Skip to main content

Showing 1–8 of 8 results for author: Nadimpalli, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.01906  [pdf, other

    cs.CV cs.AI cs.CR cs.LG cs.MM

    Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking

    Authors: Aakash Varma Nadimpalli, Ajita Rattani

    Abstract: With the significant advances in deep generative models for image and video synthesis, Deepfakes and manipulated media have raised severe societal concerns. Conventional machine learning classifiers for deepfake detection often fail to cope with evolving deepfake generation technology and are susceptible to adversarial attacks. Alternatively, invisible image watermarking is being researched as a p… ▽ More

    Submitted 2 October, 2024; originally announced October 2024.

    Comments: ACM Transactions (Digital Threats: Research and Practice)

  2. arXiv:2310.07028  [pdf, other

    cs.CV cs.AI cs.LG

    Facial Forgery-based Deepfake Detection using Fine-Grained Features

    Authors: Aakash Varma Nadimpalli, Ajita Rattani

    Abstract: Facial forgery by deepfakes has caused major security risks and raised severe societal concerns. As a countermeasure, a number of deepfake detection methods have been proposed. Most of them model deepfake detection as a binary classification problem using a backbone convolutional neural network (CNN) architecture pretrained for the task. These CNN-based methods have demonstrated very high efficacy… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: 8 pages, 2 figures

  3. arXiv:2210.16125  [pdf

    cs.CR

    BRATsynthetic: Text De-identification using a Markov Chain Replacement Strategy for Surrogate Personal Identifying Information

    Authors: John D. Osborne, Tobias O'Leary, Akhil Nadimpalli, Salma M. Aly., Richard E. Kennedy

    Abstract: Objective: Implement and assess personal health identifying information (PHI) substitution strategies and quantify their privacy preserving benefits. Materials and Methods: We implement and assess 3 different `Hiding in Plain Sight` (HIPS) strategies for PHI replacement including a standard Consistent replacement strategy, a Random replacement strategy and a novel Markov model-based strategy. We… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

    ACM Class: I.6.6; D.0

  4. arXiv:2207.10246  [pdf, other

    cs.CV cs.AI cs.LG

    GBDF: Gender Balanced DeepFake Dataset Towards Fair DeepFake Detection

    Authors: Aakash Varma Nadimpalli, Ajita Rattani

    Abstract: Facial forgery by deepfakes has raised severe societal concerns. Several solutions have been proposed by the vision community to effectively combat the misinformation on the internet via automated deepfake detection systems. Recent studies have demonstrated that facial analysis-based deep learning models can discriminate based on protected attributes. For the commercial adoption and massive roll-o… ▽ More

    Submitted 20 July, 2022; originally announced July 2022.

    Comments: 26th International Conference on Pattern Recognition (ICPR) 2022| Montreal, Canada

  5. arXiv:2204.04285  [pdf, other

    cs.CV cs.AI cs.LG

    On Improving Cross-dataset Generalization of Deepfake Detectors

    Authors: Aakash Varma Nadimpalli, Ajita Rattani

    Abstract: Facial manipulation by deep fake has caused major security risks and raised severe societal concerns. As a countermeasure, a number of deep fake detection methods have been proposed recently. Most of them model deep fake detection as a binary classification problem using a backbone convolutional neural network (CNN) architecture pretrained for the task. These CNN-based methods have demonstrated ve… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

    Comments: 2022 Conference on Computer Vision and Pattern Recognition Workshops | New Orleans, Louisiana

  6. arXiv:2110.04427  [pdf, other

    cs.CV cs.AI cs.LG

    Harnessing Unlabeled Data to Improve Generalization of Biometric Gender and Age Classifiers

    Authors: Aakash Varma Nadimpalli, Narsi Reddy, Sreeraj Ramachandran, Ajita Rattani

    Abstract: With significant advances in deep learning, many computer vision applications have reached the inflection point. However, these deep learning models need large amount of labeled data for model training and optimum parameter estimation. Limited labeled data for model training results in over-fitting and impacts their generalization performance. However, the collection and annotation of large amount… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

    Comments: 7 pages, 5 figures, 5 tables

  7. arXiv:2110.01640  [pdf, other

    cs.CV cs.AI cs.LG

    An Experimental Evaluation on Deepfake Detection using Deep Face Recognition

    Authors: Sreeraj Ramachandran, Aakash Varma Nadimpalli, Ajita Rattani

    Abstract: Significant advances in deep learning have obtained hallmark accuracy rates for various computer vision applications. However, advances in deep generative models have also led to the generation of very realistic fake content, also known as deepfakes, causing a threat to privacy, democracy, and national security. Most of the current deepfake detection methods are deemed as a binary classification p… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

    Comments: 6 pages, 3 figures

  8. arXiv:1509.07543  [pdf, other

    cs.HC cs.CV

    On Optimizing Human-Machine Task Assignments

    Authors: Andreas Veit, Michael Wilber, Rajan Vaish, Serge Belongie, James Davis, Vishal Anand, Anshu Aviral, Prithvijit Chakrabarty, Yash Chandak, Sidharth Chaturvedi, Chinmaya Devaraj, Ankit Dhall, Utkarsh Dwivedi, Sanket Gupte, Sharath N. Sridhar, Karthik Paga, Anuj Pahuja, Aditya Raisinghani, Ayush Sharma, Shweta Sharma, Darpana Sinha, Nisarg Thakkar, K. Bala Vignesh, Utkarsh Verma, Kanniganti Abhishek , et al. (26 additional authors not shown)

    Abstract: When crowdsourcing systems are used in combination with machine inference systems in the real world, they benefit the most when the machine system is deeply integrated with the crowd workers. However, if researchers wish to integrate the crowd with "off-the-shelf" machine classifiers, this deep integration is not always possible. This work explores two strategies to increase accuracy and decrease… ▽ More

    Submitted 24 September, 2015; originally announced September 2015.

    Comments: HCOMP 2015 Work in Progress