Skip to main content

Showing 1–37 of 37 results for author: AbdAlmageed, W

.
  1. arXiv:2402.10401  [pdf, other

    cs.LG cs.CV

    ManiFPT: Defining and Analyzing Fingerprints of Generative Models

    Authors: Hae ** Song, Mahyar Khayatkhoei, Wael AbdAlmageed

    Abstract: Recent works have shown that generative models leave traces of their underlying generative process on the generated samples, broadly referred to as fingerprints of a generative model, and have studied their utility in detecting synthetic images from real ones. However, the extend to which these fingerprints can distinguish between various types of synthetic image and help identify the underlying g… ▽ More

    Submitted 29 February, 2024; v1 submitted 15 February, 2024; originally announced February 2024.

    Comments: Accepted to CVPR 2024

  2. arXiv:2311.17088  [pdf, other

    cs.CV

    Unsupervised Multimodal Deepfake Detection Using Intra- and Cross-Modal Inconsistencies

    Authors: Mulin Tian, Mahyar Khayatkhoei, Joe Mathai, Wael AbdAlmageed

    Abstract: Deepfake videos present an increasing threat to society with potentially negative impact on criminal justice, democracy, and personal safety and privacy. Meanwhile, detecting deepfakes, at scale, remains a very challenging task that often requires labeled training data from existing deepfake generation methods. Further, even the most accurate supervised deepfake detection methods do not generalize… ▽ More

    Submitted 20 June, 2024; v1 submitted 27 November, 2023; originally announced November 2023.

    Comments: 11 pages, 3 figures, 3 tables

  3. arXiv:2311.07141  [pdf, other

    cs.LG cs.CY

    SABAF: Removing Strong Attribute Bias from Neural Networks with Adversarial Filtering

    Authors: Jiazhi Li, Mahyar Khayatkhoei, Jiageng Zhu, Hanchen Xie, Mohamed E. Hussein, Wael AbdAlmageed

    Abstract: Ensuring a neural network is not relying on protected attributes (e.g., race, sex, age) for prediction is crucial in advancing fair and trustworthy AI. While several promising methods for removing attribute bias in neural networks have been proposed, their limitations remain under-explored. To that end, in this work, we mathematically and empirically reveal the limitation of existing attribute bia… ▽ More

    Submitted 16 November, 2023; v1 submitted 13 November, 2023; originally announced November 2023.

    Comments: 35 pages, 18 figures, 32 tables. This work is an extended version of our paper (arXiv:2310.04955). Code will be released at https://github.com/jiazhi412/strong_attribute_bias

  4. arXiv:2310.04955  [pdf, other

    cs.LG

    Information-Theoretic Bounds on The Removal of Attribute-Specific Bias From Neural Networks

    Authors: Jiazhi Li, Mahyar Khayatkhoei, Jiageng Zhu, Hanchen Xie, Mohamed E. Hussein, Wael AbdAlmageed

    Abstract: Ensuring a neural network is not relying on protected attributes (e.g., race, sex, age) for predictions is crucial in advancing fair and trustworthy AI. While several promising methods for removing attribute bias in neural networks have been proposed, their limitations remain under-explored. In this work, we mathematically and empirically reveal an important limitation of attribute bias removal me… ▽ More

    Submitted 16 November, 2023; v1 submitted 7 October, 2023; originally announced October 2023.

    Comments: 15 pages, 4 figures, 3 tables. To appear in Algorithmic Fairness through the Lens of Time Workshop at NeurIPS 2023

  5. arXiv:2308.05707  [pdf, other

    cs.LG cs.CV

    Shadow Datasets, New challenging datasets for Causal Representation Learning

    Authors: Jiageng Zhu, Hanchen Xie, Jianhua Wu, Jiazhi Li, Mahyar Khayatkhoei, Mohamed E. Hussein, Wael AbdAlmageed

    Abstract: Discovering causal relations among semantic factors is an emergent topic in representation learning. Most causal representation learning (CRL) methods are fully supervised, which is impractical due to costly labeling. To resolve this restriction, weakly supervised CRL methods were introduced. To evaluate CRL performance, four existing datasets, Pendulum, Flow, CelebA(BEARD) and CelebA(SMILE), are… ▽ More

    Submitted 11 August, 2023; v1 submitted 10 August, 2023; originally announced August 2023.

