Skip to main content

Showing 1–50 of 52 results for author: Delp, E J

.
  1. arXiv:2404.10989  [pdf, other

    cs.CV cs.LG cs.MM cs.SD eess.AS

    FairSSD: Understanding Bias in Synthetic Speech Detectors

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Davide Salvi, Paolo Bestagini, Edward J. Delp

    Abstract: Methods that can generate synthetic speech which is perceptually indistinguishable from speech recorded by a human speaker, are easily available. Several incidents report misuse of synthetic speech generated from these methods to commit fraud. To counter such misuse, many methods have been proposed to detect synthetic speech. Some of these detectors are more interpretable, can generalize to detect… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: Accepted at CVPR 2024 (WMF)

  2. arXiv:2402.14205  [pdf, other

    cs.SD cs.CV cs.LG eess.AS eess.SP

    Compression Robust Synthetic Speech Detection Using Patched Spectrogram Transformer

    Authors: Amit Kumar Singh Yadav, Ziyue Xiang, Kratika Bhagtani, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Many deep learning synthetic speech generation tools are readily available. The use of synthetic speech has caused financial fraud, impersonation of people, and misinformation to spread. For this reason forensic methods that can detect synthetic speech have been proposed. Existing methods often overfit on one dataset and their performance reduces substantially in practical scenarios such as detect… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: Accepted as long oral paper at ICMLA 2023

  3. End-to-end Evaluation of Practical Video Analytics Systems for Face Detection and Recognition

    Authors: Praneet Singh, Edward J. Delp, Amy R. Reibman

    Abstract: Practical video analytics systems that are deployed in bandwidth constrained environments like autonomous vehicles perform computer vision tasks such as face detection and recognition. In an end-to-end face analytics system, inputs are first compressed using popular video codecs like HEVC and then passed onto modules that perform face detection, alignment, and recognition sequentially. Typically,… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: Accepted to Autonomous Vehicles and Machines 2023 Conference, IS&T Electronic Imaging (EI) Symposium

    Journal ref: Electronic Imaging, 2023, pp 111-1 - 111-6

  4. arXiv:2309.12159  [pdf, other

    cs.CR cs.CV

    Information Forensics and Security: A quarter-century-long journey

    Authors: Mauro Barni, Patrizio Campisi, Edward J. Delp, Gwenael Doërr, Jessica Fridrich, Nasir Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu

    Abstract: Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering of solid evidence to hold perpetrators accountable. For over a quarter century since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

  5. arXiv:2309.00199  [pdf, other

    cs.CV cs.AI cs.LG

    Diffusion Model with Clustering-based Conditioning for Food Image Generation

    Authors: Yue Han, Jiangpeng He, Mridul Gupta, Edward J. Delp, Fengqing Zhu

    Abstract: Image-based dietary assessment serves as an efficient and accurate solution for recording and analyzing nutrition intake using eating occasion images as input. Deep learning-based techniques are commonly used to perform image analysis such as food classification, segmentation, and portion size estimation, which rely on large amounts of food images with annotations for training. However, such data… ▽ More

    Submitted 31 August, 2023; originally announced September 2023.

    Comments: Accepted for 31st ACM International Conference on Multimedia: 8th International Workshop on Multimedia Assisted Dietary Management (MADiMa 2023)

  6. arXiv:2305.09810  [pdf, other

    cs.CV

    Semi-Supervised Object Detection for Sorghum Panicles in UAV Imagery

    Authors: Enyu Cai, Jiaqi Guo, Changye Yang, Edward J. Delp

    Abstract: The sorghum panicle is an important trait related to grain yield and plant development. Detecting and counting sorghum panicles can provide significant information for plant phenoty**. Current deep-learning-based object detection methods for panicles require a large amount of training data. The data labeling is time-consuming and not feasible for real application. In this paper, we present an ap… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

  7. arXiv:2304.03323  [pdf, other

    cs.SD cs.CV cs.MM eess.AS

    DSVAE: Interpretable Disentangled Representation for Synthetic Speech Detection

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Tools to generate high quality synthetic speech signal that is perceptually indistinguishable from speech recorded from human speakers are easily available. Several approaches have been proposed for detecting synthetic speech. Many of these approaches use deep learning methods as a black box without providing reasoning for the decisions they make. This limits the interpretability of these approach… ▽ More

