Stuart Gibson

Stuart Gibson
  • University of Kent

About

36
Publications
7,690
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
713
Citations
Introduction
Skills and Expertise
Current institution
University of Kent

Publications

Publications (36)
Preprint
Recent work showed neural-network-based approaches to reconstructing images from compressively sensed measurements offer significant improvements in accuracy and signal compression. Such methods can dramatically boost the capability of computational imaging hardware. However, to date, there have been two major drawbacks: (1) the high-precision real...
Article
Recent work showed neural-network based approaches to reconstructing images from compressively sensed measurements offer significant improvements in accuracy and signal compression. Such methods can dramatically boost the capability of computational imaging hardware. However, to date, there have been two major drawbacks: (1) the high-precision real...
Article
Convolutional neural networks (CNN) have been shown to provide a good solution for classification problems that utilize data obtained from vibrational spectroscopy. Moreover, CNNs are capable of identifying substances from noisy spectra without the need for additional preprocessing. However, their application in practical spectroscopy is restricted...
Preprint
Deep Learning shows very good performance when trained on large labeled data sets. The problem of training a deep net on a few or one sample per class requires a different learning approach which can generalize to unseen classes using only a few representatives of these classes. This problem has previously been approached by meta-learning. Here we...
Preprint
Full-text available
Convolutional neural networks (CNN) have been shown to provide a good solution for classification problems that utilize data obtained from vibrational spectroscopy. Moreover, CNNs are capable of identification from noisy spectra without the need for additional preprocessing. However, their application in practical spectroscopy is limited due to two...
Preprint
Machine learning methods have found many applications in Raman spectroscopy, especially for the identification of chemical species. However, almost all of these methods require non-trivial preprocessing such as baseline correction and/or PCA as an essential step. Here we describe our unified solution for the identification of chemical species in wh...
Article
Full-text available
Recent advances in Deep Learning (DL) allow for solving complex AI problems that used to be considered very hard. While this progress has advanced many fields, it is considered to be bad news for CAPTCHAs (Completely Automated Public Turing tests to tell Computers and Humans Apart), the security of which rests on the hardness of some learning probl...
Conference Paper
Full-text available
Recent advances in face recognition technology render face-based authentication very attractive due to the high accuracy and ease of use. However, the increased use of biometrics (such as faces) triggered a lot of research on the protection biometric data in the fields of computer security and cryptography. Unfortunately, most of the face-based sys...
Article
One of the main challenges faced by Biometric-based authentication systems is the need to offer secure authentication while maintaining the privacy of the biometric data. Previous solutions, such as Secure Sketch and Fuzzy Extractors, rely on assumptions that cannot be guaranteed in practice, and often affect the authentication accuracy. In this pa...
Article
Full-text available
The paradigm detailed in this manuscript describes an applied experimental method based on real police investigations during which an eyewitness or victim to a crime may create from memory a holistic facial composite of the culprit with the assistance of a police operator. The aim is that the composite is recognized by someone who believes that the...
Article
Full-text available
Purpose – The purpose of this paper is to describe four experiments evaluating post-production enhancement techniques with facial composites mainly created using the EFIT-V holistic system. Design/methodology/approach – Experiments 1-4 were conducted in two stages. In Stage 1, constructors created between one and four individual composites of unfa...
Conference Paper
This work describes a photo-realistic generator that creates semi-automatically face images of unseen subjects. Unlike previously described methods for generating face imagery, the approach described herein incorporates texture and shape information in a single computational framework based on high dimensional encoding of variance and discriminant...
Article
Full-text available
When the police have no suspect, they may ask an eyewitness to construct a facial composite of that suspect from memory. Faces are primarily processed holistically, and recently developed computerized holistic facial composite systems (e.g., EFIT-V) have been designed to match these processes. The reported research compared children aged 6-11 years...
Article
Facial composite construction is one of the most successful applications of interactive evolutionary computation. In spite of this, previous work in the area of composite construction has not investigated the algorithm design options in detail. We address this issue with four experiments. In the first experiment a sorting task is used to identify t...
Article
Full-text available
Witnesses to a crime may be asked to create a facial composite of the offender from memory. They may then view a suspect in a police line-up. Previous research on this topic has found both recognition impairment and enhancement following composite construction. In Experiment 1, creator-participants employed the holistic facial composite system syst...
Article
This study demonstrates that Raman spectroscopy is a valuable tool for discriminating between lipstick samples under a range of forensically relevant situations. Trace amounts of lipstick smears deposited on textile fibres, cigarette butts and paper tissues were analysed. Differentiation of lipstick smears could be achieved with little or no interf...
