MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1877991
S. Battiato, G. Farinella, G. Guarnera, Tony Meccio, G. Puglisi, D. Ravì, Rosetta Rizzo
{"title":"Bags of phrases with codebooks alignment for near duplicate image detection","authors":"S. Battiato, G. Farinella, G. Guarnera, Tony Meccio, G. Puglisi, D. Ravì, Rosetta Rizzo","doi":"10.1145/1877972.1877991","DOIUrl":"https://doi.org/10.1145/1877972.1877991","url":null,"abstract":"Image retrieval from large databases, such as popular social networks, collections of surveillance images and videos, or digital investigation archives, is a very important task for a number of applications. In digital investigation, hashing techniques are commonly used to index large quantities of images to detect copies from different archives. In the last few years, a number of image hashing techniques based on the Bags of Visual Words paradigm have been proposed. Recently, this paradigm has been augmented by using multiple descriptors (Bags of Visual Phrases) to exploit the coherence between different feature spaces. In this paper we propose to further improve the Bags of Visual Phrases approach exploiting the coherence between feature spaces not only in the image representation, but also in the codebooks generation. Experiments performed on real and synthetic near duplicate image datasets show the effectiveness of the proposed approach, which outperforms the original Bags of Visual Phrases approach.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1877985
Michael J. Metternich, M. Worring
{"title":"Semi-interactive tracing of persons in real-life surveillance data","authors":"Michael J. Metternich, M. Worring","doi":"10.1145/1877972.1877985","DOIUrl":"https://doi.org/10.1145/1877972.1877985","url":null,"abstract":"To increase public safety, more and more surveillance cameras have been placed over the years. To deal with the resulting information overload many methods have been deployed, focusing either on real-time crime detection or post-incident investigation. In this paper we concentrate on post-incident investigation i.e. crime reconstruction using video data. For a complete crime reconstruction, the location of all persons of interest should be known before and during the incident. To do so, we follow persons within the field of view of a single camera (tracking) and between different cameras (tracing).\u0000 We present a semi-interactive approach to post-incident investigation. This method is specifically capable of tracking and tracing persons of interest. Our system supports the analytical reasoning process of the investigator with automatic analysis, visualization methods, and interaction processing. We show that the automatic tracing method significantly speeds up tracing of persons with clear visual characteristics. Tracing of persons without obvious characteristics is an inherently difficult task, but we show that intelligent use of interactive methods greatly improves the tracing performance of our system.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1878002
G. Chierchia, S. Parrilli, G. Poggi, Carlo Sansone, L. Verdoliva
{"title":"On the influence of denoising in PRNU based forgery detection","authors":"G. Chierchia, S. Parrilli, G. Poggi, Carlo Sansone, L. Verdoliva","doi":"10.1145/1877972.1878002","DOIUrl":"https://doi.org/10.1145/1877972.1878002","url":null,"abstract":"To detect some image forgeries one can rely on the Photo-Response Non-Uniformity (PRNU), a deterministic pattern associated with each individual camera, which can be loosely modeled as low-intensity multiplicative noise. A very promising algorithm for PRNU-based forgery detection has been recently proposed by Chen et al. Image denoising is a key step of the algorithm, since it allows to single out and remove most of the signal components and reveal the PRNU pattern. In this work we analyze the influence of denoising on the overall performance of the method and show that the use of a suitable state-of-the art denoising technique improves performance appreciably w.r.t. the original algorithm.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1878001
Yongjian Hu, Chang-Tsun Li, Chao Jian
{"title":"Building fingerprints with information from three color bands for source camera identification","authors":"Yongjian Hu, Chang-Tsun Li, Chao Jian","doi":"10.1145/1877972.1878001","DOIUrl":"https://doi.org/10.1145/1877972.1878001","url":null,"abstract":"The imaging sensor (e.g., CCD, CMOS) pattern noise is a noise-like spread-spectrum signal that mainly consists of the photo-response non-uniformity (PRNU) noise. Since each camera has a unique PRNU, the PRNU becomes a popular fingerprint for source camera identification. Current fingerprints are built based on one color band. To better reflect the intrinsic characteristics of the camera, this work explores the way to build fingerprints based on three color bands of an image.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130775562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1877973
Herwig Lejsek, Hrönn Þormóðsdóttir, F. Ásmundsson, Kristleifur Daðason, Á. Jóhannsson, B. Jónsson, L. Amsaleg
{"title":"Videntifier\" Forensic: large-scale video identification in practice","authors":"Herwig Lejsek, Hrönn Þormóðsdóttir, F. Ásmundsson, Kristleifur Daðason, Á. Jóhannsson, B. Jónsson, L. Amsaleg","doi":"10.1145/1877972.1877973","DOIUrl":"https://doi.org/10.1145/1877972.1877973","url":null,"abstract":"Identifying videos on seized hard drives and other storage devices is a very tedious and time consuming task for forensic investigators. In particular, the vast amount of available material on the Internet and the large storage capacities of today's hard drives have become a strong headache for them. Videntifier\" Forensic is a recent service for forensic video identification, which is based on state-of-the-art high-dimensional descriptors and high-dimensional indexing. In this paper we describe how Videntifier\" Forensic tackles very large collections of video material and how robust it is towards standard modifications. We then present measurements that involve four different datasets and three collection sizes of up to 25,000 hours of video content. Our results show that Videntifier\" Forensic scales very well, both in terms of the efficiency and effectiveness of the service.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117024707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1877984
Manuel Aravecchia, S. Calderara, Sara Chiossi, R. Cucchiara