  6. arXiv:2306.09618  [pdf, other

    cs.LG cs.CV

    Emergent Asymmetry of Precision and Recall for Measuring Fidelity and Diversity of Generative Models in High Dimensions

    Authors: Mahyar Khayatkhoei, Wael AbdAlmageed

    Abstract: Precision and Recall are two prominent metrics of generative performance, which were proposed to separately measure the fidelity and diversity of generative models. Given their central role in comparing and improving generative models, understanding their limitations are crucially important. To that end, in this work, we identify a critical flaw in the common approximation of these metrics using k… ▽ More

    Submitted 18 July, 2023; v1 submitted 16 June, 2023; originally announced June 2023.

    Comments: To appear in ICML 2023. Updated proof in Appendix B

  7. arXiv:2306.04877  [pdf, other

    cs.CV cs.CR cs.LG

    Trojan Model Detection Using Activation Optimization

    Authors: Mohamed E. Hussein, Sudharshan Subramaniam Janakiraman, Wael AbdAlmageed

    Abstract: Training machine learning models can be very expensive or even unaffordable. This may be, for example, due to data limitations (unavailability or being too large), or computational power limitations. Therefore, it is a common practice to rely on open-source pre-trained models whenever possible. However, this practice is alarming from a security perspective. Pre-trained models can be infected with… ▽ More

    Submitted 5 February, 2024; v1 submitted 7 June, 2023; originally announced June 2023.

  8. arXiv:2305.07648  [pdf, other

    cs.CV

    A Critical View of Vision-Based Long-Term Dynamics Prediction Under Environment Misalignment

    Authors: Hanchen Xie, Jiageng Zhu, Mahyar Khayatkhoei, Jiazhi Li, Mohamed E. Hussein, Wael AbdAlmageed

    Abstract: Dynamics prediction, which is the problem of predicting future states of scene objects based on current and prior states, is drawing increasing attention as an instance of learning physics. To solve this problem, Region Proposal Convolutional Interaction Network (RPCIN), a vision-based model, was proposed and achieved state-of-the-art performance in long-term prediction. RPCIN only takes raw image… ▽ More

    Submitted 13 June, 2023; v1 submitted 12 May, 2023; originally announced May 2023.

    Comments: 14 pages, 5 figures, 10 tables. Accepted to ICML 2023

  9. arXiv:2207.09107  [pdf, other

    cs.CV cs.AI

    MONet: Multi-scale Overlap Network for Duplication Detection in Biomedical Images

    Authors: Ekraam Sabir, Soumyaroop Nandi, Wael AbdAlmageed, Prem Natarajan

    Abstract: Manipulation of biomedical images to misrepresent experimental results has plagued the biomedical community for a while. Recent interest in the problem led to the curation of a dataset and associated tasks to promote the development of biomedical forensic methods. Of these, the largest manipulation detection task focuses on the detection of duplicated regions between images. Traditional computer-v… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: To appear at ICIP 2022

  10. arXiv:2206.02067  [pdf, other

    cs.LG cs.AI

    Learning Robust Representations Of Generative Models Using Set-Based Artificial Fingerprints

    Authors: Hae ** Song, Wael AbdAlmageed

    Abstract: With recent progress in deep generative models, the problem of identifying synthetic data and comparing their underlying generative processes has become an imperative task for various reasons, including fighting visual misinformation and source attribution. Existing methods often approximate the distance between the models via their sample distributions. In this paper, we approach the problem of f… ▽ More

    Submitted 4 June, 2022; originally announced June 2022.