    Submitted 28 July, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

  8. arXiv:2301.09702  [pdf, other

    eess.IV cs.CV cs.LG

    Illumination Variation Correction Using Image Synthesis For Unsupervised Domain Adaptive Person Re-Identification

    Authors: Jiaqi Guo, Amy R. Reibman, Edward J. Delp

    Abstract: Unsupervised domain adaptive (UDA) person re-identification (re-ID) aims to learn identity information from labeled images in source domains and apply it to unlabeled images in a target domain. One major issue with many unsupervised re-identification methods is that they do not perform well relative to large domain variations such as illumination, viewpoint, and occlusions. In this paper, we propo… ▽ More

    Submitted 14 November, 2023; v1 submitted 23 January, 2023; originally announced January 2023.

    Comments: 10 pages, 5 figures, 5 tables

  9. Improving Food Detection For Images From a Wearable Egocentric Camera

    Authors: Yue Han, Sri Kalyan Yarlagadda, Tonmoy Ghosh, Fengqing Zhu, Edward Sazonov, Edward J. Delp

    Abstract: Diet is an important aspect of our health. Good dietary habits can contribute to the prevention of many diseases and improve the overall quality of life. To better understand the relationship between diet and health, image-based dietary assessment systems have been developed to collect dietary information. We introduce the Automatic Ingestion Monitor (AIM), a device that can be attached to one's e… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

    Comments: 6 pages, 6 figures, Conference Paper for Imaging and Multimedia Analytics in a Web and Mobile World Conference, IS&T Electronic Imaging Symposium, Burlingame, CA (Virtual), January, 2021

  10. H4VDM: H.264 Video Device Matching

    Authors: Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Methods that can determine if two given video sequences are captured by the same device (e.g., mobile telephone or digital camera) can be used in many forensics tasks. In this paper we refer to this as "video device matching". In open-set video forensics scenarios it is easier to determine if two video sequences were captured with the same device than identifying the specific device. In this paper… ▽ More

    Submitted 22 August, 2023; v1 submitted 20 October, 2022; originally announced October 2022.

  11. arXiv:2210.07546  [pdf, other

    cs.SD cs.CV eess.AS

    Transformer-Based Speech Synthesizer Attribution in an Open Set Scenario

    Authors: Emily R. Bartusiak, Edward J. Delp

    Abstract: Speech synthesis methods can create realistic-sounding speech, which may be used for fraud, spoofing, and misinformation campaigns. Forensic methods that detect synthesized speech are important for protection against such attacks. Forensic attribution methods provide even more information about the nature of synthesized speech signals because they identify the specific speech synthesis method (i.e… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Comments: Accepted to the 2022 IEEE International Conference on Machine Learning and Applications

    Journal ref: IEEE International Conference on Machine Learning and Applications, pp. 1-8, December 2022, Nassau, The Bahamas

  12. arXiv:2205.03947  [pdf, other

    cs.CV eess.IV

    High-Resolution UAV Image Generation for Sorghum Panicle Detection

    Authors: Enyu Cai, Zhankun Luo, Sriram Baireddy, Jiaqi Guo, Changye Yang, Edward J. Delp

    Abstract: The number of panicles (or heads) of Sorghum plants is an important phenotypic trait for plant development and grain yield estimation. The use of Unmanned Aerial Vehicles (UAVs) enables the capability of collecting and analyzing Sorghum images on a large scale. Deep learning can provide methods for estimating phenotypic traits from UAV images but requires a large amount of labeled data. The lack o… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

  13. arXiv:2205.01806  [pdf, other

    cs.SD cs.CV cs.LG eess.AS

    Frequency Domain-Based Detection of Generated Audio

    Authors: Emily R. Bartusiak, Edward J. Delp

    Abstract: Attackers may manipulate audio with the intent of presenting falsified reports, changing an opinion of a public figure, and winning influence and power. The prevalence of inauthentic multimedia continues to rise, so it is imperative to develop a set of tools that determines the legitimacy of media. We present a method that analyzes audio signals to determine whether they contain real human voices… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

    Comments: Accepted to the 2021 Media Watermarking, Security, and Forensics Conference, IS&T Electronic Imaging Symposium (EI)

