Loading...
Research Project
Instituto de Telecomunicações
Funder
Authors
Publications
Light field image coding with flexible viewpoint scalability and random access
Publication . Monteiro, Ricardo J. S.; Rodrigues, Nuno M. M.; Faria, Sérgio M. M.; Nunes, Paulo J. L.
This paper proposes a novel light field image compression approach with viewpoint scalability and random
access functionalities. Although current state-of-the-art image coding algorithms for light fields already achieve
high compression ratios, there is a lack of support for such functionalities, which are important for ensuring
compatibility with different displays/capturing devices, enhanced user interaction and low decoding delay.
The proposed solution enables various encoding profiles with different flexible viewpoint scalability and
random access capabilities, depending on the application scenario. When compared to other state-of-the-art
methods, the proposed approach consistently presents higher bitrate savings (44% on average), namely when
compared to pseudo-video sequence coding approach based on HEVC. Moreover, the proposed scalable codec
also outperforms MuLE and WaSP verification models, achieving average bitrate saving gains of 37% and
47%, respectively. The various flexible encoding profiles proposed add fine control to the image prediction
dependencies, which allow to exploit the tradeoff between coding efficiency and the viewpoint random access,
consequently, decreasing the maximum random access penalties that range from 0.60 to 0.15, for lenslet and
HDCA light fields.
The Digital Footprints on the Run: A Forensic Examination of Android Running Workout Applications
Publication . Nunes, Fabian; Domingues, Patricio; Frade, Miguel
This study applies a forensic examination to six distinct Android fitness applications centered around monitoring running activities. The applications are Adidas Running, MapMyWalk,Nike Run Club, Pumatrac, Runkeeper and Strava. Specifically, we perform a post mortem analysis of each application to find and document artifacts such as timelines and Global Positioning System (GPS) coordinates of running workouts that could prove helpful in digital forensic investigations. First, we focused on the Nike Run Club application and used the gained knowledge to analyze the other applications, taking advantage of their similarity. We began by creating a test environment and using each application during a fixed period. This procedure allowed us to gather testing data, and, to ensure access to all data generated by the apps, we used a rooted Android smartphone. For the
forensic analysis, we examined the data stored by the smartphone application and documented the forensic artifacts found. To ease forensic data processing, we created several Python modules for the well-known Android Logs Events And Protobuf Parser (ALEAPP) digital forensic framework. These modules process the data sources, creating reports with the primary digital artifacts, which include the workout activities and related GPS data.
LOSSY COMPRESSION OF BIOMEDICAL IMAGES FOR COMPUTER VISION ANALYSIS
Publication . Paulo, Edgar da Silva; Faria, Sérgio Manuel Maciel de; Távora, Luís Miguel de Oliveira Pegado de Noronha e; Thomaz, Lucas Arrabal
The exponential increase in medical and biomedical data acquisition is compelled
by technological advances, namely in the imaging field. However, this exponential
growth brings with it challenges in terms of processing capacity, transmission, and
data storage. In response to this growing demand, increasingly efficient solutions
have emerged, especially through computer vision for automatic image analysis and
compression algorithms.
This dissertation aims, on the one hand, to evaluate the performance of computer
vision systems on previously compressed biomedical images. On the other hand, it
increases the useful range of image variations, almost lossless and lossy, decreasing
the impact of the change added by this method on the performance of computer
vision algorithms in biomedical image analysis.
In this sense, YOLO and Detectron2 are employed to evaluate the impact of
coding distortion on their ability to detect mitochondria in electron microscopy
images. The results of this study reveal that although the distortion introduced by
compression affects their detection performance, it is negligible at lower compression
ratios.
Furthermore, two proposals are presented to improve the useful compression ratio,
keeping the images characteristics that allow to perform the automatic detection
of mitochondria. On the one hand, it is demonstrated that the proposed training
methodology, which incorporates compressed versions of the original data during
training, mitigates the impact of distortion on the performance of computer vision
algorithms; on the other hand, allocating higher quality levels to regions of interest,
compared to background elements, helps to sustain high performance at compression
rates where computer vision algorithms typically start to lose effectiveness. These
approaches allow the extension of the compression range with little impact on
detection performance, thus contributing to the improvement of data processing,
storage, and transmission in biomedical applications.
Fine-tuning pre-trained neural networks for medical image classification in small clinical datasets
Publication . Spolaôr, Newton; Lee, Huei Diana; Mendes, Ana Isabel; Nogueira, Conceição; Parmezan, Antonio Rafael Sabino; Takaki, Weber Shoity Resende; Coy, Claudio Saddy Rodrigues; Wu, Feng Chung; Fonseca-Pinto, Rui
Convolutional neural networks have been effective in several applications, arising as a promising supporting tool in a relevant Dermatology problem: skin cancer diagnosis. However, generalizing well can be difficult when little training data is available. The fine-tuning transfer learning strategy has been employed to differentiate properly malignant from non-malignant lesions in dermoscopic images. Fine-tuning a pre-trained network allows one to classify data in the target domain, occasionally with few images, using knowledge acquired in another domain. This work proposes eight fine-tuning settings based on convolutional networks previously trained on ImageNet that can be employed mainly in limited data samples to reduce overfitting risk. They differ on the architecture, the learning rate and the number of unfrozen layer blocks. We evaluated the settings in two public datasets with 104 and 200 dermoscopic images. By finding competitive configurations in small datasets, this paper illustrates that deep learning can be effective if one has only a few dozen malignant and non-malignant lesion images to study and differentiate in Dermatology. The proposal is also flexible and potentially useful for other domains. In fact, it performed satisfactorily in an assessment conducted in a larger dataset with 746 computerized tomographic images associated with the coronavirus disease.
Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11
Publication . Domingues, Patricio; Frade, Miguel; Negrão, Miguel
FIDO2’s passkey aims to provide a passwordless authentication solution. It relies on two main protocols – WebAuthn and CTAP2 – for authentication in computer systems, relieving users from the burden of using and managing passwords. FIDO2’s passkey leverages asymmetric cryptography to create a unique public/private
key pair for website authentication. While the public key is kept at the website/application, the private key is created and stored on the authentication device designated as the authenticator. The authenticator can be the computer itself – same-device signing –, or another device – cross-device signing –, such as an Android smartphone that connects to the computer through a short-range communication method (NFC, Bluetooth). Authentication is performed by the user unlocking the authenticator device. In this paper, we report on the digital forensic artifacts left on Windows 11 systems by registering and using passkeys to authenticate on websites. We show that digital artifacts are created in Windows Registry and Windows Event Log. These artifacts enable the precise dating and timing of passkey registration, as well as the usage and identification of the websites on which they have been activated and utilized. We also identify digital artifacts created when Android smartphones are registered and used as authenticators in a Windows system. This can prove useful in detecting the existence of smartphones linked to a given individual.
Organizational Units
Description
Keywords
Contributors
Funders
Funding agency
Fundação para a Ciência e a Tecnologia
Funding programme
6817 - DCRRNI ID
Funding Award Number
UIDB/50008/2020