  11. arXiv:2206.01802  [pdf, other

    cs.LG cs.AI stat.ME

    Do-Operation Guided Causal Representation Learning with Reduced Supervision Strength

    Authors: Jiageng Zhu, Hanchen Xie, Wael AbdAlmageed

    Abstract: Causal representation learning has been proposed to encode relationships between factors presented in the high dimensional data. However, existing methods suffer from merely using a large amount of labeled data and ignore the fact that samples generated by the same causal mechanism follow the same causal relationships. In this paper, we seek to explore such information by leveraging do-operation t… ▽ More

    Submitted 7 November, 2022; v1 submitted 3 June, 2022; originally announced June 2022.

    Comments: NeurIPS 2022 Workshop CML4Impact Workshop Camera Ready

  12. arXiv:2206.00489  [pdf, other

    cs.CV

    Attack-Agnostic Adversarial Detection

    Authors: Jiaxin Cheng, Mohamed Hussein, Jay Billa, Wael AbdAlmageed

    Abstract: The growing number of adversarial attacks in recent years gives attackers an advantage over defenders, as defenders must train detectors after knowing the types of attacks, and many models need to be maintained to ensure good performance in detecting any upcoming attacks. We propose a way to end the tug-of-war between attackers and defenders by treating adversarial attack detection as an anomaly d… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

  13. arXiv:2109.14798  [pdf, other

    cs.LG cs.AI

    Introducing the DOME Activation Functions

    Authors: Mohamed E. Hussein, Wael AbdAlmageed

    Abstract: In this paper, we introduce a novel non-linear activation function that spontaneously induces class-compactness and regularization in the embedding space of neural networks. The function is dubbed DOME for Difference Of Mirrored Exponential terms. The basic form of the function can replace the sigmoid or the hyperbolic tangent functions as an output activation function for binary classification pr… ▽ More

    Submitted 6 December, 2021; v1 submitted 29 September, 2021; originally announced September 2021.

    Comments: 16 pages, 9 figures

    ACM Class: I.2; I.4; I.5

  14. arXiv:2108.12961  [pdf, other

    cs.CV

    BioFors: A Large Biomedical Image Forensics Dataset

    Authors: Ekraam Sabir, Soumyaroop Nandi, Wael AbdAlmageed, Prem Natarajan

    Abstract: Research in media forensics has gained traction to combat the spread of misinformation. However, most of this research has been directed towards content generated on social media. Biomedical image forensics is a related problem, where manipulation or misuse of images reported in biomedical research documents is of serious concern. The problem has failed to gain momentum beyond an academic discussi… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

    Comments: To appear at ICCV 2021

  15. arXiv:2011.11286  [pdf, other

    cs.MM cs.AI cs.CV

    MEG: Multi-Evidence GNN for Multimodal Semantic Forensics

    Authors: Ekraam Sabir, Ayush Jaiswal, Wael AbdAlmageed, Prem Natarajan

    Abstract: Fake news often involves semantic manipulations across modalities such as image, text, location etc and requires the development of multimodal semantic forensics for its detection. Recent research has centered the problem around images, calling it image repurposing -- where a digitally unmanipulated image is semantically misrepresented by means of its accompanying multimodal metadata such as capti… ▽ More

    Submitted 23 November, 2020; originally announced November 2020.

    Comments: To be published at ICPR 2020

  16. arXiv:2010.16038  [pdf, ps, other

    eess.AS

    Adversarial defense for deep speaker recognition using hybrid adversarial training

    Authors: Monisankha Pal, Arindam Jati, Raghuveer Peri, Chin-Cheng Hsu, Wael AbdAlmageed, Shrikanth Narayanan

    Abstract: Deep neural network based speaker recognition systems can easily be deceived by an adversary using minuscule imperceptible perturbations to the input speech samples. These adversarial attacks pose serious security threats to the speaker recognition systems that use speech biometric. To address this concern, in this work, we propose a new defense mechanism based on a hybrid adversarial training (HA… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: Submitted to ICASSP 2021

