Skip to main content

Showing 1–50 of 68 results for author: Raja, K

  1. arXiv:2405.08084  [pdf

    cs.CR

    PrivFED -- A Framework for Privacy-Preserving Federated Learning in Enhanced Breast Cancer Diagnosis

    Authors: Maithili Jha, S. Maitri, M. Lohithdakshan, Shiny Duela J, K. Raja

    Abstract: In the day-to-day operations of healthcare institutions, a multitude of Personally Identifiable Information (PII) data exchanges occur, exposing the data to a spectrum of cybersecurity threats. This study introduces a federated learning framework, trained on the Wisconsin dataset, to mitigate challenges such as data scarcity and imbalance. Techniques like the Synthetic Minority Over-sampling Techn… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: Presented in ICIITB 2024 organized by Modern College of Business and Science, Oman

  2. arXiv:2405.01273  [pdf, other

    cs.CV cs.AI

    Towards Inclusive Face Recognition Through Synthetic Ethnicity Alteration

    Authors: Praveen Kumar Chandaliya, Kiran Raja, Raghavendra Ramachandra, Zahid Akhtar, Christoph Busch

    Abstract: Numerous studies have shown that existing Face Recognition Systems (FRS), including commercial ones, often exhibit biases toward certain ethnicities due to under-represented data. In this work, we explore ethnicity alteration and skin tone modification using synthetic face image generation methods to increase the diversity of datasets. We conduct a detailed analysis by first constructing a balance… ▽ More

    Submitted 6 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: 8 Pages

    Journal ref: Automatic Face and Gesture Recognition 2024

  3. What's in the Flow? Exploiting Temporal Motion Cues for Unsupervised Generic Event Boundary Detection

    Authors: Sourabh Vasant Gothe, Vibhav Agarwal, Sourav Ghosh, Jayesh Rajkumar Vachhani, Pranay Kashyap, Barath Raj Kandur Raja

    Abstract: Generic Event Boundary Detection (GEBD) task aims to recognize generic, taxonomy-free boundaries that segment a video into meaningful events. Current methods typically involve a neural model trained on a large volume of data, demanding substantial computational power and storage space. We explore two pivotal questions pertaining to GEBD: Can non-parametric algorithms outperform unsupervised neural… ▽ More

    Submitted 15 February, 2024; originally announced April 2024.

    Comments: Accepted in WACV-2024. Supplementary at https://openaccess.thecvf.com/content/WACV2024/supplemental/Gothe_Whats_in_the_WACV_2024_supplemental.pdf

    Journal ref: 2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), Waikoloa, HI, USA, 2024, pp. 6926-6935

  4. arXiv:2404.14248  [pdf, other

    cs.CV

    NTIRE 2024 Challenge on Low Light Image Enhancement: Methods and Results

    Authors: Xiaoning Liu, Zongwei Wu, Ao Li, Florin-Alexandru Vasluianu, Yulun Zhang, Shuhang Gu, Le Zhang, Ce Zhu, Radu Timofte, Zhi Jin, Hongjun Wu, Chenxi Wang, Haitao Ling, Yuanhao Cai, Hao Bian, Yuxin Zheng, Jing Lin, Alan Yuille, Ben Shao, Jin Guo, Tianli Liu, Mohao Wu, Yixu Feng, Shuo Hou, Haotian Lin , et al. (87 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2024 low light image enhancement challenge, highlighting the proposed solutions and results. The aim of this challenge is to discover an effective network design or solution capable of generating brighter, clearer, and visually appealing results when dealing with a variety of conditions, including ultra-high resolution (4K and beyond), non-uniform illumination, backlig… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: NTIRE 2024 Challenge Report

  5. arXiv:2403.12197  [pdf

    cs.CV cs.AI

    E2F-Net: Eyes-to-Face Inpainting via StyleGAN Latent Space

    Authors: Ahmad Hassanpour, Fatemeh Jamalbafrani, Bian Yang, Kiran Raja, Raymond Veldhuis, Julian Fierrez

    Abstract: Face inpainting, the technique of restoring missing or damaged regions in facial images, is pivotal for applications like face recognition in occluded scenarios and image analysis with poor-quality captures. This process not only needs to produce realistic visuals but also preserve individual identity characteristics. The aim of this paper is to inpaint a face given periocular region (eyes-to-face… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  6. arXiv:2402.04173  [pdf, other

    cs.CR cs.AI

    COPS: A Compact On-device Pipeline for real-time Smishing detection

    Authors: Harichandana B S S, Sumit Kumar, Manjunath Bhimappa Ujjinakoppa, Barath Raj Kandur Raja

