Marco Micheletto

ORCID: 0000-0003-1196-7869
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biometric Identification and Security
  • Forensic Fingerprint Detection Methods
  • Digital Media Forensic Detection
  • Forensic and Genetic Research
  • Face recognition and analysis
  • EEG and Brain-Computer Interfaces
  • Sleep and Work-Related Fatigue
  • User Authentication and Security Systems
  • Anomaly Detection Techniques and Applications
  • Advanced Steganography and Watermarking Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Face and Expression Recognition
  • Gaze Tracking and Assistive Technology
  • Speech Recognition and Synthesis
  • Advanced Malware Detection Techniques
  • Digital and Cyber Forensics
  • Hate Speech and Cyberbullying Detection
  • AI in cancer detection
  • Emotion and Mood Recognition
  • Video Surveillance and Tracking Methods
  • Bullying, Victimization, and Aggression
  • Advanced Image and Video Retrieval Techniques
  • Context-Aware Activity Recognition Systems

University of Cagliari
2018-2025

The International Fingerprint liveness Detection Competition (LivDet) is an open and well-acknowledged meeting point of academies private companies that deal with the problem distinguishing images coming from reproductions fingerprints made artificial materials relative to real fingerprints. In this edition LivDet we invited competitors propose integrated algorithms matching systems. goal was investigate at which extent integration impact on whole performance. Twelve were submitted...

10.1109/icb45273.2019.8987281 preprint EN 2019-06-01

The harmful utilization of DeepFake technology poses a significant threat to public welfare, precipitating crisis in opinion. Existing detection methodologies, predominantly relying on convolutional neural networks and deep learning paradigms, focus achieving high in-domain recognition accuracy amidst many forgery techniques. However, overseeing the intricate interplay between textures artifacts results compromised performance across diverse scenarios. This paper introduces groundbreaking...

10.1016/j.engappai.2024.108450 article EN cc-by Engineering Applications of Artificial Intelligence 2024-04-19

The rise of AI-generated synthetic media, or deepfakes, has introduced unprecedented opportunities and challenges across various fields, including entertainment, cybersecurity, digital communication. Using advanced frameworks such as Generative Adversarial Networks (GANs) Diffusion Models (DMs), deepfakes are capable producing highly realistic yet fabricated content, while these advancements enable creative innovative applications, they also pose severe ethical, social, security risks due to...

10.3390/jimaging11030073 article EN cc-by Journal of Imaging 2025-02-28

The International Fingerprint Liveness Detection Competition is an international biennial competition open to academia and industry with the aim assess report advances in Presentation Attack Detection. proposed "Liveness Action" "Fingerprint representation" challenges were aimed evaluate impact of a PAD embedded into verification system, effectiveness compactness feature sets for mobile applications. Furthermore, we experimented new spoof fabrication method that has particularly affected...

10.1109/ijcb52358.2021.9484399 preprint EN 2021-07-20

Bullying and cyberbullying are harmful social phenomena that involve the intentional, repeated use of power to intimidate or harm others. The ramifications these actions felt not just at individual level but also pervasively throughout society, necessitating immediate attention practical solutions. BullyBuster project pioneers a multi-disciplinary approach, integrating artificial intelligence (AI) techniques with psychological models comprehensively understand combat issues. In particular,...

10.3390/info14080430 article EN cc-by Information 2023-08-01

AI-generated synthetic media, also called Deepfakes, have significantly influenced so many domains, from entertainment to cybersecurity. Generative Adversarial Networks (GANs) and Diffusion Models (DMs) are the main frameworks used create producing highly realistic yet fabricated content. While these technologies open up new creative possibilities, they bring substantial ethical security risks due their potential misuse. The rise of such advanced media has led development a cognitive bias...

10.48550/arxiv.2408.00388 preprint EN arXiv (Cornell University) 2024-08-01

The International Fingerprint Liveness Detection Competition (LivDet) is a biennial event that invites academic and industry participants to prove their advancements in Presentation Attack (PAD). This edition, LivDet2023, proposed two challenges, "Liveness Action" "Fingerprint Representation", evaluate the efficacy of PAD embedded verification systems effectiveness compactness feature sets. A third, "hidden" challenge inclusion subsets training set whose sensor information unknown, testing...

10.1109/ijcb57857.2023.10449291 article EN 2023-09-25

The usual trend for the conventional palmvein recognition techniques is first to extract discriminative hand-crafted feature representations from raw images, and then feed a classifier with them. Unfortunately, it not yet clear how effectiveness of such features may be held in case large user population or environments where variability among acquisitions same person increase. In order face this problem, considered that use multiple classifiers increase performance respect best individual...

