Allan Pinto

ORCID: 0000-0003-3765-8300
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biometric Identification and Security
  • Digital Media Forensic Detection
  • Sports Performance and Training
  • Face recognition and analysis
  • Cell Image Analysis Techniques
  • Handwritten Text Recognition Techniques
  • Sports Analytics and Performance
  • Image Retrieval and Classification Techniques
  • Video Analysis and Summarization
  • Advanced Image and Video Retrieval Techniques
  • Heart Rate Variability and Autonomic Control
  • Sports injuries and prevention
  • Advanced Steganography and Watermarking Techniques
  • Advanced Neural Network Applications
  • Anomaly Detection Techniques and Applications
  • Cardiovascular and exercise physiology
  • Microplastics and Plastic Pollution
  • User Authentication and Security Systems
  • Human Pose and Action Recognition
  • Natural Language Processing Techniques
  • Algorithms and Data Compression
  • Image Processing and 3D Reconstruction
  • Forensic and Genetic Research
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Chemical Sensor Technologies

Universidade Estadual de Campinas (UNICAMP)
2013-2024

Brazilian Center for Research in Energy and Materials
2022-2024

Brazilian Synchrotron Light Laboratory
2022-2024

ORCID
2020-2021

Hospital de Clínicas da Unicamp
2019

University of Notre Dame
2017

Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, global security. However, these might be deceived (or spoofed) and, despite the recent advances spoofing detection, current solutions often rely on domain knowledge, specific biometric reading systems, attack types. We assume a very limited knowledge about at sensor to derive outstanding detection for iris, face, fingerprint modalities based two deep...

10.1109/tifs.2015.2398817 article EN IEEE Transactions on Information Forensics and Security 2015-02-02

Despite important recent advances, the vulnerability of biometric systems to spoofing attacks is still an open problem. Spoof occur when impostor users present synthetic samples a valid user system seeking deceive it. Considering case face biometrics, attack consists in presenting fake sample (e.g., photograph, digital video, or even 3D mask) acquisition sensor with facial information user. In this paper, we introduce low cost and software-based method for detecting attempts recognition...

10.1109/tip.2015.2466088 article EN IEEE Transactions on Image Processing 2015-08-13

Spoofing attacks or impersonation can be easily accomplished in a facial biometric system wherein users without access privileges attempt to authenticate themselves as valid users, which an impostor needs only photograph video with information of legitimate user. Even recent advances biometrics, forensics and security, vulnerability systems against spoofing is still open problem. though several methods have been proposed for photo-based attack detection, performed videos vastly overlooked,...

10.1109/tifs.2015.2395139 article EN IEEE Transactions on Information Forensics and Security 2015-01-21

The study of brain connectivity has been a cornerstone in understanding the complexities neurological and psychiatric disorders. It provided invaluable insights into functional architecture how it is perturbed However, persistent challenge achieving proper spatial resolution, developing computational algorithms to address biological questions at multi-cellular level, scale often referred as mesoscale. Historically, neuroimaging studies have predominantly focused on macroscale, providing...

10.3389/fnins.2024.1340345 article EN cc-by Frontiers in Neuroscience 2024-02-20

As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress recent years. Still, new threats arrive inform of better, more realistic sophisticated spoofing attacks. The objective 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is challenge researchers create counter measures effectively detecting variety submitted propositions are evaluated Replay-Attack database results presented this paper.

10.1109/icb.2013.6613026 article EN 2013-06-01

Recent advances on biometrics, information forensics, and security have improved the accuracy of biometric systems, mainly those based facial information. However, an ever-growing challenge is vulnerability such systems to impostor attacks, in which users without access privileges try authenticate themselves as valid users. In this work, we present a solution video-based face spoofing systems. Such type attack characterized by presenting video real user system. To best our knowledge, first...

