Hélio Pedrini
Hélio Pedrini
Institute of Computing, University of Campinas
Verified email at - Homepage
Cited by
Cited by
Deep representations for iris, face, and fingerprint spoofing detection
D Menotti, G Chiachia, A Pinto, WR Schwartz, H Pedrini, AX Falcao, ...
IEEE Transactions on Information Forensics and Security 10 (4), 864-879, 2015
Análise de Imagens Digitais: Princípios, Algoritmos e Aplicações
Thomson Learning, 2008
Exposing digital image forgeries by illumination color classification
TJ De Carvalho, C Riess, E Angelopoulou, H Pedrini, ...
IEEE Transactions on Information Forensics and Security 8 (7), 1182-1194, 2013
Phase imaging with an untrained neural network
F Wang, Y Bian, H Wang, M Lyu, G Pedrini, W Osten, G Barbastathis, ...
Light: Science & Applications 9 (1), 77, 2020
Multi-scale gray level co-occurrence matrices for texture description
FR De Siqueira, WR Schwartz, H Pedrini
Neurocomputing 120, 336-345, 2013
Competition on counter measures to 2-d facial spoofing attacks
MM Chakka, A Anjos, S Marcel, R Tronci, D Muntoni, G Fadda, M Pili, ...
2011 international joint conference on biometrics (IJCB), 1-6, 2011
Data feature selection based on artificial bee colony algorithm
M Schiezaro, H Pedrini
EURASIP Journal on Image and Video processing 2013, 1-8, 2013
Face spoofing detection through visual codebooks of spectral temporal cubes
A Pinto, H Pedrini, WR Schwartz, A Rocha
IEEE Transactions on image processing 24 (12), 4726-4740, 2015
Face spoofing detection through partial least squares and low-level descriptors
WR Schwartz, A Rocha, H Pedrini
Biometrics (IJCB), 2011 International Joint Conference on, 1-8, 2011
Video-based face spoofing detection through visual rhythm analysis
A da Silva Pinto, H Pedrini, W Schwartz, A Rocha
2012 25th SIBGRAPI Conference on Graphics, Patterns and Images, 221-228, 2012
Using visual rhythms for detecting video-based facial spoof attacks
A Pinto, WR Schwartz, H Pedrini, A de Rezende Rocha
IEEE Transactions on Information Forensics and Security 10 (5), 1025-1038, 2015
The 2nd competition on counter measures to 2D face spoofing attacks
I Chingovska, J Yang, Z Lei, D Yi, SZ Li, O Kahm, C Glaser, N Damer, ...
2013 international conference on biometrics (ICB), 1-6, 2013
Illuminant-based transformed spaces for image forensics
T Carvalho, FA Faria, H Pedrini, RS Torres, A Rocha
IEEE transactions on information forensics and security 11 (4), 720-733, 2015
An approach to iris contact lens detection based on deep image representations
P Silva, E Luz, R Baeta, H Pedrini, AX Falcao, D Menotti
2015 28th SIBGRAPI Conference on Graphics, Patterns and Images, 157-164, 2015
Adaptive edge-preserving image denoising using wavelet transforms
RD da Silva, R Minetto, WR Schwartz, H Pedrini
Pattern Analysis & Applications, 1-14, 2012
An approach to supporting incremental visual data classification
JGS Paiva, WR Schwartz, H Pedrini, R Minghim
IEEE transactions on visualization and computer graphics 21 (1), 4-17, 2014
InVesalius: an interactive rendering framework for health care support
P Amorim, T Moraes, J Silva, H Pedrini
Advances in Visual Computing: 11th International Symposium, ISVC 2015, Las …, 2015
Improved similarity trees and their application to visual data classification
JG Paiva, L Florian, H Pedrini, G Telles, R Minghim
IEEE transactions on visualization and computer graphics 17 (12), 2459-2468, 2011
Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach
E Tokuda, H Pedrini, A Rocha
Journal of Visual Communication and Image Representation 24 (8), 1276-1292, 2013
A comparative evaluation of metrics for fast mesh simplification
O Matias van Kaick, H Pedrini
Computer Graphics Forum 25 (2), 197-210, 2006
The system can't perform the operation now. Try again later.
Articles 1–20