Visible to the public Biblio

Filters: Keyword is data acquisition process  [Clear All Filters]
2022-05-10
Ion, Valentin, Andrei, Horia, Diaconu, Emil, Puchianu, Dan Constantin, Gheorghe, Andrei Cosmin.  2021.  Modelling the electrical characteristics of video surveillance systems. 2021 7th International Symposium on Electrical and Electronics Engineering (ISEEE). :1–4.
It is not possible to speak about a complete security system without also taking into account the video surveillance system (CCTV). The reason is that CCTV systems offer the most spectacular results both in the security of goods and people and in the field of customer relations, marketing, traffic monitoring and the list can go on. With the development of the software industry the applicability of CCTV systems has greatly increased, largely due to image processing applications. The present paper, which is the continuation of an article already presented at an international conference, aims to shape the electrical characteristics of a common video surveillance system. The proposed method will be validated in two different programming environments.
2020-06-03
Amato, Giuseppe, Falchi, Fabrizio, Gennaro, Claudio, Massoli, Fabio Valerio, Passalis, Nikolaos, Tefas, Anastasios, Trivilini, Alessandro, Vairo, Claudio.  2019.  Face Verification and Recognition for Digital Forensics and Information Security. 2019 7th International Symposium on Digital Forensics and Security (ISDFS). :1—6.

In this paper, we present an extensive evaluation of face recognition and verification approaches performed by the European COST Action MULTI-modal Imaging of FOREnsic SciEnce Evidence (MULTI-FORESEE). The aim of the study is to evaluate various face recognition and verification methods, ranging from methods based on facial landmarks to state-of-the-art off-the-shelf pre-trained Convolutional Neural Networks (CNN), as well as CNN models directly trained for the task at hand. To fulfill this objective, we carefully designed and implemented a realistic data acquisition process, that corresponds to a typical face verification setup, and collected a challenging dataset to evaluate the real world performance of the aforementioned methods. Apart from verifying the effectiveness of deep learning approaches in a specific scenario, several important limitations are identified and discussed through the paper, providing valuable insight for future research directions in the field.