of synthetic content is not restricted to multimedia data like videos, photographs or audio sequences, but covers a significantly vast area that can include biological images as well, such as western blot and microscopic images.

Binary Classification

The Age of Synthetic Realities: Challenges and Opportunities

no code implementations9 Jun 2023 João Phillipe Cardenuto, Jing Yang, Rafael Padilha, Renjie Wan, Daniel Moreira, Haoliang Li, Shiqi Wang, Fernanda Andaló, Sébastien Marcel, Anderson Rocha

Synthetic realities are digital creations or augmentations that are contextually generated through the use of Artificial Intelligence (AI) methods, leveraging extensive amounts of data to construct new narratives or realities, regardless of the intent to deceive.

Misinformation

Large-scale Fully-Unsupervised Re-Identification

no code implementations26 Jul 2023 Gabriel Bertocco, Fernanda Andaló, Terrance E. Boult, Anderson Rocha

Fully-unsupervised Person and Vehicle Re-Identification have received increasing attention due to their broad applicability in surveillance, forensics, event understanding, and smart cities, without requiring any manual annotation.

Clustering Re-Ranking +2

Information Forensics and Security: A quarter-century-long journey

no code implementations21 Sep 2023 Mauro Barni, Patrizio Campisi, Edward J. Delp, Gwenael Doërr, Jessica Fridrich, Nasir Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu

Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering of solid evidence to hold perpetrators accountable.

Cannot find the paper you are looking for? You can Submit a new open access paper.