{"title":"A videosurveillance data browsing software architecture for forensics: from trajectories similarities to video fragments","authors":"Manuel Aravecchia, S. Calderara, Sara Chiossi, R. Cucchiara","doi":"10.1145/1877972.1877984","DOIUrl":"https://doi.org/10.1145/1877972.1877984","url":null,"abstract":"The information contained in digital video surveillance repositories can present relevant hints, when not even legal evidence, during investigations. As the amount of video data often forbids manual search, some tools have been developed during the past years in order to aid investigators in the look up process. We propose an application for forensic video analysis which aims at analysing the activities in a given scenario, particularly focusing on trajectories followed by people and their visual appearances. The recorded videos can be browsed by investigators thanks to a user-friendly interface, allowing easy information retrieval, through the choice of the best mining strategy. The underlying application architecture implements different feature and query models as well as query optimization strategies in order to return the best response in terms of both efficacy and efficiency.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126310873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1877982
D. Reid, M. Nixon
{"title":"Imputing human descriptions in semantic biometrics","authors":"D. Reid, M. Nixon","doi":"10.1145/1877972.1877982","DOIUrl":"https://doi.org/10.1145/1877972.1877982","url":null,"abstract":"Human identification at a distance has received significant interest due to the ever increasing surveillance infrastructure. Biometrics such as face and gait offer a suitable physical attribute to uniquely identify people from a distance. When linking this with human perception, these biometrics suffer from the semantic gap which is the difference between how people and how biometrics represent and describe humans. Semantic biometrics bridges this gap, allowing conversions between gait biometrics and semantic descriptions. One possible application of semantic biometrics is to automatically search surveillance footage for a person who best matches a given semantic description - possibly obtained from an eyewitness report. We now exploit patterns and structure within the physical descriptions to be able to predict occluded or erroneous data, thereby widening application potential. We show how imputation techniques can be used to increase accuracy and robustness of automatic semantic annotation of gait signatures.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"82 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120981520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1877992
Salvatore Catanese, G. Fiumara
{"title":"A visual tool for forensic analysis of mobile phone traffic","authors":"Salvatore Catanese, G. Fiumara","doi":"10.1145/1877972.1877992","DOIUrl":"https://doi.org/10.1145/1877972.1877992","url":null,"abstract":"In this paper we present our tool LogAnalysis for forensic visual statistical analysis of mobile phone traffic. LogAnalysis graphically represents the relationships among mobile phone users with a node-link layout. Its aim is to explore the structure of a large graph, measure connectivity among users and give support to visual search and automatic identification of organizations. To do so, LogAnalysis integrates graphical representation of network elements with measures typical of Social Network Analysis (SNA) in order to help detectives or forensic analysts to systematically examine relationships. The analysis of data extracted from mobile phone traffic logs has a fundamental relevance in forensic investigations since it allows to unveil the structure of relationships among individuals suspected to be part of criminal organizations together with the role they play inside the organization itself. To this purpose, the Social Network Analysis (SNA) methods were heavily employed in order to understand the importance of relationships. Interpretation and visual exploration of graphs representing phone contacts over a given time interval may become demanding, due to the presence of numerous nodes and edges. Our main contribution is an interface that enables systematic analysis of social relationships using visual different techniques and statistical information. LogAnalysis allows a deeper and clearer understanding of criminal associations while evidencing key members inside the criminal ring, and/or those working as link among different associations","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133633682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1877998
D. Falavigna, M. Gerosa, D. Giuliani, R. Gretter
{"title":"An automatic transcription system of hearings in Italian courtrooms","authors":"D. Falavigna, M. Gerosa, D. Giuliani, R. Gretter","doi":"10.1145/1877972.1877998","DOIUrl":"https://doi.org/10.1145/1877972.1877998","url":null,"abstract":"This paper describes and discusses the recognition results obtained using the automatic transcription system developed in our labs, after having adapted it to the judicial domain. The performance has been evaluated on field audio data, formed by about 7 hours of multiply tracks recordings, acquired in two different dates in the Court of Naples. Different sets of acoustic and language models have been used and compared in the system, providing results (word error rate is around 40%) that are in line with those obtained on other comparable Automatic Speech Recognition (ASR) tasks (e.g. meeting transcription)and that leave room for future investigations","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134579041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MiFor '10Pub Date : 2010-10-29DOI: 10.1145/1877972.1877980
Min-Jen Tsai, Jung Liu
{"title":"A game-theoretic system security design for the visible watermarking","authors":"Min-Jen Tsai, Jung Liu","doi":"10.1145/1877972.1877980","DOIUrl":"https://doi.org/10.1145/1877972.1877980","url":null,"abstract":"Digital watermarking has been widely studied and regarded as a potentially effective means for protecting copyright of digital media in recent years. Among different categories of researches for digital watermarking, visible watermarking protect copyrights in a more active way since the approach not only prevents pirates but also visually recognizes the copyrights of multimedia data. However, how to determine the equilibrium of optimal security strategies between encoder and attacker and the optimal tradeoff between the intensity of embedded watermark and the perceptual translucence for visible watermark is becoming a subject of importance. Therefore, in order to achieve the best tradeoff between the embedding energy of watermark, the quality of perceptual watermark translucence and the image fidelity after attacks, a novel game-theoretic system security design for visible watermarking is proposed in this study. The watermark embedding problem is formulated as a dynamic non-cooperative game with complete information while the optimal strategy is defined by the Nash equilibrium of the game. The experimental results demonstrate the feasibility of the proposed approach which allows the watermark encoder to obtain the best watermarking strategy under attacks. Accordingly, our research could help to resolve security issue of visual communication.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116651461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}