56 research outputs found

    Selection of relevant information to improve Image Classification using Bag of Visual Words

    Get PDF
    One of the main challenges in computer vision is image classification. Nowadays the number of images increases exponentially every day; therefore, it is important to classify them in a reliable way.The conventional image classification pipeline usually consists on extracting local image features, encoding them as a feature vector and classify them using a previously created model. With regards to feature codification, the Bag of Words model and its extensions, such as pyramid matching and weighted schemes, have achieved quite good results and have become the state of the art methods.The process as mentioned above is not perfect and computers, as well as humans, may make mistakes in any of the steps, causing a performance drop in classification. Some of the primary sources of error on large-scale image classification are the presence of multiple objects in the image, small or very thin objects, incorrect annotations or fine-grained recognition tasks among others.Based on those problems and the steps of a typical image classification pipeline, the motivation of this PhD thesis was to provide some guidelines to improve the quality of the extracted features to obtain better classification results. The contributions of the PhD thesis demonstrated how a good feature selection can contribute to improving the fine-grained classification, and that there would even be no need to have a big training data set to learn the key features of each class and to predict with good results

    Selection of relevant information to improve Image Classification using Bag of Visual Words

    Get PDF
    One of the main challenges in computer vision is image classification. Nowadays the number of images increases exponentially every day; therefore, it is important to classify them in a reliable way.The conventional image classification pipeline usually consists on extracting local image features, encoding them as a feature vector and classify them using a previously created model. With regards to feature codification, the Bag of Words model and its extensions, such as pyramid matching and weighted schemes, have achieved quite good results and have become the state of the art methods.The process as mentioned above is not perfect and computers, as well as humans, may make mistakes in any of the steps, causing a performance drop in classification. Some of the primary sources of error on large-scale image classification are the presence of multiple objects in the image, small or very thin objects, incorrect annotations or fine-grained recognition tasks among others.Based on those problems and the steps of a typical image classification pipeline, the motivation of this PhD thesis was to provide some guidelines to improve the quality of the extracted features to obtain better classification results. The contributions of the PhD thesis demonstrated how a good feature selection can contribute to improving the fine-grained classification, and that there would even be no need to have a big training data set to learn the key features of each class and to predict with good results

    A new species of Hexacladia Ashmead (Hymenoptera, Encyrtidae) and new record of Hexacladia smithii Ashmead as parasitoids of Dichelops furcatus (Fabricius) (Hemiptera, Pentatomidae) in Argentina

    Get PDF
    Pentatomid adults of the species Dichelops furcatus (F.), collected on stubble of soybean, Glycine max (Linnaeus) Merril, in Santa Fe province of Argentina, were found parasitized by two encyrtid wasp species (Hymenoptera: Encyrtidae). One of the encyrtids is described as Hexacladia dichelopsis Torréns & Fidalgo, sp. n., from both sexes, and the other species H. smithii Ashmead, is recorded for the first time from D. furcatus in Argentina. Both species are gregarious endoparasitoids which carry out the whole development (larval and pupal) in their living hosts; they emerge as imagoes, by cutting their way out through the dorsal wall of the abdomen. Including the newly described H. dichelopsis, seven species of the genus are recorded from South America, and an identification key to separate them is presented. Copyright Javier Torréns et al.Fil: Torrens, Javier. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de Catamarca. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Secretaría de Industria y Minería. Servicio Geológico Minero Argentino. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Provincia de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja; ArgentinaFil: Fidalgo, Alberto Antonio P.. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de Catamarca. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Secretaría de Industria y Minería. Servicio Geológico Minero Argentino. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Provincia de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja; ArgentinaFil: Fernández, Celina Ana. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de Catamarca. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Secretaría de Industria y Minería. Servicio Geológico Minero Argentino. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Provincia de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja; ArgentinaFil: Punschke, Eduardo. Universidad Nacional de Rosario; Argentin

