
Stuart Gibson- University of Kent
Stuart Gibson
- University of Kent
About
36
Publications
7,690
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
713
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (36)
Recent work showed neural-network-based approaches to reconstructing images from compressively sensed measurements offer significant improvements in accuracy and signal compression. Such methods can dramatically boost the capability of computational imaging hardware. However, to date, there have been two major drawbacks: (1) the high-precision real...
Recent work showed neural-network based approaches to reconstructing images from compressively sensed measurements offer significant improvements in accuracy and signal compression. Such methods can dramatically boost the capability of computational imaging hardware. However, to date, there have been two major drawbacks: (1) the high-precision real...
Convolutional neural networks (CNN) have been shown to provide a good solution for classification problems that utilize data obtained from vibrational spectroscopy. Moreover, CNNs are capable of identifying substances from noisy spectra without the need for additional preprocessing. However, their application in practical spectroscopy is restricted...
Deep Learning shows very good performance when trained on large labeled data sets. The problem of training a deep net on a few or one sample per class requires a different learning approach which can generalize to unseen classes using only a few representatives of these classes. This problem has previously been approached by meta-learning. Here we...
Convolutional neural networks (CNN) have been shown to provide a good solution for classification problems that utilize data obtained from vibrational spectroscopy. Moreover, CNNs are capable of identification from noisy spectra without the need for additional preprocessing. However, their application in practical spectroscopy is limited due to two...
Machine learning methods have found many applications in Raman spectroscopy, especially for the identification of chemical species. However, almost all of these methods require non-trivial preprocessing such as baseline correction and/or PCA as an essential step. Here we describe our unified solution for the identification of chemical species in wh...
Recent advances in Deep Learning (DL) allow for solving complex AI problems that used to be considered very hard. While this progress has advanced many fields, it is considered to be bad news for CAPTCHAs (Completely Automated Public Turing tests to tell Computers and Humans Apart), the security of which rests on the hardness of some learning probl...
Recent advances in face recognition technology render face-based authentication very attractive due to the high accuracy and ease of use. However, the increased use of biometrics (such as faces) triggered a lot of research on the protection biometric data in the fields of computer security and cryptography. Unfortunately, most of the face-based sys...
One of the main challenges faced by Biometric-based authentication systems is the need to offer secure authentication while maintaining the privacy of the biometric data. Previous solutions, such as Secure Sketch and Fuzzy Extractors, rely on assumptions that cannot be guaranteed in practice, and often affect the authentication accuracy. In this pa...
The paradigm detailed in this manuscript describes an applied experimental method based on real police investigations during which an eyewitness or victim to a crime may create from memory a holistic facial composite of the culprit with the assistance of a police operator. The aim is that the composite is recognized by someone who believes that the...
Purpose
– The purpose of this paper is to describe four experiments evaluating post-production enhancement techniques with facial composites mainly created using the EFIT-V holistic system.
Design/methodology/approach
– Experiments 1-4 were conducted in two stages. In Stage 1, constructors created between one and four individual composites of unfa...
This work describes a photo-realistic generator that creates semi-automatically face images of unseen subjects. Unlike previously described methods for generating face imagery, the approach described herein incorporates texture and shape information in a single computational framework based on high dimensional encoding of variance and discriminant...
When the police have no suspect, they may ask an eyewitness to construct a facial composite of that suspect from memory. Faces are primarily processed holistically, and recently developed computerized holistic facial composite systems (e.g., EFIT-V) have been designed to match these processes. The reported research compared children aged 6-11 years...
Facial composite construction is one of the most successful applications of interactive evolutionary computation. In spite of this, previous work in the area of composite construction has not investigated the algorithm design options in detail. We address this issue with four experiments. In the first experiment a sorting task is used to identify t...
Witnesses to a crime may be asked to create a facial composite of the offender from memory. They may then view a suspect in a police line-up. Previous research on this topic has found both recognition impairment and enhancement following composite construction. In Experiment 1, creator-participants employed the holistic facial composite system syst...
This study demonstrates that Raman spectroscopy is a valuable tool for discriminating between lipstick samples under a range of forensically relevant situations. Trace amounts of lipstick smears deposited on textile fibres, cigarette butts and paper tissues were analysed. Differentiation of lipstick smears could be achieved with little or no interf...