    Journal ref: Proceedings of the Media Watermarking, Security, and Forensics Conference, IS&T Electronic Imaging Symposium, pp 273-1 - 273-7, January 2021, Burlingame, CA

  14. arXiv:2205.01805  [pdf, other

    cs.CV cs.LG eess.IV

    Splicing Detection and Localization In Satellite Imagery Using Conditional GANs

    Authors: Emily R. Bartusiak, Sri Kalyan Yarlagadda, David Güera, Paolo Bestagini, Stefano Tubaro, Fengqing M. Zhu, Edward J. Delp

    Abstract: The widespread availability of image editing tools and improvements in image processing techniques allow image manipulation to be very easy. Oftentimes, easy-to-use yet sophisticated image manipulation tools yields distortions/changes imperceptible to the human observer. Distribution of forged images can have drastic ramifications, especially when coupled with the speed and vastness of the Interne… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

    Comments: Accepted to the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)

    Journal ref: IEEE Conference on Multimedia Information Processing and Retrieval, pp. 91-96, March 2019, San Jose, CA

  15. arXiv:2205.01800  [pdf, other

    cs.SD cs.CV cs.LG eess.AS

    Synthesized Speech Detection Using Convolutional Transformer-Based Spectrogram Analysis

    Authors: Emily R. Bartusiak, Edward J. Delp

    Abstract: Synthesized speech is common today due to the prevalence of virtual assistants, easy-to-use tools for generating and modifying speech signals, and remote work practices. Synthesized speech can also be used for nefarious purposes, including creating a purported speech signal and attributing it to someone who did not speak the content of the signal. We need methods to detect if a speech signal is sy… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

    Comments: Accepted to the 2021 IEEE Asilomar Conference on Signals, Systems, and Computers

    Journal ref: IEEE Asilomar Conference on Signals, Systems, and Computers, pp. 1426-1430, October 2021, Asilomar, CA

  16. arXiv:2205.00952  [pdf, other

    cs.CV

    Leaf Tar Spot Detection Using RGB Images

    Authors: Sriram Baireddy, Da-Young Lee, Carlos Gongora-Canul, Christian D. Cruz, Edward J. Delp

    Abstract: Tar spot disease is a fungal disease that appears as a series of black circular spots containing spores on corn leaves. Tar spot has proven to be an impactful disease in terms of reducing crop yield. To quantify disease progression, experts usually have to visually phenotype leaves from the plant. This process is very time-consuming and is difficult to incorporate in any high-throughput phenotypin… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  17. arXiv:2204.12067  [pdf, other

    cs.CV cs.MM

    An Overview of Recent Work in Media Forensics: Methods and Threats

    Authors: Kratika Bhagtani, Amit Kumar Singh Yadav, Emily R. Bartusiak, Ziyue Xiang, Ruiting Shao, Sriram Baireddy, Edward J. Delp

    Abstract: In this paper, we review recent work in media forensics for digital images, video, audio (specifically speech), and documents. For each data modality, we discuss synthesis and manipulation techniques that can be used to create and modify digital media. We then review technological advancements for detecting and quantifying such manipulations. Finally, we consider open issues and suggest directions… ▽ More

    Submitted 12 May, 2022; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: This is a longer version of a paper accepted to the 2022 IEEE International Conference on Multimedia Information Processing and Retrieval entitled "An Overview of Recent Work in Multimedia Forensics"

  18. Forensic Analysis and Localization of Multiply Compressed MP3 Audio Using Transformers

    Authors: Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Audio signals are often stored and transmitted in compressed formats. Among the many available audio compression schemes, MPEG-1 Audio Layer III (MP3) is very popular and widely used. Since MP3 is lossy it leaves characteristic traces in the compressed audio which can be used forensically to expose the past history of an audio file. In this paper, we consider the scenario of audio signal manipulat… ▽ More

    Submitted 28 April, 2022; v1 submitted 30 March, 2022; originally announced March 2022.