    Abstract: Smartphones have become indispensable in our daily lives and can do almost everything, from communication to online shopping. However, with the increased usage, cybercrime aimed at mobile devices is rocketing. Smishing attacks, in particular, have observed a significant upsurge in recent years. This problem is further exacerbated by the perpetrator creating new deceptive websites daily, with an av… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

    Comments: Published at IEEE Consumer Communications & Networking Conference (CCNC) 2024

  7. TrICy: Trigger-guided Data-to-text Generation with Intent aware Attention-Copy

    Authors: Vibhav Agarwal, Sourav Ghosh, Harichandana BSS, Himanshu Arora, Barath Raj Kandur Raja

    Abstract: Data-to-text (D2T) generation is a crucial task in many natural language understanding (NLU) applications and forms the foundation of task-oriented dialog systems. In the context of conversational AI solutions that can work directly with local data on the user's device, architectures utilizing large pre-trained language models (PLMs) are impractical for on-device deployment due to a high memory fo… ▽ More

    Submitted 25 January, 2024; originally announced February 2024.

    Comments: Published in the IEEE/ACM Transactions on Audio, Speech, and Language Processing. (Sourav Ghosh and Vibhav Agarwal contributed equally to this work.)

    Journal ref: IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 32, pp. 1173-1184, 2024

  8. arXiv:2312.15102  [pdf, other

    cs.CV cs.AI

    Robust Sclera Segmentation for Skin-tone Agnostic Face Image Quality Assessment

    Authors: Wassim Kabbani, Christoph Busch, Kiran Raja

    Abstract: Face image quality assessment (FIQA) is crucial for obtaining good face recognition performance. FIQA algorithms should be robust and insensitive to demographic factors. The eye sclera has a consistent whitish color in all humans regardless of their age, ethnicity and skin-tone. This work proposes a robust sclera segmentation method that is suitable for face images in the enrolment and the border… ▽ More

    Submitted 22 December, 2023; originally announced December 2023.

    ACM Class: I.4.9; I.5.m

    Journal ref: BIOSIG 2023. Gesellschaft für Informatik e.V. ISSN: 1617-5468. ISBN: 978-3-88579-733-3

  9. Log-Likelihood Score Level Fusion for Improved Cross-Sensor Smartphone Periocular Recognition

    Authors: Fernando Alonso-Fernandez, Kiran B. Raja, Christoph Busch, Josef Bigun

    Abstract: The proliferation of cameras and personal devices results in a wide variability of imaging conditions, producing large intra-class variations and a significant performance drop when images from heterogeneous environments are compared. However, many applications require to deal with data from different sources regularly, thus needing to overcome these interoperability problems. Here, we employ fusi… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: Published at Proc. 25th European Signal Processing Conference, EUSIPCO 2017. arXiv admin note: text overlap with arXiv:1902.08123

  10. Terrain-Informed Self-Supervised Learning: Enhancing Building Footprint Extraction from LiDAR Data with Limited Annotations

    Authors: Anuja Vats, David Völgyes, Martijn Vermeer, Marius Pedersen, Kiran Raja, Daniele S. M. Fantin, Jacob Alexander Hay

    Abstract: Estimating building footprint maps from geospatial data is of paramount importance in urban planning, development, disaster management, and various other applications. Deep learning methodologies have gained prominence in building segmentation maps, offering the promise of precise footprint extraction without extensive post-processing. However, these methods face challenges in generalization and l… ▽ More

    Submitted 18 April, 2024; v1 submitted 2 November, 2023; originally announced November 2023.

    Journal ref: IEEE Transactions on Geoscience and Remote Sensing (2024)

  11. arXiv:2305.18216  [pdf, other

    cs.CV

    Towards minimizing efforts for Morphing Attacks -- Deep embeddings for morphing pair selection and improved Morphing Attack Detection

    Authors: Roman Kessler, Kiran Raja, Juan Tapia, Christoph Busch

    Abstract: Face Morphing Attacks pose a threat to the security of identity documents, especially with respect to a subsequent access control process, because it enables both individuals involved to exploit the same document. In this study, face embeddings serve two purposes: pre-selecting images for large-scale Morphing Attack generation and detecting potential Morphing Attacks. We build upon previous embedd… ▽ More

    Submitted 30 March, 2024; v1 submitted 29 May, 2023; originally announced May 2023.

