With the widespread use of biometric authentication comes the exploitation of presentation attacks, possibly undermining the effectiveness of these technologies in real-world setups. One example takes place when an impostor, aiming at unlocking someone else's smartphone, deceives the built-in face recognition system by presenting a printed image of the user. In this work, we study the problem of automatically detecting presentation attacks against face authentication methods, considering the use-case of fast device unlocking and hardware constraints of mobile devices.
View Article and Find Full Text PDFAn Acad Bras Cienc
February 2019
Fake news has been certainly the expression of the moment: from political round table discussions to newspapers to social and mainstream media. It is everywhere. With such an intense discussion and yet few effective ways to combat it, what can be done? Providing methods to fight back even the least harming hoax is a social responsibility.
View Article and Find Full Text PDFIn this article we present the first effective method based on global optimization for the reconstruction of image puzzles comprising rectangle pieces-Puzzle Solving by Quadratic Programming (PSQP). The proposed novel mathematical formulation reduces the problem to the maximization of a constrained quadratic function, which is solved via a gradient ascent approach. The proposed method is deterministic and can deal with arbitrary identical rectangular pieces.
View Article and Find Full Text PDFConsidering that blood fluoride concentration varies according to fluoride exposure and that dental fluorosis is related to the amount of enamel formed under a given fluoride dose, the present study investigated whether the fluorosis produced by an oscillating chronic fluoride dose would be similar to that caused by exposure to a constant dose, representing the mean of the oscillation during a given time. Rats received during 78 days water with fluoride concentrations of 0, 12.5, 25 or 37.
View Article and Find Full Text PDF