  19. Forensic Analysis of Synthetically Generated Western Blot Images

    Authors: Sara Mandelli, Davide Cozzolino, Edoardo D. Cannas, Joao P. Cardenuto, Daniel Moreira, Paolo Bestagini, Walter J. Scheirer, Anderson Rocha, Luisa Verdoliva, Stefano Tubaro, Edward J. Delp

    Abstract: The widespread diffusion of synthetically generated content is a serious threat that needs urgent countermeasures. As a matter of fact, the generation of synthetic content is not restricted to multimedia data like videos, photographs or audio sequences, but covers a significantly vast area that can include biological images as well, such as western blot and microscopic images. In this paper, we fo… ▽ More

    Submitted 1 June, 2022; v1 submitted 16 December, 2021; originally announced December 2021.

  20. arXiv:2109.03961  [pdf, other

    cs.CV

    Improving Building Segmentation for Off-Nadir Satellite Imagery

    Authors: Hanxiang Hao, Sriram Baireddy, Kevin LaTourette, Latisha Konz, Moses Chan, Mary L. Comer, Edward J. Delp

    Abstract: Automatic building segmentation is an important task for satellite imagery analysis and scene understanding. Most existing segmentation methods focus on the case where the images are taken from directly overhead (i.e., low off-nadir/viewing angle). These methods often fail to provide accurate results on satellite images with larger off-nadir angles due to the higher noise level and lower spatial r… ▽ More

    Submitted 8 September, 2021; originally announced September 2021.

    Comments: This is an extended version of our ACM SIGSPATIAL'21 conference paper

  21. arXiv:2109.00632  [pdf, other

    cs.CV

    Field-Based Plot Extraction Using UAV RGB Images

    Authors: Changye Yang, Sriram Baireddy, Enyu Cai, Melba Crawford, Edward J. Delp

    Abstract: Unmanned Aerial Vehicles (UAVs) have become popular for use in plant phenoty** of field based crops, such as maize and sorghum, due to their ability to acquire high resolution data over field trials. Field experiments, which may comprise thousands of plants, are planted according to experimental designs to evaluate varieties or management practices. For many types of phenoty** analysis, we exa… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

  22. arXiv:2107.07308  [pdf, ps, other

    eess.IV

    Panicle Counting in UAV Images For Estimating Flowering Time in Sorghum

    Authors: Enyu Cai, Sriram Baireddy, Changye Yang, Melba Crawford, Edward J. Delp

    Abstract: Flowering time (time to flower after planting) is important for estimating plant development and grain yield for many crops including sorghum. Flowering time of sorghum can be approximated by counting the number of panicles (clusters of grains on a branch) across multiple dates. Traditional manual methods for panicle counting are time-consuming and tedious. In this paper, we propose a method for e… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

  23. arXiv:2106.15753  [pdf, ps, other

    eess.IV cs.CV

    RCNN-SliceNet: A Slice and Cluster Approach for Nuclei Centroid Detection in Three-Dimensional Fluorescence Microscopy Images

    Authors: Liming Wu, Shuo Han, Alain Chen, Paul Salama, Kenneth W. Dunn, Edward J. Delp

    Abstract: Robust and accurate nuclei centroid detection is important for the understanding of biological structures in fluorescence microscopy images. Existing automated nuclei localization methods face three main challenges: (1) Most of object detection methods work only on 2D images and are difficult to extend to 3D volumes; (2) Segmentation-based models can be used on 3D volumes but it is computational e… ▽ More

    Submitted 4 November, 2021; v1 submitted 29 June, 2021; originally announced June 2021.

  24. arXiv:2105.12926  [pdf, other

    cs.CV cs.AI

    Image-Based Plant Wilting Estimation

    Authors: Changye Yang, Sriram Baireddy, Enyu Cai, Valerian Meline, Denise Caldwell, Anjali S. Iyer-Pascuzzi, Edward J. Delp

    Abstract: Many plants become limp or droop through heat, loss of water, or disease. This is also known as wilting. In this paper, we examine plant wilting caused by bacterial infection. In particular, we want to design a metric for wilting based on images acquired of the plant. A quantifiable wilting metric will be useful in studying bacterial wilt and identifying resistance genes. Since there is no standar… ▽ More

    Submitted 26 May, 2021; originally announced May 2021.