Six metals (copper, magnesium, barium, nickel, chromium and lead) were determined in two separate batches of seized ecstasy tablets by graphite furnace atomic absorption spectroscopy (GFAAS) following digestion with nitric acid and hydrogen peroxide. Large intra-batch variations were found as expected for tablets produced in clandestine laboratorie...
Weighted vector directional filters are used to enhance multi-channel
image data and have attracted a lot of interest from
researchers in the image processing community. This paper
describes a novel method for deriving the weights of a vector
directional filter that uses an interactive evolution strategy.
We performed an empirical study in which 30...
An evaluation of individual and morphed composites
created using the E-FIT and EFIT-V production systems
was conducted. With the assistance of trained police staff,
composites of unfamiliar targets were constructed from
memory following a Cognitive Interview. EFIT-V
composite production followed either a two-day delay, or
on the same day as viewing...
A method for altering the perceived health of a human face is presented. Participants were asked to score a random sample of thirty face images for gauntness/fullness, facial symmetry, complexion, age and overall health. Healthy and unhealthy prototype face images were constructed by forming a weighted average of the sample faces according to their...
Student participant-witnesses produced 4 composites of unfamiliar faces with a system that uses a genetic algorithm to evolve appearance of artificial faces. Morphs of 4 composites produced by different witnesses (between-witness morphs) were judged better likenesses (Experiment 1) and were more frequently named (Experiment 2) by participants who w...
We present a new computational methodology for the construction of facial composites from eyewitness memory for criminal investigation. The conceptual and theoretical basis is described and results from both laboratory and real-world applications are presented.
A facial composite generated from an eyewitness’s memory often constitutes the first and only means available for police forces
to identify a criminal suspect. To date, commercial computerised systems for constructing facial composites have relied almost
exclusively on a feature-based, ‘cut-andpaste’ method whose effectiveness has been fundamentall...
Existing commercial, computerised techniques for constructing facial composites generated from eyewitness memory are essentially electronic versions of the original, mechanical feature-based systems such as PhotoFIT and Identikit. The effectiveness of this feature-based approach is fundamentally limited by the witness's ability to recall and verbal...
Facial composite systems are used to create a likeness to a suspect in criminal investigations. Traditional, feature-based facial composite systems rely on the witness' ability to recall individual features, provide verbal descriptions and then select them from stored libraries of labelled features - a task which witnesses often find difficult. The...
We present a statistically rigorous approach to the aging of digitised images of the human face. Our methodology is based on the calculation of optimised aging trajectories in a model space and aged images can be obtained through a fast, semi-automatic procedure. In addition, person-specific information about the subject at previous ages is include...
Forensic age progression for the purpose of ageing a missing child is a discipline currently dominated by artistic methodologies. In order to improve on these techniques, a statistically rigorous approach to the ageing of the human face is presented. The technique is based upon a principal component analysis and involves the definition of an ageing...
Forensic age progression for the purpose of aging a missing child is a discipline currently dominated by artistic methodologies. In order to improve on these techniques, we present a statistically rigorous approach to the aging of the human face. The technique is based upon a Principal Component Analysis and involves the definition of an aging dire...
A mathematical model previously developed for use in computer vision applications is presented as an empirical model for face space. The term appearance space is used to distinguish this from previous models. Appearance space is a linear vector space that is dimensionally optimal, enables us to model and describe any human facial appearance, and po...
This article examines current theories of beauty and describes recent progress in the ability to generate photorealistic faces using a computer. First, we describe a novel experimental tool, FacePrints, that allows a user to "evolve" an attractive face using a computer. We discuss the use of this program for research on human beauty and review the...
A facial composite system is described for use in criminal investigations which has distinct advantages over current methods. Unlike traditional fea- ture based methods, our approach uses both local and global facial mod- els, allowing a witness to evolve plausible, photo-realistic face images in an intuitive way. The basic method combines random s...
We describe a method for estimating new facial views from a single 2D face image. A model has been generated which incorporates two facial views, a frontal view and a 30 degree rotated view. Appearance models for each view of shape and texture have been combined using further principal components analysis to form a multiple view model. Presented wi...