Hélio Pedrini
Hélio Pedrini
Institute of Computing, University of Campinas
Verified email at ic.unicamp.br - Homepage
Title
Cited by
Cited by
Year
Deep representations for iris, face, and fingerprint spoofing detection
D Menotti, G Chiachia, A Pinto, WR Schwartz, H Pedrini, AX Falcao, ...
IEEE Transactions on Information Forensics and Security 10 (4), 864-879, 2015
4812015
Análise de Imagens Digitais: Princípios, Algoritmos e Aplicações
H PEDRINI, WR SCHWARTZ
Thomson Learning, 2008
3572008
Exposing digital image forgeries by illumination color classification
TJ De Carvalho, C Riess, E Angelopoulou, H Pedrini, ...
IEEE Transactions on Information Forensics and Security 8 (7), 1182-1194, 2013
2472013
Competition on counter measures to 2-d facial spoofing attacks
MM Chakka, A Anjos, S Marcel, R Tronci, D Muntoni, G Fadda, M Pili, ...
2011 International Joint Conference on Biometrics (IJCB), 1-6, 2011
2042011
Multi-scale gray level co-occurrence matrices for texture description
FR De Siqueira, WR Schwartz, H Pedrini
Neurocomputing 120, 336-345, 2013
1852013
Data feature selection based on Artificial Bee Colony algorithm
M Schiezaro, H Pedrini
EURASIP Journal on Image and Video Processing 2013 (1), 1-8, 2013
1462013
Face spoofing detection through visual codebooks of spectral temporal cubes
A Pinto, H Pedrini, WR Schwartz, A Rocha
IEEE Transactions on Image Processing 24 (12), 4726-4740, 2015
1382015
Video-based face spoofing detection through visual rhythm analysis
A da Silva Pinto, H Pedrini, W Schwartz, A Rocha
2012 25th SIBGRAPI Conference on Graphics, Patterns and Images, 221-228, 2012
1322012
Face spoofing detection through partial least squares and low-level descriptors
WR Schwartz, A Rocha, H Pedrini
Biometrics (IJCB), 2011 International Joint Conference on, 1-8, 2011
1312011
Using visual rhythms for detecting video-based facial spoof attacks
A Pinto, WR Schwartz, H Pedrini, A de Rezende Rocha
IEEE Transactions on Information Forensics and Security 10 (5), 1025-1038, 2015
1162015
The 2nd competition on counter measures to 2D face spoofing attacks
I Chingovska, J Yang, Z Lei, D Yi, SZ Li, O Kahm, C Glaser, N Damer, ...
2013 International Conference on Biometrics (ICB), 1-6, 2013
1102013
Illuminant-based transformed spaces for image forensics
T Carvalho, FA Faria, H Pedrini, RS Torres, A Rocha
IEEE transactions on information forensics and security 11 (4), 720-733, 2015
782015
Phase imaging with an untrained neural network
F Wang, Y Bian, H Wang, M Lyu, G Pedrini, W Osten, G Barbastathis, ...
Light: Science & Applications 9 (1), 1-7, 2020
682020
Improved similarity trees and their application to visual data classification
JG Paiva, L Florian, H Pedrini, G Telles, R Minghim
IEEE transactions on visualization and computer graphics 17 (12), 2459-2468, 2011
672011
A comparative evaluation of metrics for fast mesh simplification
O Matias van Kaick, H Pedrini
Computer Graphics Forum 25 (2), 197-210, 2006
672006
An approach to iris contact lens detection based on deep image representations
P Silva, E Luz, R Baeta, H Pedrini, AX Falcao, D Menotti
2015 28th SIBGRAPI Conference on Graphics, Patterns and Images, 157-164, 2015
662015
Adaptive edge-preserving image denoising using wavelet transforms
RD da Silva, R Minetto, WR Schwartz, H Pedrini
Pattern Analysis & Applications, 1-14, 2012
592012
An approach to supporting incremental visual data classification
JGS Paiva, WR Schwartz, H Pedrini, R Minghim
IEEE transactions on visualization and computer graphics 21 (1), 4-17, 2014
582014
A novel feature descriptor based on the shearlet transform
WR Schwartz, RD Da Silva, LS Davis, H Pedrini
2011 18th IEEE International Conference on Image Processing, 1033-1036, 2011
512011
InVesalius: an interactive rendering framework for health care support
P Amorim, T Moraes, J Silva, H Pedrini
International symposium on visual computing, 45-54, 2015
482015
The system can't perform the operation now. Try again later.
Articles 1–20