  25. arXiv:2105.06373  [pdf, other

    eess.IV

    Manipulation Detection in Satellite Images Using Vision Transformer

    Authors: János Horváth, Sriram Baireddy, Hanxiang Hao, Daniel Mas Montserrat, Edward J. Delp

    Abstract: A growing number of commercial satellite companies provide easily accessible satellite imagery. Overhead imagery is used by numerous industries including agriculture, forestry, natural disaster analysis, and meteorology. Satellite images, just as any other images, can be tampered with image manipulation tools. Manipulation detection methods created for images captured by "consumer cameras" tend to… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  26. Forensic Analysis of Video Files Using Metadata

    Authors: Ziyue Xiang, János Horváth, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: The unprecedented ease and ability to manipulate video content has led to a rapid spread of manipulated media. The availability of video editing tools greatly increased in recent years, allowing one to easily generate photo-realistic alterations. Such manipulations can leave traces in the metadata embedded in video files. This metadata information can be used to determine video manipulations, bran… ▽ More

    Submitted 22 January, 2022; v1 submitted 13 May, 2021; originally announced May 2021.

    Comments: v2: fixed a typo in Section 3.4; added page number; added IEEE copyright notice

  27. arXiv:2010.03758  [pdf, other

    cs.CV

    Generative Autoregressive Ensembles for Satellite Imagery Manipulation Detection

    Authors: Daniel Mas Montserrat, János Horváth, S. K. Yarlagadda, Fengqing Zhu, Edward J. Delp

    Abstract: Satellite imagery is becoming increasingly accessible due to the growing number of orbiting commercial satellites. Many applications make use of such images: agricultural management, meteorological prediction, damage assessment from natural disasters, or cartography are some of the examples. Unfortunately, these images can be easily tampered and modified with image manipulation tools damaging down… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

  28. arXiv:2005.06402  [pdf, other

    cs.CV

    FaR-GAN for One-Shot Face Reenactment

    Authors: Hanxiang Hao, Sriram Baireddy, Amy R. Reibman, Edward J. Delp

    Abstract: Animating a static face image with target facial expressions and movements is important in the area of image editing and movie production. This face reenactment process is challenging due to the complex geometry and movement of human faces. Previous work usually requires a large set of images from the same person to model the appearance. In this paper, we present a one-shot face reenactment model,… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

    Comments: This paper has been accepted to the AI for content creation workshop at CVPR 2020

  29. arXiv:2004.13973  [pdf, other

    cs.CV

    Deep Transfer Learning For Plant Center Localization

    Authors: Enyu Cai, Sriram Baireddy, Changye Yang, Melba Crawford, Edward J. Delp

    Abstract: Plant phenoty** focuses on the measurement of plant characteristics throughout the growing season, typically with the goal of evaluating genotypes for plant breeding. Estimating plant location is important for identifying genotypes which have low emergence, which is also related to the environment and management practices such as fertilizer applications. The goal of this paper is to investigate… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

  30. arXiv:2004.12441  [pdf, other

    eess.IV

    Manipulation Detection in Satellite Images Using Deep Belief Networks

    Authors: János Horváth, Daniel Mas Montserrat, Hanxiang Hao, Edward J. Delp

    Abstract: Satellite images are more accessible with the increase of commercial satellites being orbited. These images are used in a wide range of applications including agricultural management, meteorological prediction, damage assessment from natural disasters, and cartography. Image manipulation tools including both manual editing tools and automated techniques can be easily used to tamper and modify sate… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

  31. arXiv:2004.12027  [pdf, other

    cs.CV eess.IV

    Deepfakes Detection with Automatic Face Weighting

    Authors: Daniel Mas Montserrat, Hanxiang Hao, S. K. Yarlagadda, Sriram Baireddy, Ruiting Shao, János Horváth, Emily Bartusiak, Justin Yang, David Güera, Fengqing Zhu, Edward J. Delp

    Abstract: Altered and manipulated multimedia is increasingly present and widely distributed via social media platforms. Advanced video manipulation tools enable the generation of highly realistic-looking altered multimedia. While many methods have been presented to detect manipulations, most of them fail when evaluated with data outside of the datasets used in research environments. In order to address this… ▽ More

    Submitted 4 May, 2020; v1 submitted 24 April, 2020; originally announced April 2020.

