Hélio Pedrini
Hélio Pedrini
Institute of Computing, University of Campinas
Verified email at ic.unicamp.br - Homepage
Title
Cited by
Cited by
Year
Deep representations for iris, face, and fingerprint spoofing detection
D Menotti, G Chiachia, A Pinto, WR Schwartz, H Pedrini, AX Falcao, ...
IEEE Transactions on Information Forensics and Security 10 (4), 864-879, 2015
3822015
Análise de Imagens Digitais: Princípios, Algoritmos e Aplicações
H PEDRINI, WR SCHWARTZ
Thomson Learning, 2008
3402008
Competition on counter measures to 2-d facial spoofing attacks
MM Chakka, A Anjos, S Marcel, R Tronci, D Muntoni, G Fadda, M Pili, ...
2011 International Joint Conference on Biometrics (IJCB), 1-6, 2011
1962011
Exposing digital image forgeries by illumination color classification
TJ De Carvalho, C Riess, E Angelopoulou, H Pedrini, ...
IEEE Transactions on Information Forensics and Security 8 (7), 1182-1194, 2013
1902013
Multi-scale gray level co-occurrence matrices for texture description
FR De Siqueira, WR Schwartz, H Pedrini
Neurocomputing 120, 336-345, 2013
1552013
Face spoofing detection through partial least squares and low-level descriptors
WR Schwartz, A Rocha, H Pedrini
Biometrics (IJCB), 2011 International Joint Conference on, 1-8, 2011
1152011
Video-based face spoofing detection through visual rhythm analysis
A da Silva Pinto, H Pedrini, W Schwartz, A Rocha
2012 25th SIBGRAPI Conference on Graphics, Patterns and Images, 221-228, 2012
1122012
Face spoofing detection through visual codebooks of spectral temporal cubes
A Pinto, H Pedrini, WR Schwartz, A Rocha
IEEE Transactions on Image Processing 24 (12), 4726-4740, 2015
1102015
Data feature selection based on Artificial Bee Colony algorithm
M Schiezaro, H Pedrini
EURASIP Journal on Image and Video Processing 2013 (1), 47, 2013
1102013
The 2nd competition on counter measures to 2D face spoofing attacks
I Chingovska, J Yang, Z Lei, D Yi, SZ Li, O Kahm, C Glaser, N Damer, ...
2013 International Conference on Biometrics (ICB), 1-6, 2013
982013
Using visual rhythms for detecting video-based facial spoof attacks
A Pinto, WR Schwartz, H Pedrini, A de Rezende Rocha
IEEE Transactions on Information Forensics and Security 10 (5), 1025-1038, 2015
912015
A comparative evaluation of metrics for fast mesh simplification
O Matias van Kaick, H Pedrini
Computer Graphics Forum 25 (2), 197-210, 2006
682006
Improved similarity trees and their application to visual data classification
JG Paiva, L Florian, H Pedrini, G Telles, R Minghim
IEEE transactions on visualization and computer graphics 17 (12), 2459-2468, 2011
622011
Illuminant-based transformed spaces for image forensics
T Carvalho, FA Faria, H Pedrini, RS Torres, A Rocha
IEEE transactions on information forensics and security 11 (4), 720-733, 2015
582015
An approach to iris contact lens detection based on deep image representations
P Silva, E Luz, R Baeta, H Pedrini, AX Falcao, D Menotti
2015 28th SIBGRAPI Conference on Graphics, Patterns and Images, 157-164, 2015
562015
Adaptive edge-preserving image denoising using wavelet transforms
RD da Silva, R Minetto, WR Schwartz, H Pedrini
Pattern Analysis & Applications, 1-14, 2012
512012
An approach to supporting incremental visual data classification
JGS Paiva, WR Schwartz, H Pedrini, R Minghim
IEEE transactions on visualization and computer graphics 21 (1), 4-17, 2014
492014
A novel feature descriptor based on the shearlet transform
WR Schwartz, RD Da Silva, LS Davis, H Pedrini
2011 18th IEEE International Conference on Image Processing, 1033-1036, 2011
482011
Electroencephalogram signal classification based on shearlet and contourlet transforms
P Amorim, T Moraes, D Fazanaro, J Silva, H Pedrini
Expert Systems with Applications 67, 140-147, 2017
352017
Dimensionality reduction through PCA over SIFT and SURF descriptors
REG Valenzuela, WR Schwartz, H Pedrini
2012 IEEE 11th International Conference on Cybernetic Intelligent Systems …, 2012
342012
The system can't perform the operation now. Try again later.
Articles 1–20