Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2012
Appearance-based people recognition by local dissimilarity representations
MM&Sec '12: Proceedings of the on Multimedia and securityPages 151–156https://doi.org/10.1145/2361407.2361433Among the possible applications of computer vision to video-surveillance, person re-identification over a network of camera sensors, using cues related to clothing appearance, is gaining much interest. Re-identification techniques can be used for ...
- research-articleSeptember 2012
Frontal gait recognition combining 2D and 3D data
MM&Sec '12: Proceedings of the on Multimedia and securityPages 145–150https://doi.org/10.1145/2361407.2361432Automatic human recognition systems based on biometrics are becoming increasingly popular in today's world. In particular, gait recognition (i.e., recognition based on the peculiar manner of walking) is especially interesting since it allows the ...
- research-articleSeptember 2012
An adaptive system for gait recognition in multi-view environments
MM&Sec '12: Proceedings of the on Multimedia and securityPages 139–144https://doi.org/10.1145/2361407.2361431Gait recognition systems often suffer from the challenges when query gaits are under the coupled effects of unknown view angles and large intra-class variations (e.g., wearing a coat). In this paper, we deem it as a two-stage classification problem, ...
- research-articleSeptember 2012
An evaluation of biometric fingerprint matchers in a forensic context using latent impressions
MM&Sec '12: Proceedings of the on Multimedia and securityPages 133–138https://doi.org/10.1145/2361407.2361430Exemplar fingerprints captured directly from a finger are used in biometric systems for authentication purposes. If the quality of the captured image is insufficient for extracting biometric features, it can be easily captured again. In forensics latent ...
- research-articleSeptember 2012
Enhancing face recognition at a distance using super resolution
MM&Sec '12: Proceedings of the on Multimedia and securityPages 123–132https://doi.org/10.1145/2361407.2361429The characteristics of surveillance video generally include low-resolution images and blurred images. Decreases in image resolution lead to loss of high frequency facial components, which is expected to adversely affect recognition rates. Super ...
- research-articleSeptember 2012
A methodological framework for investigating age factors on the performance of biometric systems
MM&Sec '12: Proceedings of the on Multimedia and securityPages 115–122https://doi.org/10.1145/2361407.2361428Any individual's biometric data are likely to change with the passage of time and, as a result, developing biometric applications for long-term use is a challenging task. One of the factors which increases the challenge of dealing with ageing effects in ...
- research-articleSeptember 2012
Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study
MM&Sec '12: Proceedings of the on Multimedia and securityPages 109–114https://doi.org/10.1145/2361407.2361426Although sensor noise is generally known as a very reliable means to uniquely identify digital cameras, care has to be taken with respect to camera model characteristics that may cause false accusations. While earlier reports focused on so-called linear ...
- research-articleSeptember 2012
Recognizing pornographic images
MM&Sec '12: Proceedings of the on Multimedia and securityPages 105–108https://doi.org/10.1145/2361407.2361425We present a novel algorithm for discriminating pornographic and assorted benign images, each categorized into semantic subclasses. The algorithm exploits connectedness and coherence properties in skin image regions in order to capture alarming Regions ...
- research-articleSeptember 2012
A universal technique to hide traces of histogram-based image manipulations
MM&Sec '12: Proceedings of the on Multimedia and securityPages 97–104https://doi.org/10.1145/2361407.2361424We propose a universal counter-forensic technique for concealing traces left on the image histogram by any processing tool. Under the assumption that the forensic analysis relies on first-order statistics only (which is true in many practical ...
- research-articleSeptember 2012
Forensic ballistic analysis using a 3D sensor device
MM&Sec '12: Proceedings of the on Multimedia and securityPages 67–76https://doi.org/10.1145/2361407.2361418The application of non-invasive optical 3D sensing technology for the acquisition of toolmarks and forensic traces from projectiles and cartridges is currently an emerging field of research. In this work we will present a first taxonomy of possible ...
- research-articleSeptember 2012
First approach for a computer-aided textile fiber type determination based on template matching using a 3D laser scanning microscope
MM&Sec '12: Proceedings of the on Multimedia and securityPages 57–66https://doi.org/10.1145/2361407.2361417One main goal of today's forensic textile fiber analysis is the classification of fiber traces. This can be achieved by forensic experts in manual analysis with the help of microscopy. However, this examination process, including an optical matching, is ...
- research-articleSeptember 2012
Frame-accurate temporal registration for non-blind video watermarking
MM&Sec '12: Proceedings of the on Multimedia and securityPages 19–26https://doi.org/10.1145/2361407.2361411Non-blind watermark detection is still relevant in some applications e.g. traitor tracing. In this case, the auxiliary metadata sent to the detector reveals something about the original content. In this paper, we investigate whether such side-...