MiFor '10最新文献

筛选
英文 中文
Bags of phrases with codebooks alignment for near duplicate image detection 短语袋与码本对齐近重复图像检测
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877991
S. Battiato, G. Farinella, G. Guarnera, Tony Meccio, G. Puglisi, D. Ravì, Rosetta Rizzo
{"title":"Bags of phrases with codebooks alignment for near duplicate image detection","authors":"S. Battiato, G. Farinella, G. Guarnera, Tony Meccio, G. Puglisi, D. Ravì, Rosetta Rizzo","doi":"10.1145/1877972.1877991","DOIUrl":"https://doi.org/10.1145/1877972.1877991","url":null,"abstract":"Image retrieval from large databases, such as popular social networks, collections of surveillance images and videos, or digital investigation archives, is a very important task for a number of applications. In digital investigation, hashing techniques are commonly used to index large quantities of images to detect copies from different archives. In the last few years, a number of image hashing techniques based on the Bags of Visual Words paradigm have been proposed. Recently, this paradigm has been augmented by using multiple descriptors (Bags of Visual Phrases) to exploit the coherence between different feature spaces. In this paper we propose to further improve the Bags of Visual Phrases approach exploiting the coherence between feature spaces not only in the image representation, but also in the codebooks generation. Experiments performed on real and synthetic near duplicate image datasets show the effectiveness of the proposed approach, which outperforms the original Bags of Visual Phrases approach.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Semi-interactive tracing of persons in real-life surveillance data 半交互式跟踪人在现实生活中的监控数据
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877985
Michael J. Metternich, M. Worring
{"title":"Semi-interactive tracing of persons in real-life surveillance data","authors":"Michael J. Metternich, M. Worring","doi":"10.1145/1877972.1877985","DOIUrl":"https://doi.org/10.1145/1877972.1877985","url":null,"abstract":"To increase public safety, more and more surveillance cameras have been placed over the years. To deal with the resulting information overload many methods have been deployed, focusing either on real-time crime detection or post-incident investigation. In this paper we concentrate on post-incident investigation i.e. crime reconstruction using video data. For a complete crime reconstruction, the location of all persons of interest should be known before and during the incident. To do so, we follow persons within the field of view of a single camera (tracking) and between different cameras (tracing).\u0000 We present a semi-interactive approach to post-incident investigation. This method is specifically capable of tracking and tracing persons of interest. Our system supports the analytical reasoning process of the investigator with automatic analysis, visualization methods, and interaction processing. We show that the automatic tracing method significantly speeds up tracing of persons with clear visual characteristics. Tracing of persons without obvious characteristics is an inherently difficult task, but we show that intelligent use of interactive methods greatly improves the tracing performance of our system.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130651428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the influence of denoising in PRNU based forgery detection 去噪对基于PRNU的伪造检测的影响
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1878002
G. Chierchia, S. Parrilli, G. Poggi, Carlo Sansone, L. Verdoliva
{"title":"On the influence of denoising in PRNU based forgery detection","authors":"G. Chierchia, S. Parrilli, G. Poggi, Carlo Sansone, L. Verdoliva","doi":"10.1145/1877972.1878002","DOIUrl":"https://doi.org/10.1145/1877972.1878002","url":null,"abstract":"To detect some image forgeries one can rely on the Photo-Response Non-Uniformity (PRNU), a deterministic pattern associated with each individual camera, which can be loosely modeled as low-intensity multiplicative noise. A very promising algorithm for PRNU-based forgery detection has been recently proposed by Chen et al. Image denoising is a key step of the algorithm, since it allows to single out and remove most of the signal components and reveal the PRNU pattern. In this work we analyze the influence of denoising on the overall performance of the method and show that the use of a suitable state-of-the art denoising technique improves performance appreciably w.r.t. the original algorithm.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Building fingerprints with information from three color bands for source camera identification 利用三种颜色波段的信息构建指纹,用于源相机识别
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1878001
Yongjian Hu, Chang-Tsun Li, Chao Jian