  17. arXiv:2008.07685  [pdf, other

    eess.AS cs.LG cs.SD

    Adversarial Attack and Defense Strategies for Deep Speaker Recognition Systems

    Authors: Arindam Jati, Chin-Cheng Hsu, Monisankha Pal, Raghuveer Peri, Wael AbdAlmageed, Shrikanth Narayanan

    Abstract: Robust speaker recognition, including in the presence of malicious attacks, is becoming increasingly important and essential, especially due to the proliferation of several smart speakers and personal agents that interact with an individual's voice commands to perform diverse, and even sensitive tasks. Adversarial attack is a recently revived domain which is shown to be effective in breaking deep… ▽ More

    Submitted 17 August, 2020; originally announced August 2020.

  18. arXiv:2008.03412  [pdf, other

    cs.CV cs.CY cs.LG

    Two-branch Recurrent Network for Isolating Deepfakes in Videos

    Authors: Iacopo Masi, Aditya Killekar, Royston Marian Mascarenhas, Shenoy Pratik Gurudatt, Wael AbdAlmageed

    Abstract: The current spike of hyper-realistic faces artificially generated using deepfakes calls for media forensics solutions that are tailored to video streams and work reliably with a low false alarm rate at the video level. We present a method for deepfake detection based on a two-branch network structure that isolates digitally manipulated faces by learning to amplify artifacts while suppressing the h… ▽ More

    Submitted 3 September, 2020; v1 submitted 7 August, 2020; originally announced August 2020.

    Comments: To appear in the 16th European Conference on Computer Vision ECCV 2020 (added link to our demo and to the video presentation)

  19. arXiv:2006.07498  [pdf, other

    cs.CV cs.CR cs.LG

    Multi-Modal Fingerprint Presentation Attack Detection: Evaluation On A New Dataset

    Authors: Leonidas Spinoulas, Hengameh Mirzaalian, Mohamed Hussein, Wael AbdAlmageed

    Abstract: Fingerprint presentation attack detection is becoming an increasingly challenging problem due to the continuous advancement of attack preparation techniques, which generate realistic-looking fake fingerprint presentations. In this work, rather than relying on legacy fingerprint images, which are widely used in the community, we study the usefulness of multiple recently introduced sensing modalitie… ▽ More

    Submitted 16 June, 2020; v1 submitted 12 June, 2020; originally announced June 2020.

  20. arXiv:2006.07489  [pdf, other

    cs.CV cs.CR cs.LG

    Multispectral Biometrics System Framework: Application to Presentation Attack Detection

    Authors: Leonidas Spinoulas, Mohamed Hussein, David Geissbühler, Joe Mathai, Oswin G. Almeida, Guillaume Clivaz, Sébastien Marcel, Wael AbdAlmageed

    Abstract: In this work, we present a general framework for building a biometrics system capable of capturing multispectral data from a series of sensors synchronized with active illumination sources. The framework unifies the system design for different biometric modalities and its realization on face, finger and iris data is described in detail. To the best of our knowledge, the presented design is the fir… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

  21. arXiv:1912.00646  [pdf, other

    cs.LG stat.ML

    Discovery and Separation of Features for Invariant Representation Learning

    Authors: Ayush Jaiswal, Rob Brekelmans, Daniel Moyer, Greg Ver Steeg, Wael AbdAlmageed, Premkumar Natarajan

    Abstract: Supervised machine learning models often associate irrelevant nuisance factors with the prediction target, which hurts generalization. We propose a framework for training robust neural networks that induces invariance to nuisances through learning to discover and separate predictive and nuisance factors of data. We present an information theoretic formulation of our approach, from which we derive… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Comments: 10 pages, 3 figures

  22. arXiv:1911.04060  [pdf, other

    cs.LG stat.ML

    Invariant Representations through Adversarial Forgetting

    Authors: Ayush Jaiswal, Daniel Moyer, Greg Ver Steeg, Wael AbdAlmageed, Premkumar Natarajan

    Abstract: We propose a novel approach to achieving invariance for deep neural networks in the form of inducing amnesia to unwanted factors of data through a new adversarial forgetting mechanism. We show that the forgetting mechanism serves as an information-bottleneck, which is manipulated by the adversarial training to learn invariance to unwanted factors. Empirical results show that the proposed framework… ▽ More

    Submitted 20 November, 2019; v1 submitted 10 November, 2019; originally announced November 2019.

