Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Güera, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.08771  [pdf, other

    cs.CV

    UPSCALE: Unconstrained Channel Pruning

    Authors: Alvin Wan, Hanxiang Hao, Kaushik Patnaik, Yueyang Xu, Omer Hadad, David Güera, Zhile Ren, Qi Shan

    Abstract: As neural networks grow in size and complexity, inference speeds decline. To combat this, one of the most effective compression techniques -- channel pruning -- removes channels from weights. However, for multi-branch segments of a model, channel removal can introduce inference-time memory copies. In turn, these copies increase inference latency -- so much so that the pruned model can be slower th… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: 29 pages, 26 figures, accepted to ICML 2023

  2. arXiv:2207.10642  [pdf, other

    cs.CV cs.AI

    Generative Multiplane Images: Making a 2D GAN 3D-Aware

    Authors: Xiaoming Zhao, Fangchang Ma, David Güera, Zhile Ren, Alexander G. Schwing, Alex Colburn

    Abstract: What is really needed to make an existing 2D GAN 3D-aware? To answer this question, we modify a classical GAN, i.e., StyleGANv2, as little as possible. We find that only two modifications are absolutely necessary: 1) a multiplane image style generator branch which produces a set of alpha maps conditioned on their depth; 2) a pose-conditioned discriminator. We refer to the generated output as a 'ge… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Comments: ECCV2022; Project Page: https://xiaoming-zhao.github.io/projects/gmpi/

  3. arXiv:2205.01805  [pdf, other

    cs.CV cs.LG eess.IV

    Splicing Detection and Localization In Satellite Imagery Using Conditional GANs

    Authors: Emily R. Bartusiak, Sri Kalyan Yarlagadda, David Güera, Paolo Bestagini, Stefano Tubaro, Fengqing M. Zhu, Edward J. Delp

    Abstract: The widespread availability of image editing tools and improvements in image processing techniques allow image manipulation to be very easy. Oftentimes, easy-to-use yet sophisticated image manipulation tools yields distortions/changes imperceptible to the human observer. Distribution of forged images can have drastic ramifications, especially when coupled with the speed and vastness of the Interne… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

    Comments: Accepted to the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)

    Journal ref: IEEE Conference on Multimedia Information Processing and Retrieval, pp. 91-96, March 2019, San Jose, CA

  4. arXiv:2004.12027  [pdf, other

    cs.CV eess.IV

    Deepfakes Detection with Automatic Face Weighting

    Authors: Daniel Mas Montserrat, Hanxiang Hao, S. K. Yarlagadda, Sriram Baireddy, Ruiting Shao, János Horváth, Emily Bartusiak, Justin Yang, David Güera, Fengqing Zhu, Edward J. Delp

    Abstract: Altered and manipulated multimedia is increasingly present and widely distributed via social media platforms. Advanced video manipulation tools enable the generation of highly realistic-looking altered multimedia. While many methods have been presented to detect manipulations, most of them fail when evaluated with data outside of the datasets used in research environments. In order to address this… ▽ More

    Submitted 4 May, 2020; v1 submitted 24 April, 2020; originally announced April 2020.

  5. arXiv:1910.11367  [pdf, other

    cs.CV

    Learning eating environments through scene clustering

    Authors: Sri Kalyan Yarlagadda, Sriram Baireddy, David Güera, Carol J. Boushey, Deborah A. Kerr, Fengqing Zhu

    Abstract: It is well known that dietary habits have a significant influence on health. While many studies have been conducted to understand this relationship, little is known about the relationship between eating environments and health. Yet researchers and health agencies around the world have recognized the eating environment as a promising context for improving diet and health. In this paper, we propose… ▽ More

    Submitted 9 November, 2019; v1 submitted 24 October, 2019; originally announced October 2019.

  6. arXiv:1906.11979  [pdf, other

    cs.CV cs.CR cs.LG eess.IV

    A Utility-Preserving GAN for Face Obscuration

    Authors: Hanxiang Hao, David Güera, Amy R. Reibman, Edward J. Delp

    Abstract: From TV news to Google StreetView, face obscuration has been used for privacy protection. Due to recent advances in the field of deep learning, obscuration methods such as Gaussian blurring and pixelation are not guaranteed to conceal identity. In this paper, we propose a utility-preserving generative model, UP-GAN, that is able to provide an effective face obscuration, while preserving facial uti… ▽ More

    Submitted 27 June, 2019; originally announced June 2019.