  12. arXiv:2305.16326  [pdf

    cs.CL cs.AI cs.IR cs.LG

    Large language models in biomedical natural language processing: benchmarks, baselines, and recommendations

    Authors: Qingyu Chen, Jingcheng Du, Yan Hu, Vipina Kuttichi Keloth, Xueqing Peng, Kalpana Raja, Rui Zhang, Zhiyong Lu, Hua Xu

    Abstract: Biomedical literature is growing rapidly, making it challenging to curate and extract knowledge manually. Biomedical natural language processing (BioNLP) techniques that can automatically extract information from biomedical literature help alleviate this burden. Recently, large Language Models (LLMs), such as GPT-3 and GPT-4, have gained significant attention for their impressive performance. Howe… ▽ More

    Submitted 20 January, 2024; v1 submitted 10 May, 2023; originally announced May 2023.

  13. arXiv:2305.01294  [pdf, other

    cs.CV

    Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Guoqiang Li, Kiran Raja

    Abstract: Face Recognition System (FRS) are shown to be vulnerable to morphed images of newborns. Detecting morphing attacks stemming from face images of newborn is important to avoid unwanted consequences, both for security and society. In this paper, we present a new reference-based/Differential Morphing Attack Detection (MAD) method to detect newborn morphing images using Wavelet Scattering Network (WSN)… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: accepted in 5th International Conference on Bio-engineering for Smart Technologies (BIO-SMART 2023)

  14. arXiv:2304.00979  [pdf, other

    cs.CV

    A Latent Fingerprint in the Wild Database

    Authors: Xinwei Liu, Kiran Raja, Renfang Wang, Hong Qiu, Hucheng Wu, Dechao Sun, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra, Christoph Busch

    Abstract: Latent fingerprints are among the most important and widely used evidence in crime scenes, digital forensics and law enforcement worldwide. Despite the number of advancements reported in recent works, we note that significant open issues such as independent benchmarking and lack of large-scale evaluation databases for improving the algorithms are inadequately addressed. The available databases are… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security (under review)

  15. arXiv:2302.13288  [pdf, other

    cs.CV

    Learning Pairwise Interaction for Generalizable DeepFake Detection

    Authors: Ying Xu, Kiran Raja, Luisa Verdoliva, Marius Pedersen

    Abstract: A fast-paced development of DeepFake generation techniques challenge the detection schemes designed for known type DeepFakes. A reliable Deepfake detection approach must be agnostic to generation types, which can present diverse quality and appearance. Limited generalizability across different generation schemes will restrict the wide-scale deployment of detectors if they fail to handle unseen att… ▽ More

    Submitted 26 February, 2023; originally announced February 2023.

  16. arXiv:2211.12180  [pdf, other

    eess.IV cs.CV

    SRTGAN: Triplet Loss based Generative Adversarial Network for Real-World Super-Resolution

    Authors: Dhruv Patel, Abhinav Jain, Simran Bawkar, Manav Khorasiya, Kalpesh Prajapati, Kishor Upla, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Many applications such as forensics, surveillance, satellite imaging, medical imaging, etc., demand High-Resolution (HR) images. However, obtaining an HR image is not always possible due to the limitations of optical sensors and their costs. An alternative solution called Single Image Super-Resolution (SISR) is a software-driven approach that aims to take a Low-Resolution (LR) image and obtain the… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

    Comments: Affiliated with the Sardar Vallabhbhai National Institute of Technology (SVNIT), India and Norwegian University of Science and Technology (NTNU), Norway. Presented at the 7th International Conference on Computer Vision and Image Processing (CVIP) 2022

  17. arXiv:2208.08207  [pdf, other

    cs.CV cs.AI

    Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data

    Authors: Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: The vast progress in synthetic image synthesis enables the generation of facial images in high resolution and photorealism. In biometric applications, the main motivation for using synthetic data is to solve the shortage of publicly-available biometric data while reducing privacy risks when processing such sensitive information. These advantages are exploited in this work by simulating human face… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

  18. arXiv:2208.07337  [pdf, other

    cs.CV

    SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data

    Authors: Marco Huber, Fadi Boutros, Anh Thi Luu, Kiran Raja, Raghavendra Ramachandra, Naser Damer, Pedro C. Neto, Tiago Gonçalves, Ana F. Sequeira, Jaime S. Cardoso, João Tremoço, Miguel Lourenço, Sergio Serra, Eduardo Cermeño, Marija Ivanovska, Borut Batagelj, Andrej Kronovšek, Peter Peer, Vitomir Štruc

    Abstract: This paper presents a summary of the Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 International Joint Conference on Biometrics (IJCB 2022). The competition attracted a total of 12 participating teams, both from academia and industry and present in 11 different countries. In the end, seven valid submissions were submitted by… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: Accepted at International Joint Conference on Biometrics (IJCB) 2022