10.1109/sibgrapi.2012.38 article EN 2012-08-01

The adoption of large-scale iris recognition systems around the world has brought to light importance detecting presentation attack images (textured contact lenses and printouts). This work presents a new approach in Presentation Attack Detection (PAD), by exploring combinations Convolutional Neural Networks (CNNs) transformed input spaces through binarized statistical image features (BSIF). Our method combines lightweight CNNs classify multiple BSIF views image. Following explorations on...

10.1109/tifs.2018.2878542 article EN IEEE Transactions on Information Forensics and Security 2018-10-30

Prior art has shown it is possible to estimate, through image processing and computer vision techniques, the types parameters of transformations that have been applied content individual images obtain new images. Given a large corpus query image, an interesting further step retrieve set original whose present in as well detailed sequences yield given This problem recently received name provenance analysis. In these times public media manipulation ( <italic...

10.1109/tip.2018.2865674 article EN IEEE Transactions on Image Processing 2018-08-16

Pollution in the form of litter natural environment is one great challenges our times. Automated detection can help assess waste occurrences environment. Different machine learning solutions have been explored to develop tools, thereby supporting research, citizen science, and volunteer clean-up initiatives. However, best knowledge, no work has investigated performance state-of-the-art deep object approaches context detection. In particular, studies focused on assessment those methods aiming...

10.3390/s22020548 article EN cc-by Sensors 2022-01-11

Presentation attack detection is a challenging problem that aims at exposing an impostor user seeking to deceive the authentication system. In facial biometrics systems, this kind of performed using photograph, video, or 3D mask containing biometric information genuine identity. paper, we propose novel approach detecting face presentation attacks based on intrinsic properties scene such as albedo, depth, and reflectance surfaces, which were recovered through shape-from-shading (SfS)...

10.1109/tifs.2020.2988168 article EN IEEE Transactions on Information Forensics and Security 2020-01-01

The aim of this study was to identify the most relevant variables characterise performance level teams through Men's World Championships (2007–2019). Forty-seven attributes from match-related statistics and characteristics players were analysed in 168 participant teams. Descriptive discriminant analysis classified correctly 69.6% cases selected height players, 9-m efficiency, international matches disputed, wing blocked shots, 7-m goalkeeper efficiency 2-min suspensions which indicators....

10.1080/24748668.2019.1694305 article EN International Journal of Performance Analysis in Sport 2019-11-23

Kicking is a fundamental skill in soccer that often contributes to match outcomes. Lower limb movement features (e.g., joint position and velocity) are determinants of kick performance. However, obtaining kicking kinematics under field conditions generally requires time-consuming manual tracking. The current study aimed compare contemporary markerless automatic motion estimation algorithm (OpenPose) with digitisation (DVIDEOW software) on-field kinematic parameters. An experimental dataset...

10.3390/ijerph19031179 article EN International Journal of Environmental Research and Public Health 2022-01-21

Cardiopulmonary exercise testing (CPET) is a non-invasive approach to measure the maximum oxygen uptake ([Formula: see text]), which an index assess cardiovascular fitness (CF). However, CPET not available all populations and cannot be obtained continuously. Thus, wearable sensors are associated with machine learning (ML) algorithms investigate CF. Therefore, this study aimed predict CF by using ML data technologies. For purpose, 43 volunteers different levels of aerobic power, who wore...

10.1371/journal.pone.0282398 article EN cc-by PLoS ONE 2023-03-02

The use of marker-less methods to automatically obtain kinematics movement is expanding but validity high-velocity tasks such as cycling with the presence bicycle on field view needed when standard video footage obtained. purpose this study was assess if pre-trained neural networks are valid for calculations lower limb joint during cycling. Motion twenty-six cyclists pedalling a cycle trainer captured by camera capturing frames from sagittal plane whilst reflective markers were attached...

10.1080/02640414.2023.2194725 article EN cc-by-nc-nd Journal of Sports Sciences 2023-01-02

This article addresses the pixelwise classification problem based on temporal profiles, which are encoded in 2-D representations recurrence plots, Gramian angular/ difference fields, and Markov transition field. We propose a multirepresentational fusion scheme that exploits complementary view provided by those time series different data-driven feature extractors classifiers. validate our ensemble related to of eucalyptus plantations remote sensing images. Achieved results demonstrate...