    Comments: To appear in Proceedings of the 34th AAAI Conference on Artificial Intelligence (AAAI-20)

  23. arXiv:1911.00957  [pdf, other

    cs.CV cs.LG eess.IV

    Towards Learning Structure via Consensus for Face Segmentation and Parsing

    Authors: Iacopo Masi, Joe Mathai, Wael AbdAlmageed

    Abstract: Face segmentation is the task of densely labeling pixels on the face according to their semantics. While current methods place an emphasis on develo** sophisticated architectures, use conditional random fields for smoothness, or rather employ adversarial training, we follow an alternative path towards robust face segmentation and parsing. Occlusions, along with other parts of the face, have a pr… ▽ More

    Submitted 28 March, 2020; v1 submitted 3 November, 2019; originally announced November 2019.

    Comments: To appear in the IEEE/CVF Conference on Computer Vision and Pattern Recognition CVPR 2020. Project page at https://github.com/isi-vista/structure_via_consensus

  24. arXiv:1906.02858  [pdf, other

    cs.CV cs.AI cs.LG

    Does Generative Face Completion Help Face Recognition?

    Authors: Joe Mathai, Iacopo Masi, Wael AbdAlmageed

    Abstract: Face occlusions, covering either the majority or discriminative parts of the face, can break facial perception and produce a drastic loss of information. Biometric systems such as recent deep face recognition models are not immune to obstructions or other objects covering parts of the face. While most of the current face recognition methods are not optimized to handle occlusions, there have been a… ▽ More

    Submitted 6 June, 2019; originally announced June 2019.

    Comments: In Proceedings Of IAPR International Conference On Biometrics 2019 (ICB'19)

  25. arXiv:1905.03629  [pdf, other

    cs.LG stat.ML

    Unified Adversarial Invariance

    Authors: Ayush Jaiswal, Yue Wu, Wael AbdAlmageed, Premkumar Natarajan

    Abstract: We present a unified invariance framework for supervised neural networks that can induce independence to nuisance factors of data without using any nuisance annotations, but can additionally use labeled information about biasing factors to force their removal from the latent embedding for making fair predictions. Invariance to nuisance is achieved by learning a split representation of data through… ▽ More

    Submitted 3 September, 2019; v1 submitted 7 May, 2019; originally announced May 2019.

    Comments: In submission to T-PAMI. Some results updated. arXiv admin note: substantial text overlap with arXiv:1809.10083

  26. arXiv:1905.00582  [pdf, other

    cs.CV

    Recurrent Convolutional Strategies for Face Manipulation Detection in Videos

    Authors: Ekraam Sabir, Jiaxin Cheng, Ayush Jaiswal, Wael AbdAlmageed, Iacopo Masi, Prem Natarajan

    Abstract: The spread of misinformation through synthetically generated yet realistic images and videos has become a significant problem, calling for robust manipulation detection methods. Despite the predominant effort of detecting face manipulation in still images, less attention has been paid to the identification of tampered faces in videos by taking advantage of the temporal information present in the s… ▽ More

    Submitted 16 May, 2019; v1 submitted 2 May, 2019; originally announced May 2019.

    Comments: To appear at Workshop on Applications of Computer Vision and Pattern Recognition to Media Forensics at CVPR 2019

  27. arXiv:1903.03691  [pdf, other

    cs.CV cs.LG

    RoPAD: Robust Presentation Attack Detection through Unsupervised Adversarial Invariance

    Authors: Ayush Jaiswal, Shuai Xia, Iacopo Masi, Wael AbdAlmageed

    Abstract: For enterprise, personal and societal applications, there is now an increasing demand for automated authentication of identity from images using computer vision. However, current authentication technologies are still vulnerable to presentation attacks. We present RoPAD, an end-to-end deep learning model for presentation attack detection that employs unsupervised adversarial invariance to ignore vi… ▽ More

    Submitted 20 March, 2019; v1 submitted 8 March, 2019; originally announced March 2019.

