108 research outputs found

    Tattoo based identification: Sketch to image matching

    Full text link

    Exemplar codes for facial attributes and tattoo recognition

    Get PDF
    Abstract When implementing real-world computer vision systems, researchers can use mid-level representations as a tool to adjust the trade-off between accuracy and efficiency. Unfortunately, existing mid-level representations that improve accuracy tend to decrease efficiency, or are specifically tailored to work well within one pipeline or vision problem at the exclusion of others. We introduce a novel, efficient mid-level representation that improves classification efficiency without sacrificing accuracy. Our Exemplar Codes are based on linear classifiers and probability normalization from extreme value theory. We apply Exemplar Codes to two problems: facial attribute extraction and tattoo classification. In these settings, our Exemplar Codes are competitive with the state of the art and offer efficiency benefits, making it possible to achieve high accuracy even on commodity hardware with a low computational budget

    An In-Depth Study on Open-Set Camera Model Identification

    Full text link
    Camera model identification refers to the problem of linking a picture to the camera model used to shoot it. As this might be an enabling factor in different forensic applications to single out possible suspects (e.g., detecting the author of child abuse or terrorist propaganda material), many accurate camera model attribution methods have been developed in the literature. One of their main drawbacks, however, is the typical closed-set assumption of the problem. This means that an investigated photograph is always assigned to one camera model within a set of known ones present during investigation, i.e., training time, and the fact that the picture can come from a completely unrelated camera model during actual testing is usually ignored. Under realistic conditions, it is not possible to assume that every picture under analysis belongs to one of the available camera models. To deal with this issue, in this paper, we present the first in-depth study on the possibility of solving the camera model identification problem in open-set scenarios. Given a photograph, we aim at detecting whether it comes from one of the known camera models of interest or from an unknown one. We compare different feature extraction algorithms and classifiers specially targeting open-set recognition. We also evaluate possible open-set training protocols that can be applied along with any open-set classifier, observing that a simple of those alternatives obtains best results. Thorough testing on independent datasets shows that it is possible to leverage a recently proposed convolutional neural network as feature extractor paired with a properly trained open-set classifier aiming at solving the open-set camera model attribution problem even to small-scale image patches, improving over state-of-the-art available solutions.Comment: Published through IEEE Access journa

    De-identification for privacy protection in multimedia content : A survey

    Get PDF
    This document is the Accepted Manuscript version of the following article: Slobodan Ribaric, Aladdin Ariyaeeinia, and Nikola Pavesic, ‘De-identification for privacy protection in multimedia content: A survey’, Signal Processing: Image Communication, Vol. 47, pp. 131-151, September 2016, doi: https://doi.org/10.1016/j.image.2016.05.020. This manuscript version is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License CC BY NC-ND 4.0 (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way.Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio-video surveillance. Each of these can potentially provide the means for privacy intrusion. De-identification is one of the main approaches to privacy protection in multimedia contents (text, still images, audio and video sequences and their combinations). It is a process for concealing or removing personal identifiers, or replacing them by surrogate personal identifiers in personal information in order to prevent the disclosure and use of data for purposes unrelated to the purpose for which the information was originally obtained. Based on the proposed taxonomy inspired by the Safe Harbour approach, the personal identifiers, i.e., the personal identifiable information, are classified as non-biometric, physiological and behavioural biometric, and soft biometric identifiers. In order to protect the privacy of an individual, all of the above identifiers will have to be de-identified in multimedia content. This paper presents a review of the concepts of privacy and the linkage among privacy, privacy protection, and the methods and technologies designed specifically for privacy protection in multimedia contents. The study provides an overview of de-identification approaches for non-biometric identifiers (text, hairstyle, dressing style, license plates), as well as for the physiological (face, fingerprint, iris, ear), behavioural (voice, gait, gesture) and soft-biometric (body silhouette, gender, age, race, tattoo) identifiers in multimedia documents.Peer reviewe

    Facial Makeup Detection Using HSV Color Space and Texture Analysis

    Get PDF
    Facial Makeup Detection Using HSV Color Space and Texture Analysis In recent decades, 2D and 3D face analyses in digital systems have become increasingly important because of their vast applications in security systems or any digital systems that interact with humans. In fact the human face expresses many of the individual’s characteristics such as gender, ethnicity, emotion, age, beauty and health. Makeup is one of the common techniques used by people to alter the appearance of their faces. Analyzing face beauty by computer is essential to aestheticians and computer scientists. The objective of this research is to detect makeup on images of human faces by image processing and pattern recognition techniques. Detecting changes of face, caused by cosmetics such as eye-shadow, lipstick and liquid foundation, are the targets of this study. Having a proper facial database that consists of the information related to makeup is necessary. Collecting the first facial makeup database was a valuable achievement for this research. This database consists of almost 1290 frontal pictures from 21 individuals before and after makeup. Along with the images, meta data such as ethnicity, country of origin, smoking habits, drinking habits, age, and job is provided. The uniqueness of this database stems from, first being the only database that has images of women both before and after makeup, and second because of having light-source from different angles as well as its meta data collected during the process. Selecting the best features that lead to the best classification result is a challenging issue, since any variation in the head pose, lighting conditions and face orientation can add complexity to a proper evaluation of whether any makeup has been applied or not. In addition, the similarity of cosmetic’s color to the skin color adds another level of difficulty. In this effort, by choosing the best possible features, related to edge information, color specification and texture characteristics this problem was addressed. Because hue and saturation and intensity can be studied separately in HSV (Hue, Saturation, and Value) color space, it is selected for this application. The proposed technique is tested on 120 selected images from our new database. A supervised learning model called SVM (Support Vector Machine) classifier is used and the accuracy obtained is 90.62% for eye-shadow detection, 93.33% for lip-stick and 52.5% for liquid foundation detection respectively. A main highlight of this technique is to specify where makeup has been applied on the face, which can be used to identify the proper makeup style for the individual. This application will be a great improvement in the aesthetic field, through which aestheticians can facilitate their work by identifying the type of makeup appropriate for each person and giving the proper suggestions to the person involved by reducing the number of trials
    • …
    corecore