10.1109/jstars.2020.3012117 article EN cc-by IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2020-01-01

Sports sciences are increasingly data-intensive nowadays since computational tools can extract information from large amounts of data and derive insights athlete performances during the competition. This paper addresses a performance prediction problem in soccer, popular collective sport modality played by two teams competing against each other same field. In soccer game, score points placing ball into opponent’s goal winner is team with highest count goals. Retaining possession one key to...

10.1371/journal.pone.0265372 article EN cc-by PLoS ONE 2023-01-18

X-ray computed microtomography (μCT) is an innovative and nondestructive versatile technique that has been used extensively to investigate bio-based systems in multiple application areas. Emerging progress this field brought countless studies using μCT characterization, revealing three-dimensional (3D) material structures quantifying features such as defects, pores, secondary phases, filler dispersions, internal interfaces. Recently, x-ray tomography (CT) beamlines coupled synchrotron light...

10.1063/5.0129324 article EN cc-by Applied Physics Reviews 2023-04-05

This study investigated the 30-days altitude training (2500 m, LHTH-live and high) on hematological responses aerobic-anaerobic performances parameters of high-level Paralympic athletes. Aerobic capacity was assessed by 3000 m run, anaerobic variables (velocity, force mechanical power) a maximal 30-s semi-tethered running test (AO30). These assessments were carried out at low before (PRE) after LHTH (5-6 15-16 days, POST1 POST2, respectively). During LHTH, analyzes performed days 1, 12, 20...

10.1038/s41598-022-04823-w article EN cc-by Scientific Reports 2022-01-21

Deriving relationships between images and tracing back their history of modifications are at the core Multimedia Phylogeny solutions, which aim to combat misinformation through doctored visual media. Nonetheless, most recent image phylogeny solutions cannot properly address cases forged composite with multiple donors, an area known as parenting (MPP). This paper presents a preliminary undirected graph construction solution for MPP, without any strict assumptions. The algorithm is underpinned...

10.1109/icip.2017.8296535 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2017-09-01

Scene text detection has become an important field in the computer vision area due to increasing number of applications. This is a very challenging problem as textual elements are commonly found "noisy" and complex natural scenes. Another issue refers presence texts encoded into different languages within same image. State-of-the-art solutions rely on use deep neural network approaches or even ensembles them. However, such associated with "heavy" models, which computationally expensive terms...

10.1109/access.2020.3043813 article EN cc-by IEEE Access 2020-01-01

Although several studies have focused on the adaptations provided by inspiratory muscle (IM) training physical demands, warm-up or pre-activation (PA) of these muscles alone appears to generate positive effects physiological responses and performance. This study aimed understand (IMPA) high-intensity running passive recovery, as applied active subjects. In an original innovative investigation impacts IMPA running, we proposed identification interactions among characteristics, oxygenation in...

10.3390/biology11070963 article EN cc-by Biology 2022-06-25

Abstract This study investigated the effects of inspiratory muscle pre-activation (IM PA ) on interactions among technical-tactical, physical, physiological, and psychophysiological parameters in a simulated judo match, based centrality metrics by complex network model. Ten male athletes performed 4 experimental sessions. Firstly, anthropometric measurements, maximal pressure (MIP) global strenght muscles were determined. In following days, all four-minute video-recorded matches, under three...

10.1038/s41598-021-90394-1 article EN cc-by Scientific Reports 2021-05-27

The present study aimed to assess the use of technical-tactical variables and machine learning (ML) classifiers in automatic classification passing difficulty (DP) level soccer matches illustrate model with best performance distinguish players. We compared eight ML according their accuracy classifying events using 35 based on spatiotemporal data. Support Vector Machine (SVM) algorithm achieved a balanced 0.70 ± 0.04%, considering multi-class classification. Next, we best-performing...

10.1371/journal.pone.0304139 article EN cc-by PLoS ONE 2024-05-30
Coming Soon ...