  32. arXiv:2004.06643  [pdf, other

    cs.CV

    An Attention-Based System for Damage Assessment Using Satellite Imagery

    Authors: Hanxiang Hao, Sriram Baireddy, Emily R. Bartusiak, Latisha Konz, Kevin LaTourette, Michael Gribbons, Moses Chan, Mary L. Comer, Edward J. Delp

    Abstract: When disaster strikes, accurate situational information and a fast, effective response are critical to save lives. Widely available, high resolution satellite images enable emergency responders to estimate locations, causes, and severity of damage. Quickly and accurately analyzing the extensive amount of satellite imagery available, though, requires an automatic approach. In this paper, we present… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

    Comments: 10 pages, 9 figures

  33. arXiv:2002.02079  [pdf, ps, other

    cs.CV

    Forensic Scanner Identification Using Machine Learning

    Authors: Ruiting Shao, Edward J. Delp

    Abstract: Due to the increasing availability and functionality of image editing tools, many forensic techniques such as digital image authentication, source identification and tamper detection are important for forensic image analysis. In this paper, we describe a machine learning based system to address the forensic analysis of scanner devices. The proposed system uses deep-learning to automatically learn… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

  34. arXiv:2001.08854  [pdf, other

    cs.CV

    Plant Stem Segmentation Using Fast Ground Truth Generation

    Authors: Changye Yang, Sriram Baireddy, Yuhao Chen, Enyu Cai, Denise Caldwell, Valérian Méline, Anjali S. Iyer-Pascuzzi, Edward J. Delp

    Abstract: Accurately phenoty** plant wilting is important for understanding responses to environmental stress. Analysis of the shape of plants can potentially be used to accurately quantify the degree of wilting. Plant shape analysis can be enhanced by locating the stem, which serves as a consistent reference point during wilting. In this paper, we show that deep learning methods can accurately segment to… ▽ More

    Submitted 23 January, 2020; originally announced January 2020.

  35. arXiv:1911.12330  [pdf, other

    cs.CV

    Multi-View Matching Network for 6D Pose Estimation

    Authors: Daniel Mas Montserrat, Jianhang Chen, Qian Lin, Jan P. Allebach, Edward J. Delp

    Abstract: Applications that interact with the real world such as augmented reality or robot manipulation require a good understanding of the location and pose of the surrounding objects. In this paper, we present a new approach to estimate the 6 Degree of Freedom (DoF) or 6D pose of objects from a single RGB image. Our approach can be paired with an object detection and segmentation method to estimate, refi… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

  36. Center-Extraction-Based Three Dimensional Nuclei Instance Segmentation of Fluorescence Microscopy Images

    Authors: David Joon Ho, Shuo Han, Chichen Fu, Paul Salama, Kenneth W. Dunn, Edward J. Delp

    Abstract: Fluorescence microscopy is an essential tool for the analysis of 3D subcellular structures in tissue. An important step in the characterization of tissue involves nuclei segmentation. In this paper, a two-stage method for segmentation of nuclei using convolutional neural networks (CNNs) is described. In particular, since creating labeled volumes manually for training purposes is not practical due… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

    Comments: Presented at the IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI 2019)

  37. arXiv:1906.11979  [pdf, other

    cs.CV cs.CR cs.LG eess.IV

    A Utility-Preserving GAN for Face Obscuration

    Authors: Hanxiang Hao, David Güera, Amy R. Reibman, Edward J. Delp

    Abstract: From TV news to Google StreetView, face obscuration has been used for privacy protection. Due to recent advances in the field of deep learning, obscuration methods such as Gaussian blurring and pixelation are not guaranteed to conceal identity. In this paper, we propose a utility-preserving generative model, UP-GAN, that is able to provide an effective face obscuration, while preserving facial uti… ▽ More

    Submitted 27 June, 2019; originally announced June 2019.

    Comments: 6 pages, 5 figures, presented at the ICML 2019 Worksop on Synthetic Realities: Deep Learning for Detecting AudioVisual Fakes

  38. arXiv:1906.08743  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    We Need No Pixels: Video Manipulation Detection Using Stream Descriptors

    Authors: David Güera, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Manipulating video content is easier than ever. Due to the misuse potential of manipulated content, multiple detection techniques that analyze the pixel data from the videos have been proposed. However, clever manipulators should also carefully forge the metadata and auxiliary header information, which is harder to do for videos than images. In this paper, we propose to identify forged videos by a… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: 7 pages, 6 figures, presented at the ICML 2019 Worksop on Synthetic Realities: Deep Learning for Detecting AudioVisual Fakes

