Search Results - "Orrù, Giulia"
-
1
A novel classification-selection approach for the self updating of template-based face recognition systems
Published in Pattern recognition (01-04-2020)“…•A classification/selection approach with a maximum number of p templates per user was proposed in order to keep limited the storage and computational…”
Get full text
Journal Article -
2
Recent advances in behavioral and hidden biometrics for personal identification
Published in Pattern recognition letters (01-09-2024)Get full text
Journal Article -
3
Realistic Fingerprint Presentation Attacks Based on an Adversarial Approach
Published in IEEE transactions on information forensics and security (2024)“…Modern Fingerprint Presentation Attack Detection (FPAD) modules have been particularly successful in avoiding attacks exploiting artificial fingerprint…”
Get full text
Journal Article -
4
Texture and artifact decomposition for improving generalization in deep-learning-based deepfake detection
Published in Engineering applications of artificial intelligence (01-07-2024)“…The harmful utilization of DeepFake technology poses a significant threat to public welfare, precipitating a crisis in public opinion. Existing detection…”
Get full text
Journal Article -
5
Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?
Published in IEEE transactions on information forensics and security (2021)“…The diffusion of fingerprint verification systems for security applications makes it urgent to investigate the embedding of software-based presentation attack…”
Get full text
Journal Article -
6
EEG personal recognition based on ‘qualified majority’ over signal patches
Published in IET biometrics (01-01-2022)“…Electroencephalography (EEG)‐based personal recognition in realistic contexts is still a matter of research, with the following issues to be clarified: (1) the…”
Get full text
Journal Article -
7
Mitigating Sensor and Acquisition Method-Dependence of Fingerprint Presentation Attack Detection Systems by Exploiting Data from Multiple Devices
Published in Applied sciences (01-10-2022)“…The problem of interoperability is still open in fingerprint presentation attack detection (PAD) systems. This involves costs for designers and manufacturers…”
Get full text
Journal Article -
8
Analysis of Score-Level Fusion Rules for Deepfake Detection
Published in Applied sciences (01-08-2022)“…Deepfake detection is of fundamental importance to preserve the reliability of multimedia communications. Modern deepfake detection systems are often…”
Get full text
Journal Article -
9
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?
Published in 2020 25th International Conference on Pattern Recognition (ICPR) (10-01-2021)“…We investigated the threat level of realistic attacks using latent fingerprints against sensors equipped with state-of-art liveness detectors and fingerprint…”
Get full text
Conference Proceeding -
10
Automating parasite egg detection: insights from the first AI-KFM challenge
Published in Frontiers in artificial intelligence (29-08-2024)“…In the field of veterinary medicine, the detection of parasite eggs in the fecal samples of livestock animals represents one of the most challenging tasks,…”
Get full text
Journal Article -
11
The Face Deepfake Detection Challenge
Published in Journal of imaging (28-09-2022)“…Multimedia data manipulation and forgery has never been easier than today, thanks to the power of Artificial Intelligence (AI). AI-generated fake content,…”
Get full text
Journal Article -
12
Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project
Published in Information (Basel) (01-08-2023)“…Bullying and cyberbullying are harmful social phenomena that involve the intentional, repeated use of power to intimidate or harm others. The ramifications of…”
Get full text
Journal Article -
13
Electroencephalography signal processing based on textural features for monitoring the driver's state by a Brain-Computer Interface
Published in 2020 25th International Conference on Pattern Recognition (ICPR) (10-01-2021)“…In this study we investigate a textural processing method of electroencephalography (EEG) signal as an indicator to estimate the driver's vigilance in a…”
Get full text
Conference Proceeding -
14
Towards realistic fingerprint presentation attacks: The ScreenSpoof method
Published in Pattern recognition letters (01-07-2023)“…•Fine-quality fingerprint replicas can be created by processing the snapshots of latent marks left on a smartphone screen.•New dataset created with the total…”
Get full text
Journal Article -
15
A multiple classifiers-based approach to palmvein identification
Published in 2018 Eighth International Conference on Image Processing Theory, Tools and Applications (IPTA) (01-11-2018)“…The usual trend for the conventional palmvein recognition techniques is first to extract discriminative hand-crafted feature representations from the raw…”
Get full text
Conference Proceeding -
16
Vulnerabilities in Machine Learning-Based Voice Disorder Detection Systems
Published 21-10-2024“…The impact of voice disorders is becoming more widely acknowledged as a public health issue. Several machine learning-based classifiers with the potential to…”
Get full text
Journal Article -
17
Exploring 3D Face Reconstruction and Fusion Methods for Face Verification: A Case-Study in Video Surveillance
Published 16-09-2024“…3D face reconstruction (3DFR) algorithms are based on specific assumptions tailored to distinct application scenarios. These assumptions limit their use when…”
Get full text
Journal Article -
18
3D Face Reconstruction: the Road to Forensics
Published 20-09-2023“…3D face reconstruction algorithms from images and videos are applied to many fields, from plastic surgery to the entertainment sector, thanks to their…”
Get full text
Journal Article -
19
Fingerprint recognition with embedded presentation attacks detection: are we ready?
Published 20-10-2021“…IEEE Transactions on Information Forensics and Security (2021) The diffusion of fingerprint verification systems for security applications makes it urgent to…”
Get full text
Journal Article -
20
A novel classification-selection approach for the self updating of template-based face recognition systems
Published 28-11-2019“…The boosting on the need of security notably increased the amount of possible facial recognition applications, especially due to the success of the Internet of…”
Get full text
Journal Article