{"title":"Building fingerprints with information from three color bands for source camera identification","authors":"Yongjian Hu, Chang-Tsun Li, Chao Jian","doi":"10.1145/1877972.1878001","DOIUrl":"https://doi.org/10.1145/1877972.1878001","url":null,"abstract":"The imaging sensor (e.g., CCD, CMOS) pattern noise is a noise-like spread-spectrum signal that mainly consists of the photo-response non-uniformity (PRNU) noise. Since each camera has a unique PRNU, the PRNU becomes a popular fingerprint for source camera identification. Current fingerprints are built based on one color band. To better reflect the intrinsic characteristics of the camera, this work explores the way to build fingerprints based on three color bands of an image.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130775562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Videntifier" Forensic: large-scale video identification in practice “取证”:大规模视频识别的实践
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877973
Herwig Lejsek, Hrönn Þormóðsdóttir, F. Ásmundsson, Kristleifur Daðason, Á. Jóhannsson, B. Jónsson, L. Amsaleg
{"title":"Videntifier\" Forensic: large-scale video identification in practice","authors":"Herwig Lejsek, Hrönn Þormóðsdóttir, F. Ásmundsson, Kristleifur Daðason, Á. Jóhannsson, B. Jónsson, L. Amsaleg","doi":"10.1145/1877972.1877973","DOIUrl":"https://doi.org/10.1145/1877972.1877973","url":null,"abstract":"Identifying videos on seized hard drives and other storage devices is a very tedious and time consuming task for forensic investigators. In particular, the vast amount of available material on the Internet and the large storage capacities of today's hard drives have become a strong headache for them. Videntifier\" Forensic is a recent service for forensic video identification, which is based on state-of-the-art high-dimensional descriptors and high-dimensional indexing. In this paper we describe how Videntifier\" Forensic tackles very large collections of video material and how robust it is towards standard modifications. We then present measurements that involve four different datasets and three collection sizes of up to 25,000 hours of video content. Our results show that Videntifier\" Forensic scales very well, both in terms of the efficiency and effectiveness of the service.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117024707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A videosurveillance data browsing software architecture for forensics: from trajectories similarities to video fragments 一种用于取证的视频监控数据浏览软件架构:从轨迹相似性到视频片段
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877984
Manuel Aravecchia, S. Calderara, Sara Chiossi, R. Cucchiara
{"title":"A videosurveillance data browsing software architecture for forensics: from trajectories similarities to video fragments","authors":"Manuel Aravecchia, S. Calderara, Sara Chiossi, R. Cucchiara","doi":"10.1145/1877972.1877984","DOIUrl":"https://doi.org/10.1145/1877972.1877984","url":null,"abstract":"The information contained in digital video surveillance repositories can present relevant hints, when not even legal evidence, during investigations. As the amount of video data often forbids manual search, some tools have been developed during the past years in order to aid investigators in the look up process. We propose an application for forensic video analysis which aims at analysing the activities in a given scenario, particularly focusing on trajectories followed by people and their visual appearances. The recorded videos can be browsed by investigators thanks to a user-friendly interface, allowing easy information retrieval, through the choice of the best mining strategy. The underlying application architecture implements different feature and query models as well as query optimization strategies in order to return the best response in terms of both efficacy and efficiency.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126310873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Imputing human descriptions in semantic biometrics 语义生物识别中人类描述的输入
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877982
D. Reid, M. Nixon
{"title":"Imputing human descriptions in semantic biometrics","authors":"D. Reid, M. Nixon","doi":"10.1145/1877972.1877982","DOIUrl":"https://doi.org/10.1145/1877972.1877982","url":null,"abstract":"Human identification at a distance has received significant interest due to the ever increasing surveillance infrastructure. Biometrics such as face and gait offer a suitable physical attribute to uniquely identify people from a distance. When linking this with human perception, these biometrics suffer from the semantic gap which is the difference between how people and how biometrics represent and describe humans. Semantic biometrics bridges this gap, allowing conversions between gait biometrics and semantic descriptions. One possible application of semantic biometrics is to automatically search surveillance footage for a person who best matches a given semantic description - possibly obtained from an eyewitness report. We now exploit patterns and structure within the physical descriptions to be able to predict occluded or erroneous data, thereby widening application potential. We show how imputation techniques can be used to increase accuracy and robustness of automatic semantic annotation of gait signatures.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"82 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120981520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A visual tool for forensic analysis of mobile phone traffic 一个可视化工具,用于对移动电话流量进行法医分析