  19. arXiv:2208.05845  [pdf, other

    cs.CV cs.CY cs.LG

    Analyzing Fairness in Deepfake Detection With Massively Annotated Databases

    Authors: Ying Xu, Philipp Terhörst, Kiran Raja, Marius Pedersen

    Abstract: In recent years, image and video manipulations with Deepfake have become a severe concern for security and society. Many detection models and datasets have been proposed to detect Deepfake data reliably. However, there is an increased concern that these models and training databases might be biased and, thus, cause Deepfake detectors to fail. In this work, we investigate factors causing biased det… ▽ More

    Submitted 11 March, 2024; v1 submitted 11 August, 2022; originally announced August 2022.

  20. arXiv:2206.15129  [pdf, other

    cs.AI cs.HC cs.LG

    Personalized Detection of Cognitive Biases in Actions of Users from Their Logs: Anchoring and Recency Biases

    Authors: Atanu R Sinha, Navita Goyal, Sunny Dhamnani, Tanay Asija, Raja K Dubey, M V Kaarthik Raja, Georgios Theocharous

    Abstract: Cognitive biases are mental shortcuts humans use in dealing with information and the environment, and which result in biased actions and behaviors (or, actions), unbeknownst to themselves. Biases take many forms, with cognitive biases occupying a central role that inflicts fairness, accountability, transparency, ethics, law, medicine, and discrimination. Detection of biases is considered a necessa… ▽ More

    Submitted 1 July, 2022; v1 submitted 30 June, 2022; originally announced June 2022.

  21. arXiv:2203.12387  [pdf, other

    cs.CV

    On the (Limited) Generalization of MasterFace Attacks and Its Relation to the Capacity of Face Representations

    Authors: Philipp Terhörst, Florian Bierbaum, Marco Huber, Naser Damer, Florian Kirchbuchner, Kiran Raja, Arjan Kuijper

    Abstract: A MasterFace is a face image that can successfully match against a large portion of the population. Since their generation does not require access to the information of the enrolled subjects, MasterFace attacks represent a potential security risk for widely-used face recognition systems. Previous works proposed methods for generating such images and demonstrated that these attacks can strongly com… ▽ More

    Submitted 1 April, 2022; v1 submitted 23 March, 2022; originally announced March 2022.

  22. arXiv:2202.12426  [pdf, other

    cs.CV cs.CY

    Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?

    Authors: Sankini Rancha Godage, Frøy Løvåsdal, Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Few studies have focused on examining how people recognize morphing attacks, even as several publications have examined the susceptibility of automated FRS and offered morphing attack detection (MAD) approaches. MAD approaches base their decisions either on a single image with no reference to compare against (S-MAD) or using a reference image (D-MAD). One prevalent misconception is that an examine… ▽ More

    Submitted 5 September, 2022; v1 submitted 24 February, 2022; originally announced February 2022.

  23. PrivPAS: A real time Privacy-Preserving AI System and applied ethics

    Authors: Harichandana B S S, Vibhav Agarwal, Sourav Ghosh, Gopi Ramena, Sumit Kumar, Barath Raj Kandur Raja

    Abstract: With 3.78 billion social media users worldwide in 2021 (48% of the human population), almost 3 billion images are shared daily. At the same time, a consistent evolution of smartphone cameras has led to a photography explosion with 85% of all new pictures being captured using smartphones. However, lately, there has been an increased discussion of privacy concerns when a person being photographed is… ▽ More

    Submitted 8 February, 2022; v1 submitted 5 February, 2022; originally announced February 2022.

    Comments: Accepted at 16th IEEE International Conference on Semantic Computing (ICSC), January 26-28, 2022 [update: Best Paper candidate at ICSC 2022]

    Journal ref: 2022 IEEE 16th International Conference on Semantic Computing (ICSC), Laguna Hills, CA, USA, 2022, pp. 9-16

  24. arXiv:2112.03632  [pdf, other

    cs.CV cs.LG

    Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors

    Authors: Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: Enabling highly secure applications (such as border crossing) with face recognition requires extensive biometric performance tests through large scale data. However, using real face images raises concerns about privacy as the laws do not allow the images to be used for other purposes than originally intended. Using representative and subsets of face data can also lead to unwanted demographic biase… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Journal ref: https://www.ntnu.edu/nikt2021

  25. arXiv:2111.13475  [pdf, other

    cs.CV cs.AI

    QMagFace: Simple and Accurate Quality-Aware Face Recognition

    Authors: Philipp Terhörst, Malte Ihlefeld, Marco Huber, Naser Damer, Florian Kirchbuchner, Kiran Raja, Arjan Kuijper

    Abstract: Face recognition systems have to deal with large variabilities (such as different poses, illuminations, and expressions) that might lead to incorrect matching decisions. These variabilities can be measured in terms of face image quality which is defined over the utility of a sample for recognition. Previous works on face recognition either do not employ this valuable information or make use of non… ▽ More

    Submitted 23 March, 2022; v1 submitted 26 November, 2021; originally announced November 2021.