  39. arXiv:1905.05243  [pdf, other

    cs.CV

    Robustness Analysis of Face Obscuration

    Authors: Hanxiang Hao, David Güera, János Horváth, Amy R. Reibman, Edward J. Delp

    Abstract: Face obscuration is needed by law enforcement and mass media outlets to guarantee privacy. Sharing sensitive content where obscuration or redaction techniques have failed to completely remove all identifiable traces can lead to many legal and social issues. Hence, we need to be able to systematically measure the face obscuration performance of a given technique. In this paper we propose to measure… ▽ More

    Submitted 15 October, 2019; v1 submitted 13 May, 2019; originally announced May 2019.

  40. Three dimensional blind image deconvolution for fluorescence microscopy using generative adversarial networks

    Authors: Soonam Lee, Shuo Han, Paul Salama, Kenneth W. Dunn, Edward J. Delp

    Abstract: Due to image blurring image deconvolution is often used for studying biological structures in fluorescence microscopy. Fluorescence microscopy image volumes inherently suffer from intensity inhomogeneity, blur, and are corrupted by various types of noise which exacerbate image quality at deeper tissue depth. Therefore, quantitative analysis of fluorescence microscopy in deeper tissue still remains… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

    Comments: IEEE International Symposium on Biomedical Imaging (ISBI) 2019

  41. arXiv:1807.07149  [pdf, other

    cs.CL cs.MM stat.ML

    A Hand-Held Multimedia Translation and Interpretation System with Application to Diet Management

    Authors: Albert Parra, Andrew W. Haddad, Mireille Boutin, Edward J. Delp

    Abstract: We propose a network independent, hand-held system to translate and disambiguate foreign restaurant menu items in real-time. The system is based on the use of a portable multimedia device, such as a smartphones or a PDA. An accurate and fast translation is obtained using a Machine Translation engine and a context-specific corpora to which we apply two pre-processing steps, called translation stand… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

  42. arXiv:1807.00498  [pdf, other

    cs.CV

    Estimating Phenotypic Traits From UAV Based RGB Imagery

    Authors: Javier Ribera, Fangning He, Yuhao Chen, Ayman F. Habib, Edward J. Delp

    Abstract: In many agricultural applications one wants to characterize physical properties of plants and use the measurements to predict, for example biomass and environmental influence. This process is known as phenoty**. Traditional collection of phenotypic information is labor-intensive and time-consuming. Use of imagery is becoming popular for phenoty**. In this paper, we present methods to estimate… ▽ More

    Submitted 2 July, 2018; originally announced July 2018.

    Comments: 8 pages, double-column

  43. arXiv:1806.07564  [pdf, other

    cs.CV

    Locating Objects Without Bounding Boxes

    Authors: Javier Ribera, David Güera, Yuhao Chen, Edward J. Delp

    Abstract: Recent advances in convolutional neural networks (CNN) have achieved remarkable results in locating objects in images. In these networks, the training procedure usually requires providing bounding boxes or the maximum number of expected objects. In this paper, we address the task of estimating object locations without annotated bounding boxes which are typically hand-drawn and time consuming to la… ▽ More

    Submitted 3 April, 2019; v1 submitted 20 June, 2018; originally announced June 2018.

    Comments: 12 pages, double-column, 8 figures, accepted at Computer Vision and Pattern Recognition (CVPR) 2019

  44. A Counter-Forensic Method for CNN-Based Camera Model Identification

    Authors: David Güera, Yu Wang, Luca Bondi, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: An increasing number of digital images are being shared and accessed through websites, media, and social applications. Many of these images have been modified and are not authentic. Recent advances in the use of deep convolutional neural networks (CNNs) have facilitated the task of analyzing the veracity and authenticity of largely distributed image datasets. We examine in this paper the problem o… ▽ More

    Submitted 5 May, 2018; originally announced May 2018.