    Comments: 6 pages, 5 figures, presented at the ICML 2019 Worksop on Synthetic Realities: Deep Learning for Detecting AudioVisual Fakes

  7. arXiv:1906.08743  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    We Need No Pixels: Video Manipulation Detection Using Stream Descriptors

    Authors: David Güera, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Manipulating video content is easier than ever. Due to the misuse potential of manipulated content, multiple detection techniques that analyze the pixel data from the videos have been proposed. However, clever manipulators should also carefully forge the metadata and auxiliary header information, which is harder to do for videos than images. In this paper, we propose to identify forged videos by a… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: 7 pages, 6 figures, presented at the ICML 2019 Worksop on Synthetic Realities: Deep Learning for Detecting AudioVisual Fakes

  8. arXiv:1905.05243  [pdf, other

    cs.CV

    Robustness Analysis of Face Obscuration

    Authors: Hanxiang Hao, David Güera, János Horváth, Amy R. Reibman, Edward J. Delp

    Abstract: Face obscuration is needed by law enforcement and mass media outlets to guarantee privacy. Sharing sensitive content where obscuration or redaction techniques have failed to completely remove all identifiable traces can lead to many legal and social issues. Hence, we need to be able to systematically measure the face obscuration performance of a given technique. In this paper we propose to measure… ▽ More

    Submitted 15 October, 2019; v1 submitted 13 May, 2019; originally announced May 2019.

  9. arXiv:1806.07564  [pdf, other

    cs.CV

    Locating Objects Without Bounding Boxes

    Authors: Javier Ribera, David Güera, Yuhao Chen, Edward J. Delp

    Abstract: Recent advances in convolutional neural networks (CNN) have achieved remarkable results in locating objects in images. In these networks, the training procedure usually requires providing bounding boxes or the maximum number of expected objects. In this paper, we address the task of estimating object locations without annotated bounding boxes which are typically hand-drawn and time consuming to la… ▽ More

    Submitted 3 April, 2019; v1 submitted 20 June, 2018; originally announced June 2018.

    Comments: 12 pages, double-column, 8 figures, accepted at Computer Vision and Pattern Recognition (CVPR) 2019

  10. A Counter-Forensic Method for CNN-Based Camera Model Identification

    Authors: David Güera, Yu Wang, Luca Bondi, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: An increasing number of digital images are being shared and accessed through websites, media, and social applications. Many of these images have been modified and are not authentic. Recent advances in the use of deep convolutional neural networks (CNNs) have facilitated the task of analyzing the veracity and authenticity of largely distributed image datasets. We examine in this paper the problem o… ▽ More

    Submitted 5 May, 2018; originally announced May 2018.

    Comments: Presented at the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Workshop on Media Forensics

  11. arXiv:1805.01946  [pdf, other

    cs.CV

    Reliability Map Estimation For CNN-Based Camera Model Attribution

    Authors: David Güera, Sri Kalyan Yarlagadda, Paolo Bestagini, Fengqing Zhu, Stefano Tubaro, Edward J. Delp

    Abstract: Among the image forensic issues investigated in the last few years, great attention has been devoted to blind camera model attribution. This refers to the problem of detecting which camera model has been used to acquire an image by only exploiting pixel information. Solving this problem has great impact on image integrity assessment as well as on authenticity verification. Recent advancements that… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: Presented at the IEEE Winter Conference on Applications of Computer Vision (WACV18)

  12. arXiv:1802.04881  [pdf, other

    cs.CV

    Satellite Image Forgery Detection and Localization Using GAN and One-Class Classifier

    Authors: Sri Kalyan Yarlagadda, David Güera, Paolo Bestagini, Fengqing Maggie Zhu, Stefano Tubaro, Edward J. Delp

    Abstract: Current satellite imaging technology enables shooting high-resolution pictures of the ground. As any other kind of digital images, overhead pictures can also be easily forged. However, common image forensic techniques are often developed for consumer camera images, which strongly differ in their nature from satellite ones (e.g., compression schemes, post-processing, sensors, etc.). Therefore, many… ▽ More

    Submitted 13 February, 2018; originally announced February 2018.

    Comments: Presented at the IS&T International Symposium on Electronic Imaging (EI)

  13. First Steps Toward Camera Model Identification with Convolutional Neural Networks

    Authors: Luca Bondi, Luca Baroffio, David Güera, Paolo Bestagini, Edward J. Delp, Stefano Tubaro

    Abstract: Detecting the camera model used to shoot a picture enables to solve a wide series of forensic problems, from copyright infringement to ownership attribution. For this reason, the forensic community has developed a set of camera model identification algorithms that exploit characteristic traces left on acquired images by the processing pipelines specific of each camera model. In this paper, we inve… ▽ More

    Submitted 26 September, 2017; v1 submitted 3 March, 2016; originally announced March 2016.