Home
Featured Publications
Publications
Awards
Contact
Light
Dark
Automatic
Digital Image Forensics
Leveraging Shape, Reflectance and Albedo From Shading for Face Presentation Attack Detection
Presentation attack detection is a challenging problem that aims at exposing an impostor user seeking to deceive the authentication …
A. Pinto
,
S. Goldenstein
,
A. Ferreira
,
T. Carvalho
,
H. Pedrini
,
A. Rocha
PDF
Cite
DOI
The Rise of Data-Driven Models in Presentation Attack Detection
Biometric systems are prevalent in access control but are vulnerable to frauds. A typical attempt of violating them is through …
Luis A. M. Pereira
,
Allan Pinto.
,
Fernanda A. Andaló
,
Alexandre M. Ferreira
,
Bahram Lavi
,
Aurea Soriano-Vargas
,
Marcos V. M. Cirne
,
Anderson Rocha
PDF
Cite
DOI
Ensemble of Multi-View Learning Classifiers for Cross-Domain Iris Presentation Attack Detection
The adoption of large-scale iris recognition systems around the world has brought to light the importance of detecting presentation …
A. Kuehlkamp
,
A. Pinto
,
A. Rocha
,
K. W. Bowyer
,
A. Czajka
PDF
Cite
DOI
Image Provenance Analysis at Scale
Prior art has shown it is possible to estimate, through image processing and computer vision techniques, the types and parameters of …
D. Moreira
,
A. Bharati
,
J. Brogan
,
A. Pinto
,
M. Parowski
,
K. W. Bowyer
,
P. J. Flynn
,
A. Rocha
,
W. J. Scheirer
PDF
Cite
DOI
Analysis of intrinsic and extrinsic properties of biometric samples for presentation attack detection
Recent advances in biometrics, information forensics, and security have improved the recognition effectiveness of biometric systems. …
Allan Pinto.
PDF
Cite
Deep Learning in Biometrics
This chapter explores data-driven approaches to presentation attack detection for three biometric modalities: face, iris, and …
Allan Pinto.
,
Helio Pedrini
,
Michael Krumdick
,
Benedict Becker
,
Adam Czajka
,
Kevin W. Bowyer
,
Anderson Rocha
PDF
Cite
Provenance filtering for multimedia phylogeny
Departing from traditional digital forensics modeling, which seeks to analyze single objects in isolation, multimedia phylogeny …
A. Pinto
,
D. Moreira
,
A. Bharati
,
J. Brogan
,
K. Bowyer
,
P. Flynn
,
W. Scheirer
,
A. Rocha
PDF
Cite
DOI
Spotting the difference: Context retrieval and analysis for improved forgery detection and localization
As image tampering becomes ever more sophisticated and commonplace, the need for image forensics algorithms that can accurately and …
J. Brogan
,
P. Bestagini
,
A. Bharati
,
A. Pinto
,
D. Moreira
,
K. Bowyer
,
P. Flynn
,
A. Rocha
,
W. Scheirer
PDF
Cite
DOI
U-Phylogeny: Undirected provenance graph construction in the wild
Deriving relationships between images and tracing back their history of modifications are at the core of Multimedia Phylogeny …
A. Bharati
,
D. Moreira
,
A. Pinto
,
J. Brogan
,
K. Bowyer
,
P. Flynn
,
W. Scheirer
,
A. Rocha
PDF
Cite
DOI
Face Spoofing Detection Through Visual Codebooks of Spectral Temporal Cubes
Despite important recent advances, the vulnerability of biometric systems to spoofing attacks is still an open problem. Spoof attacks …
A. Pinto
,
H. Pedrini
,
W. Robson Schwartz
,
A. Rocha
PDF
Cite
DOI
»
Cite
×