    Comments: To appear in Proceedings of International Conference on Biometrics (ICB), 2019

  28. arXiv:1903.00788  [pdf, other

    cs.CV cs.LG

    AIRD: Adversarial Learning Framework for Image Repurposing Detection

    Authors: Ayush Jaiswal, Yue Wu, Wael AbdAlmageed, Iacopo Masi, Premkumar Natarajan

    Abstract: Image repurposing is a commonly used method for spreading misinformation on social media and online forums, which involves publishing untampered images with modified metadata to create rumors and further propaganda. While manual verification is possible, given vast amounts of verified knowledge available on the internet, the increasing prevalence and ease of this form of semantic manipulation call… ▽ More

    Submitted 9 April, 2019; v1 submitted 2 March, 2019; originally announced March 2019.

    Comments: Camera-ready version for the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2019

  29. arXiv:1809.10083  [pdf, other

    cs.LG stat.ML

    Unsupervised Adversarial Invariance

    Authors: Ayush Jaiswal, Yue Wu, Wael AbdAlmageed, Premkumar Natarajan

    Abstract: Data representations that contain all the information about target variables but are invariant to nuisance factors benefit supervised learning algorithms by preventing them from learning associations between these factors and the targets, thus reducing overfitting. We present a novel unsupervised invariance induction framework for neural networks that learns a split representation of data through… ▽ More

    Submitted 26 September, 2018; originally announced September 2018.

    Comments: To appear in Proceedings of NIPS 2018

  30. arXiv:1808.06686  [pdf, other

    cs.MM cs.AI cs.CV cs.LG cs.SI

    Deep Multimodal Image-Repurposing Detection

    Authors: Ekraam Sabir, Wael AbdAlmageed, Yue Wu, Prem Natarajan

    Abstract: Nefarious actors on social media and other platforms often spread rumors and falsehoods through images whose metadata (e.g., captions) have been modified to provide visual substantiation of the rumor/falsehood. This type of modification is referred to as image repurposing, in which often an unmanipulated image is published along with incorrect or manipulated metadata to serve the actor's ulterior… ▽ More

    Submitted 20 August, 2018; originally announced August 2018.

    Comments: To be published at ACM Multimeda 2018 (orals)

  31. arXiv:1806.02146  [pdf, other

    stat.ML cs.LG

    Adversarial Auto-encoders for Speech Based Emotion Recognition

    Authors: Saurabh Sahu, Rahul Gupta, Ganesh Sivaraman, Wael AbdAlmageed, Carol Espy-Wilson

    Abstract: Recently, generative adversarial networks and adversarial autoencoders have gained a lot of attention in machine learning community due to their exceptional performance in tasks such as digit classification and face recognition. They map the autoencoder's bottleneck layer output (termed as code vectors) to different noise Probability Distribution Functions (PDFs), that can be further regularized t… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

    Comments: 5 pages, INTERSPEECH 2017 August 20-24, 2017, Stockholm, Sweden

  32. arXiv:1802.06167  [pdf, other

    stat.ML cs.LG

    CapsuleGAN: Generative Adversarial Capsule Network

    Authors: Ayush Jaiswal, Wael AbdAlmageed, Yue Wu, Premkumar Natarajan

    Abstract: We present Generative Adversarial Capsule Network (CapsuleGAN), a framework that uses capsule networks (CapsNets) instead of the standard convolutional neural networks (CNNs) as discriminators within the generative adversarial network (GAN) setting, while modeling image data. We provide guidelines for designing CapsNet discriminators and the updated GAN objective function, which incorporates the C… ▽ More

    Submitted 2 October, 2018; v1 submitted 16 February, 2018; originally announced February 2018.

