Zobrazeno 1 - 10
of 72
pro vyhledávání: '"Irene Amerini"'
Publikováno v:
IEEE Access, Vol 12, Pp 131148-131163 (2024)
In this paper, we propose a novel and enhanced approach for crowd counting within the domain of manatee monitoring, aiming to significantly improve efficiency and accuracy. The proposed model achieves state-of-the-art results in the challenging task
Externí odkaz:
https://doaj.org/article/81cdef3b451e4988a824bd304100dc82
Publikováno v:
IEEE Access, Vol 12, Pp 117523-117540 (2024)
Automatic Speaker Verification systems are prone to various voice spoofing attacks such as replays, voice conversion (VC) and speech synthesis. Malicious users can perform specific tasks such as controlling the bank account of someone, taking control
Externí odkaz:
https://doaj.org/article/f27de7eb10ab433e9b97f31ffc02a8e5
Publikováno v:
IEEE Access, Vol 10, Pp 44881-44890 (2022)
The monocular depth estimation (MDE) is the task of estimating depth from a single frame. This information is an essential knowledge in many computer vision tasks such as scene understanding and visual odometry, which are key components in autonomous
Externí odkaz:
https://doaj.org/article/2ccad0144ea94a37b53f7f740036b257
Publikováno v:
EURASIP Journal on Information Security, Vol 2021, Iss 1, Pp 1-19 (2021)
Abstract The dependability of visual information on the web and the authenticity of digital media appearing virally in social media platforms has been raising unprecedented concerns. As a result, in the last years the multimedia forensics research co
Externí odkaz:
https://doaj.org/article/06be9b5b0da9456b97060870239d1f24
Publikováno v:
Sensors, Vol 23, Iss 4, p 2223 (2023)
The knowledge of environmental depth is essential in multiple robotics and computer vision tasks for both terrestrial and underwater scenarios. Moreover, the hardware on which this technology runs, generally IoT and embedded devices, are limited in t
Externí odkaz:
https://doaj.org/article/2407d20e607c4b8386291f0aad56f522
Publikováno v:
IEEE Access, Vol 8, Pp 209657-209659 (2020)
With the prevalence of low-cost imaging devices (smartphones, tablets, camcorders, digital cameras, scanners, wearable, and IoT devices), images and videos have become the main modalities of information being exchanged in every walk of life. The ever
Externí odkaz:
https://doaj.org/article/c64e42fe58b14352b630481fc1eb1bac
Publikováno v:
IEEE Access, Vol 7, Pp 35264-35273 (2019)
Identification of the source social network based on the downloaded images is an important multimedia forensic task with significant cybersecurity implications in light of the sheer volume of images and videos shared across various social media platf
Externí odkaz:
https://doaj.org/article/ac80a4c754434d76b348489fd466bab6
Autor:
Gianmarco Baldini, Irene Amerini
Publikováno v:
IEEE Access, Vol 7, Pp 158685-158696 (2019)
The use of mobile phones or smartphones has become so widespread that most people rely on them for many services and applications like sending e-mails, checking the bank account, accessing cloud platforms, health monitoring, buying on-line and many o
Externí odkaz:
https://doaj.org/article/ad8cc1424c5b4389bb2fa6e8b6fe74b9
Publikováno v:
Journal of Imaging, Vol 7, Iss 11, p 242 (2021)
Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security more an
Externí odkaz:
https://doaj.org/article/bedf6a77d3da4b5591025f21bd5bffdc
Publikováno v:
Journal of Imaging, Vol 7, Iss 8, p 140 (2021)
Videos have become a powerful tool for spreading illegal content such as military propaganda, revenge porn, or bullying through social networks. To counter these illegal activities, it has become essential to try new methods to verify the origin of v
Externí odkaz:
https://doaj.org/article/1314eb0d4f804ccf986a876fd05f0530