    MeWEHV: Mel and Wave Embeddings for Human Voice Tasks

    Get PDF
    [EN] A recent trend in speech processing is the use of embeddings created through machine learning models trained on a specific task with large datasets. By leveraging the knowledge already acquired, these models can be reused in new tasks where the amount of available data is small. This paper proposes a pipeline to create a new model, called Mel and Wave Embeddings for Human Voice Tasks (MeWEHV), capable of generating robust embeddings for speech processing. MeWEHV combines the embeddings generated by a pre-trained raw audio waveform encoder model, and deep features extracted from Mel Frequency Cepstral Coefficients (MFCCs) using Convolutional Neural Networks (CNNs). We evaluate the performance of MeWEHV on three tasks: speaker, language, and accent identification. For the first one, we use the VoxCeleb1, and VBHIR datasets and present YouSpeakers204, a new and publicly available dataset for English speaker identification that contains 19607 audio clips from 204 persons speaking in six different accents, allowing other researchers to work with a very balanced dataset, and to create new models that are robust to multiple accents. For evaluating the language identification task, we use the VoxForge, Common Language, and the LRE17 datasets. Finally, for accent identification, we use the Latin American Spanish Corpora (LASC), Common Voice, and the NISP datasets. Our approach allows a significant increase in the performance of state-of-the-art embedding generation models on all the tested datasets, with a low additional computational cost.SIUnión EuropeaJunta de Castilla y León (EDU/875/2021)This work was supported in part by the European Union's Horizon 2020 Research and Innovation Framework Programme under the Global Response Against Child Exploitation (GRACE) Project under Grant 883341; and in part by the "Ayudas para financiar la contratacion predoctoral de personal investigador" grant of the Government of Castilla y Leon, Spain, under Grant EDU/875/202

    A data augmentation strategy for improving age estimation to support CSEM detection

    Get PDF
    [EN] Leveraging image-based age estimation in preventing Child Sexual Exploitation Material (CSEM) content over the internet is not investigated thoroughly in the research community. While deep learning methods are considered state-of-the-art for general age estimation, they perform poorly in predicting the age group of minors and older adults due to the few examples of these age groups in the existing datasets. In this work, we present a data augmentation strategy to improve the performance of age estimators trained on imbalanced data based on synthetic image generation and artificial facial occlusion. Facial occlusion is focused on modelling as CSEM criminals tend to cover certain parts of the victim, such as the eyes, to hide their identity. The proposed strategy is evaluated using the Soft Stagewise Regression Network (SSR-Net), a compact size age estimator and three publicly available datasets composed mainly of non-occluded images. Therefore, we create the Synthetic Augmented with Occluded Faces (SAOF-15K) dataset to assess the performance of eye and mouthoccluded images. Results show that our strategy improves the performance of the evaluated age estimator

    A Video Summarization Approach to Speed-up the Analysis of Child Sexual Exploitation Material

    Get PDF
    [Abstract] Identifying key content from a video is essential for many security applications such as motion/action detection, person re-identification and recognition. Moreover, summarizing the key information from Child Sexual Exploitation Materials, especially videos, which mainly contain distinctive scenes including people’s faces is crucial to speed-up the investigation of Law Enforcement Agencies. In this paper, we present a video summarization strategy that combines perceptual hashing and face detection algorithms to keep the most relevant frames of a video containing people’s faces that may correspond to victims or offenders. Due to legal constraints to access Child Sexual Abuse datasets, we evaluated the performance of the proposed strategy during the detection of adult pornography content with the NDPI-800 dataset. Also, we assessed the capability of our strategy to create video summaries preserving frames with distinctive faces from the original video using ten additional short videos manually labeled. Results showed that our approach can detect pornography content with an accuracy of 84.15% at a speed of 8.05 ms/frame making this appropriate for realtime applications.This work was supported by the framework agreement between the Universidad de León and INCIBE (Spanish National Cybersecurity Institute) under Addendum 01. Also, this research has been funded with support from the European Commission under the 4NSEEK project with Grant Agreement 821966. This publication reflects the views only of the authors, and the European Commission cannot be held responsible for any use which may be made of the information contained therein. Finally, we acknowledge the NVIDIA Corporation for the donation of the TITAN Xp GPU