    Comments: To appear in Proceedings of ECCV Workshop on Brain Driven Computer Vision (BDCV) 2018

  33. arXiv:1711.07461  [pdf, other

    cs.LG stat.ML

    Bidirectional Conditional Generative Adversarial Networks

    Authors: Ayush Jaiswal, Wael AbdAlmageed, Yue Wu, Premkumar Natarajan

    Abstract: Conditional Generative Adversarial Networks (cGANs) are generative models that can produce data samples ($x$) conditioned on both latent variables ($z$) and known auxiliary information ($c$). We propose the Bidirectional cGAN (BiCoGAN), which effectively disentangles $z$ and $c$ in the generation process and provides an encoder that learns inverse map**s from $x$ to both $z$ and $c$, trained joi… ▽ More

    Submitted 3 November, 2018; v1 submitted 20 November, 2017; originally announced November 2017.

    Comments: To appear in Proceedings of ACCV 2018

  34. arXiv:1707.01606  [pdf, other

    cs.MM cs.AI cs.CV cs.LG

    Multimedia Semantic Integrity Assessment Using Joint Embedding Of Images And Text

    Authors: Ayush Jaiswal, Ekraam Sabir, Wael AbdAlmageed, Premkumar Natarajan

    Abstract: Real world multimedia data is often composed of multiple modalities such as an image or a video with associated text (e.g. captions, user comments, etc.) and metadata. Such multimodal data packages are prone to manipulations, where a subset of these modalities can be altered to misrepresent or repurpose data packages, with possible malicious intent. It is, therefore, important to develop methods t… ▽ More

    Submitted 28 June, 2018; v1 submitted 5 July, 2017; originally announced July 2017.

    Comments: *Ayush Jaiswal and Ekraam Sabir contributed equally to the work in this paper

    Journal ref: In Proceedings of the 2017 ACM on Multimedia Conference, pp. 1465-1471. ACM, 2017

  35. arXiv:1705.09765  [pdf, other

    cs.CV cs.CR

    Deep Matching and Validation Network -- An End-to-End Solution to Constrained Image Splicing Localization and Detection

    Authors: Yue Wu, Wael AbdAlmageed, Prem Natarajan

    Abstract: Image splicing is a very common image manipulation technique that is sometimes used for malicious purposes. A splicing detec- tion and localization algorithm usually takes an input image and produces a binary decision indicating whether the input image has been manipulated, and also a segmentation mask that corre- sponds to the spliced region. Most existing splicing detection and localization pipe… ▽ More

    Submitted 27 May, 2017; originally announced May 2017.

    Comments: 9 pages, 10 figures

  36. arXiv:1603.07388  [pdf, other

    cs.CV

    Face Recognition Using Deep Multi-Pose Representations

    Authors: Wael AbdAlmageed, Yue Wua, Stephen Rawlsa, Shai Harel, Tal Hassner, Iacopo Masi, Jongmoo Choi, Jatuporn Toy Leksut, Jungyeon Kim, Prem Natarajan, Ram Nevatia, Gerard Medioni

    Abstract: We introduce our method and system for face recognition using multiple pose-aware deep learning models. In our representation, a face image is processed by several pose-specific deep convolutional neural network (CNN) models to generate multiple pose-specific features. 3D rendering is used to generate multiple face poses from the input image. Sensitivity of the recognition system to pose variation… ▽ More

    Submitted 23 March, 2016; originally announced March 2016.

    Comments: WACV 2016

  37. arXiv:1505.00529  [pdf, other

    cs.CV

    Learning Document Image Binarization from Data

    Authors: Yue Wu, Stephen Rawls, Wael AbdAlmageed, Premkumar Natarajan

    Abstract: In this paper we present a fully trainable binarization solution for degraded document images. Unlike previous attempts that often used simple features with a series of pre- and post-processing, our solution encodes all heuristics about whether or not a pixel is foreground text into a high-dimensional feature vector and learns a more complicated decision function. In particular, we prepare feature… ▽ More

    Submitted 4 May, 2015; originally announced May 2015.

    Comments: 13 pages, 8 figures