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877992
Salvatore Catanese, G. Fiumara
{"title":"A visual tool for forensic analysis of mobile phone traffic","authors":"Salvatore Catanese, G. Fiumara","doi":"10.1145/1877972.1877992","DOIUrl":"https://doi.org/10.1145/1877972.1877992","url":null,"abstract":"In this paper we present our tool LogAnalysis for forensic visual statistical analysis of mobile phone traffic. LogAnalysis graphically represents the relationships among mobile phone users with a node-link layout. Its aim is to explore the structure of a large graph, measure connectivity among users and give support to visual search and automatic identification of organizations. To do so, LogAnalysis integrates graphical representation of network elements with measures typical of Social Network Analysis (SNA) in order to help detectives or forensic analysts to systematically examine relationships. The analysis of data extracted from mobile phone traffic logs has a fundamental relevance in forensic investigations since it allows to unveil the structure of relationships among individuals suspected to be part of criminal organizations together with the role they play inside the organization itself. To this purpose, the Social Network Analysis (SNA) methods were heavily employed in order to understand the importance of relationships. Interpretation and visual exploration of graphs representing phone contacts over a given time interval may become demanding, due to the presence of numerous nodes and edges. Our main contribution is an interface that enables systematic analysis of social relationships using visual different techniques and statistical information. LogAnalysis allows a deeper and clearer understanding of criminal associations while evidencing key members inside the criminal ring, and/or those working as link among different associations","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133633682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
An automatic transcription system of hearings in Italian courtrooms 意大利法庭听证会的自动转录系统
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877998
D. Falavigna, M. Gerosa, D. Giuliani, R. Gretter
{"title":"An automatic transcription system of hearings in Italian courtrooms","authors":"D. Falavigna, M. Gerosa, D. Giuliani, R. Gretter","doi":"10.1145/1877972.1877998","DOIUrl":"https://doi.org/10.1145/1877972.1877998","url":null,"abstract":"This paper describes and discusses the recognition results obtained using the automatic transcription system developed in our labs, after having adapted it to the judicial domain. The performance has been evaluated on field audio data, formed by about 7 hours of multiply tracks recordings, acquired in two different dates in the Court of Naples. Different sets of acoustic and language models have been used and compared in the system, providing results (word error rate is around 40%) that are in line with those obtained on other comparable Automatic Speech Recognition (ASR) tasks (e.g. meeting transcription)and that leave room for future investigations","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134579041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A game-theoretic system security design for the visible watermarking 基于博弈论的可见水印系统安全设计
MiFor '10 Pub Date : 2010-10-29 DOI: 10.1145/1877972.1877980
Min-Jen Tsai, Jung Liu
{"title":"A game-theoretic system security design for the visible watermarking","authors":"Min-Jen Tsai, Jung Liu","doi":"10.1145/1877972.1877980","DOIUrl":"https://doi.org/10.1145/1877972.1877980","url":null,"abstract":"Digital watermarking has been widely studied and regarded as a potentially effective means for protecting copyright of digital media in recent years. Among different categories of researches for digital watermarking, visible watermarking protect copyrights in a more active way since the approach not only prevents pirates but also visually recognizes the copyrights of multimedia data. However, how to determine the equilibrium of optimal security strategies between encoder and attacker and the optimal tradeoff between the intensity of embedded watermark and the perceptual translucence for visible watermark is becoming a subject of importance. Therefore, in order to achieve the best tradeoff between the embedding energy of watermark, the quality of perceptual watermark translucence and the image fidelity after attacks, a novel game-theoretic system security design for visible watermarking is proposed in this study. The watermark embedding problem is formulated as a dynamic non-cooperative game with complete information while the optimal strategy is defined by the Nash equilibrium of the game. The experimental results demonstrate the feasibility of the proposed approach which allows the watermark encoder to obtain the best watermarking strategy under attacks. Accordingly, our research could help to resolve security issue of visual communication.","PeriodicalId":355677,"journal":{"name":"MiFor '10","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116651461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信