  26. arXiv:2111.12115  [pdf, other

    cs.CV

    Algorithmic Fairness in Face Morphing Attack Detection

    Authors: Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: Face morphing attacks can compromise Face Recognition System (FRS) by exploiting their vulnerability. Face Morphing Attack Detection (MAD) techniques have been developed in recent past to deter such attacks and mitigate risks from morphing attacks. MAD algorithms, as any other algorithms should treat the images of subjects from different ethnic origins in an equal manner and provide non-discrimina… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

    Comments: Accepted to WACVW2022

  27. arXiv:2110.11001  [pdf, other

    cs.CV

    Pixel-Level Face Image Quality Assessment for Explainable Face Recognition

    Authors: Philipp Terhörst, Marco Huber, Naser Damer, Florian Kirchbuchner, Kiran Raja, Arjan Kuijper

    Abstract: An essential factor to achieve high performance in face recognition systems is the quality of its samples. Since these systems are involved in daily life there is a strong need of making face recognition processes understandable for humans. In this work, we introduce the concept of pixel-level face image quality that determines the utility of pixels in a face image for recognition. We propose a tr… ▽ More

    Submitted 30 November, 2021; v1 submitted 21 October, 2021; originally announced October 2021.

  28. arXiv:2108.09130  [pdf, other

    cs.CV

    ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation

    Authors: Naser Damer, Kiran Raja, Marius Süßmilch, Sushma Venkatesh, Fadi Boutros, Meiling Fang, Florian Kirchbuchner, Raghavendra Ramachandra, Arjan Kuijper

    Abstract: Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a morphed face detector (MFD), training on all possible attack types is essential to achieve good detection performance. Therefore, investigating new methods of creating morphing attacks drives… ▽ More

    Submitted 24 September, 2021; v1 submitted 20 August, 2021; originally announced August 2021.

    Comments: Accepted at the 16th International Symposium on Visual Computing (ISVC 2021)

  29. arXiv:2106.15288  [pdf, other

    cs.CV

    MFR 2021: Masked Face Recognition Competition

    Authors: Fadi Boutros, Naser Damer, Jan Niklas Kolf, Kiran Raja, Florian Kirchbuchner, Raghavendra Ramachandra, Arjan Kuijper, Pengcheng Fang, Chao Zhang, Fei Wang, David Montero, Naiara Aginako, Basilio Sierra, Marcos Nieto, Mustafa Ekrem Erakin, Ugur Demir, Hazim Kemal, Ekenel, Asaki Kataoka, Kohei Ichikawa, Shizuma Kubo, Jie Zhang, Mingjie He, Dan Han, Shiguang Shan , et al. (10 additional authors not shown)

    Abstract: This paper presents a summary of the Masked Face Recognition Competitions (MFR) held within the 2021 International Joint Conference on Biometrics (IJCB 2021). The competition attracted a total of 10 participating teams with valid submissions. The affiliations of these teams are diverse and associated with academia and industry in nine different countries. These teams successfully submitted 18 vali… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: Accepted at International Join Conference on Biometrics (IJCB 2021)

  30. arXiv:2105.07809  [pdf, other

    eess.IV cs.CV cs.LG

    Learned Smartphone ISP on Mobile NPUs with Deep Learning, Mobile AI 2021 Challenge: Report

    Authors: Andrey Ignatov, Cheng-Ming Chiang, Hsien-Kai Kuo, Anastasia Sycheva, Radu Timofte, Min-Hung Chen, Man-Yu Lee, Yu-Syuan Xu, Yu Tseng, Shusong Xu, Jin Guo, Chao-Hung Chen, Ming-Chun Hsyu, Wen-Chia Tsai, Chao-Wei Chen, Grigory Malivenko, Minsu Kwon, Myungje Lee, Jaeyoon Yoo, Changbeom Kang, Shinjo Wang, Zheng Shaolong, Hao Dejun, Xie Fen, Feng Zhuang , et al. (16 additional authors not shown)

