no code implementations • 22 Jul 2022 • Deeraj Nagothu, Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved
The similarity in ENF signal fluctuations is utilized in the PoENF algorithm to authenticate the media broadcasted in conferencing tools.
no code implementations • 9 Mar 2020 • Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch
Adopting unsupervised methods that do not reveal any private information, the I-ViSE scheme utilizes general features of a human body and color of clothes.
no code implementations • 12 Sep 2019 • Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch, Timothy R. Faughnan
This paper presents a forensic surveillance strategy by introducing an Instant Suspicious Activity identiFication at the Edge (I-SAFE) using fuzzy decision making.
1 code implementation • 29 May 2018 • Li Sulimowicz, Ishfaq Ahmad, Alexander Aved
This paper proposes a superpixel-enhanced pairwise CRF framework that consists of the conventional pairwise as well as our proposed superpixel-enhanced pairwise (SP-Pairwise) potentials.
no code implementations • 5 Apr 2018 • Li Sulimowicz, Ishfaq Ahmad, Alexander Aved
Superpixel-based Higher-order Conditional random fields (SP-HO-CRFs) are known for their effectiveness in enforcing both short and long spatial contiguity for pixelwise labelling in computer vision.