Article
Six metals (copper, magnesium, barium, nickel, chromium and lead) were determined in two separate batches of seized ecstasy tablets by graphite furnace atomic absorption spectroscopy (GFAAS) following digestion with nitric acid and hydrogen peroxide. Large intra-batch variations were found as expected for tablets produced in clandestine laboratorie...
Conference Paper
Weighted vector directional filters are used to enhance multi-channel image data and have attracted a lot of interest from researchers in the image processing community. This paper describes a novel method for deriving the weights of a vector directional filter that uses an interactive evolution strategy. We performed an empirical study in which 30...
Conference Paper
Full-text available
An evaluation of individual and morphed composites created using the E-FIT and EFIT-V production systems was conducted. With the assistance of trained police staff, composites of unfamiliar targets were constructed from memory following a Cognitive Interview. EFIT-V composite production followed either a two-day delay, or on the same day as viewing...
Article
A method for altering the perceived health of a human face is presented. Participants were asked to score a random sample of thirty face images for gauntness/fullness, facial symmetry, complexion, age and overall health. Healthy and unhealthy prototype face images were constructed by forming a weighted average of the sample faces according to their...
Article
Full-text available
Student participant-witnesses produced 4 composites of unfamiliar faces with a system that uses a genetic algorithm to evolve appearance of artificial faces. Morphs of 4 composites produced by different witnesses (between-witness morphs) were judged better likenesses (Experiment 1) and were more frequently named (Experiment 2) by participants who w...
Conference Paper
We present a new computational methodology for the construction of facial composites from eyewitness memory for criminal investigation. The conceptual and theoretical basis is described and results from both laboratory and real-world applications are presented.
Conference Paper
A facial composite generated from an eyewitness’s memory often constitutes the first and only means available for police forces to identify a criminal suspect. To date, commercial computerised systems for constructing facial composites have relied almost exclusively on a feature-based, ‘cut-andpaste’ method whose effectiveness has been fundamentall...
Article
Existing commercial, computerised techniques for constructing facial composites generated from eyewitness memory are essentially electronic versions of the original, mechanical feature-based systems such as PhotoFIT and Identikit. The effectiveness of this feature-based approach is fundamentally limited by the witness's ability to recall and verbal...
Conference Paper
Full-text available
Facial composite systems are used to create a likeness to a suspect in criminal investigations. Traditional, feature-based facial composite systems rely on the witness' ability to recall individual features, provide verbal descriptions and then select them from stored libraries of labelled features - a task which witnesses often find difficult. The...
Article
We present a statistically rigorous approach to the aging of digitised images of the human face. Our methodology is based on the calculation of optimised aging trajectories in a model space and aged images can be obtained through a fast, semi-automatic procedure. In addition, person-specific information about the subject at previous ages is include...
Article
Forensic age progression for the purpose of ageing a missing child is a discipline currently dominated by artistic methodologies. In order to improve on these techniques, a statistically rigorous approach to the ageing of the human face is presented. The technique is based upon a principal component analysis and involves the definition of an ageing...
Conference Paper
Forensic age progression for the purpose of aging a missing child is a discipline currently dominated by artistic methodologies. In order to improve on these techniques, we present a statistically rigorous approach to the aging of the human face. The technique is based upon a Principal Component Analysis and involves the definition of an aging dire...
Article
Full-text available
A mathematical model previously developed for use in computer vision applications is presented as an empirical model for face space. The term appearance space is used to distinguish this from previous models. Appearance space is a linear vector space that is dimensionally optimal, enables us to model and describe any human facial appearance, and po...
Article
This article examines current theories of beauty and describes recent progress in the ability to generate photorealistic faces using a computer. First, we describe a novel experimental tool, FacePrints, that allows a user to "evolve" an attractive face using a computer. We discuss the use of this program for research on human beauty and review the...
Article
A facial composite system is described for use in criminal investigations which has distinct advantages over current methods. Unlike traditional fea- ture based methods, our approach uses both local and global facial mod- els, allowing a witness to evolve plausible, photo-realistic face images in an intuitive way. The basic method combines random s...
Article
Full-text available
We describe a method for estimating new facial views from a single 2D face image. A model has been generated which incorporates two facial views, a frontal view and a 30 degree rotated view. Appearance models for each view of shape and texture have been combined using further principal components analysis to form a multiple view model. Presented wi...

Network

Cited By