    Abstract: As the quality of mobile cameras starts to play a crucial role in modern smartphones, more and more attention is now being paid to ISP algorithms used to improve various perceptual aspects of mobile photos. In this Mobile AI challenge, the target was to develop an end-to-end deep learning-based image signal processing (ISP) pipeline that can replace classical hand-crafted ISPs and achieve nearly r… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: Mobile AI 2021 Workshop and Challenges: https://ai-benchmark.com/workshops/mai/2021/

  31. arXiv:2104.02815  [pdf, other

    cs.CV cs.CR

    On the Applicability of Synthetic Data for Face Recognition

    Authors: Haoyu Zhang, Marcel Grimmer, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: Face verification has come into increasing focus in various applications including the European Entry/Exit System, which integrates face recognition mechanisms. At the same time, the rapid advancement of biometric authentication requires extensive performance tests in order to inhibit the discriminatory treatment of travellers due to their demographic background. However, the use of face images co… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

  32. edATLAS: An Efficient Disambiguation Algorithm for Texting in Languages with Abugida Scripts

    Authors: Sourav Ghosh, Sourabh Vasant Gothe, Chandramouli Sanchi, Barath Raj Kandur Raja

    Abstract: Abugida refers to a phonogram writing system where each syllable is represented using a single consonant or typographic ligature, along with a default vowel or optional diacritic(s) to denote other vowels. However, texting in these languages has some unique challenges in spite of the advent of devices with soft keyboard supporting custom key layouts. The number of characters in these languages is… ▽ More

    Submitted 29 March, 2021; v1 submitted 4 January, 2021; originally announced January 2021.

    Comments: Published in 2021 IEEE 15th International Conference on Semantic Computing (ICSC)

    Journal ref: 2021 IEEE 15th International Conference on Semantic Computing (ICSC), Laguna Hills, CA, USA, 2021, pp. 325-332

  33. arXiv:2101.03025  [pdf, other

    cs.CL cs.LG

    EmpLite: A Lightweight Sequence Labeling Model for Emphasis Selection of Short Texts

    Authors: Vibhav Agarwal, Sourav Ghosh, Kranti Chalamalasetti, Bharath Challa, Sonal Kumari, Harshavardhana, Barath Raj Kandur Raja

    Abstract: Word emphasis in textual content aims at conveying the desired intention by changing the size, color, typeface, style (bold, italic, etc.), and other typographical features. The emphasized words are extremely helpful in drawing the readers' attention to specific information that the authors wish to emphasize. However, performing such emphasis using a soft keyboard for social media interactions is… ▽ More

    Submitted 15 December, 2020; originally announced January 2021.

    Comments: Accepted for publication in ICON 2020: 17th International Conference on Natural Language Processing

    Report number: 2020.icon-1.3 (ACL Anthology)

    Journal ref: 17th International Conference on Natural Language Processing (ICON), Patna, India, December 18 - 21, 2020, pages 19-26, ACL Anthology: 2020.icon-1.3

  34. LiteMuL: A Lightweight On-Device Sequence Tagger using Multi-task Learning

    Authors: Sonal Kumari, Vibhav Agarwal, Bharath Challa, Kranti Chalamalasetti, Sourav Ghosh, Harshavardhana, Barath Raj Kandur Raja

    Abstract: Named entity detection and Parts-of-speech tagging are the key tasks for many NLP applications. Although the current state of the art methods achieved near perfection for long, formal, structured text there are hindrances in deploying these models on memory-constrained devices such as mobile phones. Furthermore, the performance of these models is degraded when they encounter short, informal, and c… ▽ More

    Submitted 29 March, 2021; v1 submitted 15 December, 2020; originally announced January 2021.

    Comments: Published in 2021 IEEE 15th International Conference on Semantic Computing (ICSC); Candidate for Best Paper Award

    Journal ref: 2021 IEEE 15th International Conference on Semantic Computing (ICSC), Laguna Hills, CA, USA, 2021, pp. 1-8

  35. arXiv:2011.02045  [pdf, other

    cs.CV cs.CR cs.CY

    Face Morphing Attack Generation & Detection: A Comprehensive Survey

    Authors: Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community. The goal of a morphing attack is to subvert the FRS at Automatic Border Control (ABC) gates by presenting the Electronic Machine Readable Travel Document (eMRTD) or e-passport that is obtained based o… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

  36. arXiv:2010.11700  [pdf, other

    cs.CV cs.LG

    On Benchmarking Iris Recognition within a Head-mounted Display for AR/VR Application