    Phishing websites detection using a novel multipurpose dataset and web technologies features

    Get PDF
    [EN] Phishing attacks are one of the most challenging social engineering cyberattacks due to the large amount of entities involved in online transactions and services. In these attacks, criminals deceive users to hijack their credentials or sensitive data through a login form which replicates the original website and submits the data to a malicious server. Many anti-phishing techniques have been developed in recent years, using different resource such as the URL and HTML code from legitimate index websites and phishing ones. These techniques have some limitations when predicting legitimate login websites, since, usually, no login forms are present in the legitimate class used for training the proposed model. Hence, in this work we present a methodology for phishing website detection in real scenarios, which uses URL, HTML, and web technology features. Since there is not any updated and multipurpose dataset for this task, we crafted the Phishing Index Login Websites Dataset (PILWD), an offline phishing dataset composed of 134,000 verified samples, that offers to researchers a wide variety of data to test and compare their approaches. Since approximately three-quarters of collected phishing samples request the introduction of credentials, we decided to crawl legitimate login websites to match the phishing standpoint. The developed approach is independent of third party services and the method relies on a new set of features used for the very first time in this problem, some of them extracted from the web technologies used by the on each specific website. Experimental results show that phishing websites can be detected with 97.95% accuracy using a LightGBM classifier and the complete set of the 54 features selected, when it was evaluated on PILWD dataset.SIINCIBEUniversidad de Leó

    Supervised ranking approach to identify infLuential websites in the darknet

    Get PDF
    [EN] The anonymity and high security of the Tor network allow it to host a significant amount of criminal activities. Some Tor domains attract more traffic than others, as they offer better products or services to their customers. Detecting the most influential domains in Tor can help detect serious criminal activities. Therefore, in this paper, we present a novel supervised ranking framework for detecting the most influential domains. Our approach represents each domain with 40 features extracted from five sources: text, named entities, HTML markup, network topology, and visual content to train the learning-to-rank (LtR) scheme to sort the domains based on user-defined criteria. We experimented on a subset of 290 manually ranked drug-related websites from Tor and obtained the following results. First, among the explored LtR schemes, the listwise approach outperforms the benchmarked methods with an NDCG of 0.93 for the top-10 ranked domains. Second, we quantitatively proved that our framework surpasses the link-based ranking techniques. Third, we observed that using the user-visible text feature can obtain comparable performance to all the features with a decrease of 0.02 at NDCG@5. The proposed framework might support law enforcement agencies in detecting the most influential domains related to possible suspicious activities.SIPublicación en abierto financiada por el Consorcio de Bibliotecas Universitarias de Castilla y León (BUCLE), con cargo al Programa Operativo 2014ES16RFOP009 FEDER 2014-2020 DE CASTILLA Y LEÓN, Actuación:20007-CL - Apoyo Consorcio BUCL

    A survey on methods, datasets and implementations for scene text spotting

    Get PDF
    [EN] Text Spotting is the union of the tasks of detection and transcription of the text that is present in images. Due to the various problems often found when retrieving text, such as orientation, aspect ratio, vertical text or multiple languages in the same image, this can be a challenging task. In this paper, the most recent methods and publications in this field are analysed and compared. Apart from presenting features already seen in other surveys, such as their architectures and performance on different datasets, novel perspectives for comparison are also included, such as the hardware, software, backbone architectures, main problems to solve, or programming languages of the algorithms. The review highlights information often omitted in other studies, providing a better understanding of the current state of research in Text Spotting, from 2016 to 2022, current problems and future trends, as well as establishing a baseline for future methods development, comparison of results and serving as guideline for choosing the most appropriate method to solve a particular problemSIInstituto Nacional de CiberseguridadThis work was supported by the grant “Ayudas para la realización de estudios de doctorado en el marco del programa propio de investigación de la Universidad de León Convocatoria 2018” and also by the framework agreements between the Universidad de León and INCIBE (Spanish National Cybersecurity Institute) under Addendum 22 and Addendum 01. The authors acknowledge the support of NVIDIA Corporation with the donation of the Titan XP GPU used for this research
    corecore