2017 International Conference on Progress in Informatics and Computing (PIC) 2017
DOI: 10.1109/pic.2017.8359518
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning based forensic face verification in videos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 12 publications
0
5
0
1
Order By: Relevance
“…In addition, there are applications in forensics that deal with, for example, the identification of image sources, forensic face verification in videos, drowning diagnosis or the interpretation of gunshot wounds [ 32 , 33 , 34 , 35 ]. The input for CNNs/FCNs/U-Nets is an n-dimensional matrix; it can thus be used for classification and clustering of image data.…”
Section: Usage Of Neural Network For Medical Data Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, there are applications in forensics that deal with, for example, the identification of image sources, forensic face verification in videos, drowning diagnosis or the interpretation of gunshot wounds [ 32 , 33 , 34 , 35 ]. The input for CNNs/FCNs/U-Nets is an n-dimensional matrix; it can thus be used for classification and clustering of image data.…”
Section: Usage Of Neural Network For Medical Data Analysismentioning
confidence: 99%
“…Artificial neural networks have shown their potential particularly for the analysis of image data. For example, forensic scientists use this technology for drowning diagnosis, face verification, image manipulation detection or gunshot wound interpretation [ 32 , 33 , 34 , 35 ]. Other researchers in the field of source image forensics are looking at issues of source camera identification, forensics of re-recorded images, computer graphics image forensics, GAN-generated image recognition and source social network identification [ 6 ].…”
Section: Introductionmentioning
confidence: 99%
“…Artificial visando solucionar problemas de autenticação nos sistemas de monitoramento de instituições públicas e privadas. Visão Computacional tem sido amplamente utilizada em sistemas de monitoramento, como mecanismo de autenticação [8], [9], [10], [11], [12] e de detecção de presença de pessoas [13], [14], [15]. Os autores em [9] expõem um protótipo de reconhecimento facial baseado em um estudo feito sobre o algoritmo de Viola Jones, que foi desenvolvido especificamente para o treinamento de redes neurais para reconhecimento de rostos de pessoas.…”
Section: Nos úLtimos Anos Diversos Pesquisadores Têm Mostrado Interesse Em Mecanismos De Inteligênciaunclassified
“…Human-computer interaction increasingly relies on Machine Learning (ML) models such as Deep Neural Networks (DNNs) trained from, usually large, datasets [1,2,3,4]. The ubiquitous applications of DNNs in security-critical tasks, such as face identity recognition [5,6], speaker verification [7,8], voice controlled systems [9,10,11] or signal forensics [12,13,14,15] require a high reliability on these computational models. However, it has been demonstrated that such models can be fooled by perturbing an input sample with malicious and quasi-imperceptible perturbations.…”
Section: Introductionmentioning
confidence: 99%