    Authors: Fadi Boutros, Naser Damer, Kiran Raja, Raghavendra Ramachandra, Florian Kirchbuchner, Arjan Kuijper

    Abstract: Augmented and virtual reality is being deployed in different fields of applications. Such applications might involve accessing or processing critical and sensitive information, which requires strict and continuous access control. Given that Head-Mounted Displays (HMD) developed for such applications commonly contains internal cameras for gaze tracking purposes, we evaluate the suitability of such… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

    Comments: Accepted at International Join Conference on Biometrics (IJCB 2020)

  37. arXiv:2009.01729  [pdf, other

    cs.CV cs.CR

    MIPGAN -- Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN

    Authors: Haoyu Zhang, Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch

    Abstract: Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing face images derived from multiple data subjects (e.g., accomplices and malicious actors). Morphed images can be verified against contributing data subjects with a reasonable success rate, given they have a high degree of facial resemblance. The success of morphing attacks is directly dependent on the quality of… ▽ More

    Submitted 7 April, 2021; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: Revised version. Submitted to IEEE T-BIOM 2020

  38. arXiv:2007.03621  [pdf, other

    cs.CV cs.CR eess.IV

    Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? -- Vulnerability and Detection

    Authors: Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch

    Abstract: The primary objective of face morphing is to combine face images of different data subjects (e.g. a malicious actor and an accomplice) to generate a face image that can be equally verified for both contributing data subjects. In this paper, we propose a new framework for generating face morphs using a newer Generative Adversarial Network (GAN) - StyleGAN. In contrast to earlier works, we generate… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: Accepted in IWBF 2020

  39. arXiv:2007.02684  [pdf, other

    cs.CV cs.CY eess.IV

    On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection

    Authors: Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Face morphing attacks have raised critical concerns as they demonstrate a new vulnerability of Face Recognition Systems (FRS), which are widely deployed in border control applications. The face morphing process uses the images from multiple data subjects and performs an image blending operation to generate a morphed image of high quality. The generated morphed image exhibits similar visual charact… ▽ More

    Submitted 19 September, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: Accepted in IJCB 2020

  40. Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking

    Authors: Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond Veldhuis, Davide Maltoni, Christoph Busch

    Abstract: Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to age, gender, ethnicity that are inadequately addressed. Morphing Attack Detection (MAD) algorithms often are prone to generalization challenges as th… ▽ More

    Submitted 28 September, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: This paper is a pre-print. The article is accepted for publication in IEEE Transactions on Information Forensics and Security (TIFS)

    Journal ref: 10.1109/TIFS.2020.3035252

  41. arXiv:2001.05290  [pdf, other

    cs.CV cs.CR

    Morton Filters for Superior Template Protection for Iris Recognition

    Authors: Kiran B. Raja, R. Raghavendra, Sushma Venkatesh, Christoph Busch

    Abstract: We address the fundamental performance issues of template protection (TP) for iris verification. We base our work on the popular Bloom-Filter templates protection & address the key challenges like sub-optimal performance and low unlinkability. Specifically, we focus on cases where Bloom-filter templates results in non-ideal performance due to presence of large degradations within iris images. Iris… ▽ More

    Submitted 15 January, 2020; originally announced January 2020.

  42. arXiv:1912.02487  [pdf, other

    cs.CV

    Smartphone Multi-modal Biometric Authentication: Database and Evaluation

    Authors: Raghavendra Ramachandra, Martin Stokkenes, Amir Mohammadi, Sushma Venkatesh, Kiran Raja, Pankaj Wasnik, Eric Poiret, Sébastien Marcel, Christoph Busch

    Abstract: Biometric-based verification is widely employed on the smartphones for various applications, including financial transactions. In this work, we present a new multimodal biometric dataset (face, voice, and periocular) acquired using a smartphone. The new dataset is comprised of 150 subjects that are captured in six different sessions reflecting real-life scenarios of smartphone assisted authenticat… ▽ More

    Submitted 5 December, 2019; originally announced December 2019.