    Comments: Presented at the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Workshop on Media Forensics

  45. arXiv:1805.01946  [pdf, other

    cs.CV

    Reliability Map Estimation For CNN-Based Camera Model Attribution

    Authors: David Güera, Sri Kalyan Yarlagadda, Paolo Bestagini, Fengqing Zhu, Stefano Tubaro, Edward J. Delp

    Abstract: Among the image forensic issues investigated in the last few years, great attention has been devoted to blind camera model attribution. This refers to the problem of detecting which camera model has been used to acquire an image by only exploiting pixel information. Solving this problem has great impact on image integrity assessment as well as on authenticity verification. Recent advancements that… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: Presented at the IEEE Winter Conference on Applications of Computer Vision (WACV18)

  46. arXiv:1802.09670  [pdf, ps, other

    cs.CV

    Single-View Food Portion Estimation: Learning Image-to-Energy Map**s Using Generative Adversarial Networks

    Authors: Shaobo Fang, Zeman Shao, Runyu Mao, Chichen Fu, Deborah A. Kerr, Carol J. Boushey, Edward J. Delp, Fengqing Zhu

    Abstract: Due to the growing concern of chronic diseases and other health problems related to diet, there is a need to develop accurate methods to estimate an individual's food and energy intake. Measuring accurate dietary intake is an open research problem. In particular, accurate food portion estimation is challenging since the process of food preparation and consumption impose large variations on food sh… ▽ More

    Submitted 23 May, 2018; v1 submitted 26 February, 2018; originally announced February 2018.

    Comments: 2018 IEEE International Conference on Image Processing

  47. arXiv:1802.04881  [pdf, other

    cs.CV

    Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier

    Authors: Sri Kalyan Yarlagadda, David Güera, Paolo Bestagini, Fengqing Maggie Zhu, Stefano Tubaro, Edward J. Delp

    Abstract: Current satellite imaging technology enables shooting high-resolution pictures of the ground. As any other kind of digital images, overhead pictures can also be easily forged. However, common image forensic techniques are often developed for consumer camera images, which strongly differ in their nature from satellite ones (e.g., compression schemes, post-processing, sensors, etc.). Therefore, many… ▽ More

    Submitted 13 February, 2018; originally announced February 2018.

    Comments: Presented at the IS&T International Symposium on Electronic Imaging (EI)

  48. Tubule segmentation of fluorescence microscopy images based on convolutional neural networks with inhomogeneity correction

    Authors: Soonam Lee, Chichen Fu, Paul Salama, Kenneth W. Dunn, Edward J. Delp

    Abstract: Fluorescence microscopy has become a widely used tool for studying various biological structures of in vivo tissue or cells. However, quantitative analysis of these biological structures remains a challenge due to their complexity which is exacerbated by distortions caused by lens aberrations and light scattering. Moreover, manual quantification of such image volumes is an intractable and error-pr… ▽ More

    Submitted 10 February, 2018; originally announced February 2018.

    Comments: IS&T International Symposium on Electronic Imaging 2018

  49. arXiv:1802.02992  [pdf, ps, other

    cs.CV

    Texture Segmentation Based Video Compression Using Convolutional Neural Networks

    Authors: Chichen Fu, Di Chen, Edward J. Delp, Zoe Liu, Fengqing Zhu

    Abstract: There has been a growing interest in using different approaches to improve the coding efficiency of modern video codec in recent years as demand for web-based video consumption increases. In this paper, we propose a model-based approach that uses texture analysis/synthesis to reconstruct blocks in texture regions of a video to achieve potential coding gains using the AV1 codec developed by the All… ▽ More

    Submitted 8 February, 2018; originally announced February 2018.

  50. arXiv:1801.07198  [pdf, ps, other

    cs.CV cs.LG eess.IV

    Three Dimensional Fluorescence Microscopy Image Synthesis and Segmentation

    Authors: Chichen Fu, Soonam Lee, David Joon Ho, Shuo Han, Paul Salama, Kenneth W. Dunn, Edward J. Delp

    Abstract: Advances in fluorescence microscopy enable acquisition of 3D image volumes with better image quality and deeper penetration into tissue. Segmentation is a required step to characterize and analyze biological structures in the images and recent 3D segmentation using deep learning has achieved promising results. One issue is that deep learning techniques require a large set of groundtruth data which… ▽ More

    Submitted 20 April, 2018; v1 submitted 22 January, 2018; originally announced January 2018.

    Comments: Accepted by CVPR Workshop on Computer Vision for Microscopy Image Analysis (CVMI)