10.1109/ipta.2018.8608150 preprint EN 2018-11-01

The diffusion of fingerprint verification systems for security applications makes it urgent to investigate the embedding software-based presentation attack detection algorithms (PAD) into such systems. Companies and institutions need know whether integration would make system more "secure" technology available is ready, and, if so, at what operational working conditions. Despite significant improvements, especially by adopting deep learning approaches PAD, current research did not state much...

10.1109/tifs.2021.3121201 article EN IEEE Transactions on Information Forensics and Security 2021-01-01

The assessment of the fingerprint PADs embedded into a comparison system represents an emerging topic in biometric recognition. Providing models and methods for this aim helps scientists, technologists, companies to simulate multiple scenarios have realistic view process's consequences on recognition system. most recent aimed at deriving overall performance, especially sequential liveness pointed out significant decrease Genuine Acceptance Rate (GAR). In particular, our previous studies...

10.1109/tbiom.2024.3405554 article EN cc-by-nc-nd IEEE Transactions on Biometrics Behavior and Identity Science 2024-05-27

The impact of voice disorders is becoming more widely acknowledged as a public health issue. Several machine learning-based classifiers with the potential to identify have been used in recent studies differentiate between normal and pathological voices sounds. In this paper, we focus on analyzing vulnerabilities these systems by exploring possibility attacks that can reverse classification compromise their reliability. Given critical nature personal information, understanding which types are...

10.48550/arxiv.2410.16341 preprint EN arXiv (Cornell University) 2024-10-21

This study examines the privacy implications of using Human Activity Recognition (HAR) features for violent action detection in fight against bullying. Given sensitive nature such applications, these systems must comply with regulations, as General Data Protection Regulation (GDPR). Our analysis focuses on whether commonly employed HAR particularly regarding risk inadvertently exposing personal identities when data includes biometric information. The findings, derived from development a...

10.1145/3701268.3701288 article EN 2024-12-02

The International Fingerprint Liveness Detection Competition (LivDet) is a biennial event that invites academic and industry participants to prove their advancements in Presentation Attack (PAD). This edition, LivDet2023, proposed two challenges, Action Representation, evaluate the efficacy of PAD embedded verification systems effectiveness compactness feature sets. A third, hidden challenge inclusion subsets training set whose sensor information unknown, testing ability generalize models....

10.48550/arxiv.2309.15578 preprint EN other-oa arXiv (Cornell University) 2023-01-01

In this study we investigate a textural processing method of electroencephalography (EEG) signal as an indicator to estimate the driver's vigilance in hypothetical Brain-Computer Interface (BCI) system. The novelty solution proposed relies on employing one-dimensional Local Binary Pattern (1D-LBP) algorithm for feature extraction from pre-processed EEG data. From resulting vector, classification is done according three classes: awake, tired and drowsy. claim that class transitions can be...

10.1109/icpr48806.2021.9412099 article EN 2022 26th International Conference on Pattern Recognition (ICPR) 2021-01-10

In the last five years, deep learning methods, in particular CNN, have attracted considerable attention field of face-based recognition, achieving impressive results. Despite this progress, it is not yet clear precisely to what extent features are able follow all intra-class variations that face can present over time. paper we investigate performance improvement recognition systems by adopting self updating strategies templates. For purpose, evaluate a well-known deep-learning...

10.1109/ipas50080.2020.9334946 preprint EN 2020-12-09

Fingerprint authentication systems are highly vulnerable to artificial reproductions of fingerprint, called fingerprint presentation attacks. Detecting attacks is not trivial because attackers refine their replication techniques from year year. The International liveness Detection Competition (LivDet), an open and well-acknowledged meeting point academies private companies that deal with the problem attack detection, has goal assess performance detection (FPAD) algorithms by using standard...

10.48550/arxiv.2202.07259 preprint EN other-oa arXiv (Cornell University) 2022-01-01

The problem of interoperability is still open in fingerprint presentation attack detection (PAD) systems. This involves costs for designers and manufacturers who intend to change sensors personal recognition systems or design multi-sensor systems, because they need obtain sensor-specific spoofs retrain the system. solutions proposed state art mitigate require data from target sensor are therefore not exempt obtaining new data. In this paper, we provide insights PAD thanks an overview...

10.3390/app12199941 article EN cc-by Applied Sciences 2022-10-02

In this study we investigate a textural processing method of electroencephalography (EEG) signal as an indicator to estimate the driver's vigilance in hypothetical Brain-Computer Interface (BCI) system. The novelty solution proposed relies on employing one-dimensional Local Binary Pattern (1D-LBP) algorithm for feature extraction from pre-processed EEG data. From resulting vector, classification is done according three classes: awake, tired and drowsy. claim that class transitions can be...

10.48550/arxiv.2010.06412 preprint EN other-oa arXiv (Cornell University) 2020-01-01
Coming Soon ...