  43. arXiv:1912.01408  [pdf, other

    cs.CV eess.IV

    Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition

    Authors: Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Despite the high biometric performance, finger-vein recognition systems are vulnerable to presentation attacks (aka., spoofing attacks). In this paper, we present a new and robust approach for detecting presentation attacks on finger-vein biometric systems exploiting the 3D Shape (normal-map) and material properties (diffuse-map) of the finger. Observing the normal-map and diffuse-map exhibiting e… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: This work was accepted in The 15th International Conference on SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS, 2019

    MSC Class: I.5.4; I.4.9; I.2.10 ACM Class: I.5.4; I.4.9; I.2.10

  44. arXiv:1912.01372  [pdf, other

    cs.CV

    Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance

    Authors: Jag Mohan Singh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch

    Abstract: Face recognition is widely employed in Automated Border Control (ABC) gates, which verify the face image on passport or electronic Machine Readable Travel Document (eMTRD) against the captured image to confirm the identity of the passport holder. In this paper, we present a robust morph detection algorithm that is based on differential morph detection. The proposed method decomposes the bona fide… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: This work was accepted in The 15th International Conference on SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS, 2019

    MSC Class: I.5.4; I.4.9; I.2.10 ACM Class: I.5.4; I.4.9; I.2.10

  45. arXiv:1902.08123  [pdf, other

    cs.CV

    Cross-Sensor Periocular Biometrics in a Global Pandemic: Comparative Benchmark and Novel Multialgorithmic Approach

    Authors: Fernando Alonso-Fernandez, Kiran B. Raja, R. Raghavendra, Cristoph Busch, Josef Bigun, Ruben Vera-Rodriguez, Julian Fierrez

    Abstract: The massive availability of cameras results in a wide variability of imaging conditions, producing large intra-class variations and a significant performance drop if heterogeneous images are compared for person recognition. However, as biometrics is deployed, it is common to replace damaged or obsolete hardware, or to exchange information between heterogeneous applications. Variations in spectral… ▽ More

    Submitted 30 March, 2022; v1 submitted 21 February, 2019; originally announced February 2019.

    Comments: Accepted for publication at Elsevier Information Fusion

  46. arXiv:1609.01597  [pdf

    cs.CL cs.IR

    A Hybrid Citation Retrieval Algorithm for Evidence-based Clinical Knowledge Summarization: Combining Concept Extraction, Vector Similarity and Query Expansion for High Precision

    Authors: Kalpana Raja, Andrew J Sauer, Ravi P Garg, Melanie R Klerer, Siddhartha R Jonnalagadda

    Abstract: Novel information retrieval methods to identify citations relevant to a clinical topic can overcome the knowledge gap existing between the primary literature (MEDLINE) and online clinical knowledge resources such as UpToDate. Searching the MEDLINE database directly or with query expansion methods returns a large number of citations that are not relevant to the query. The current study presents a c… ▽ More

    Submitted 6 September, 2016; originally announced September 2016.

  47. arXiv:1609.01592  [pdf

    cs.CL cs.CY

    CRTS: A type system for representing clinical recommendations

    Authors: Ravi P Garg, Kalpana Raja, Siddhartha R Jonnalagadda

    Abstract: Background: Clinical guidelines and recommendations are the driving wheels of the evidence-based medicine (EBM) paradigm, but these are available primarily as unstructured text and are generally highly heterogeneous in nature. This significantly reduces the dissemination and automatic application of these recommendations at the point of care. A comprehensive structured representation of these reco… ▽ More

    Submitted 6 September, 2016; originally announced September 2016.

  48. Computational Model to Generate Case-Inflected Forms of Masculine Nouns for Word Search in Sanskrit E-Text

    Authors: S V Kasmir Raja, V Rajitha, Lakshmanan Meenakshi

    Abstract: The problem of word search in Sanskrit is inseparable from complexities that include those caused by euphonic conjunctions and case-inflections. The case-inflectional forms of a noun normally number 24 owing to the fact that in Sanskrit there are eight cases and three numbers-singular, dual and plural. The traditional method of generating these inflectional forms is rather elaborate owing to the f… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

    Journal ref: Journal of Computer Science (ISSN Print: 1549-3636, ISSN Online: 1552-6607), December 2014, Volume 10, Issue 11, Pages 2269-2283

  49. arXiv:1410.2871  [pdf

    cs.CL

    An Ontology for Comprehensive Tutoring of Euphonic Conjunctions of Sanskrit Grammar

    Authors: S. V. Kasmir Raja, V. Rajitha, Meenakshi Lakshmanan

    Abstract: Euphonic conjunctions (sandhis) form a very important aspect of Sanskrit morphology and phonology. The traditional and modern methods of studying about euphonic conjunctions in Sanskrit follow different methodologies. The former involves a rigorous study of the Paninian system embodied in Panini's Ashtadhyayi, while the latter usually involves the study of a few important sandhi rules with the use… ▽ More

    Submitted 3 February, 2015; v1 submitted 10 October, 2014; originally announced October 2014.

    Journal ref: European Journal of Scientific Research, ISSN 1450-216X / 1450-202X, Vol. 124, No. 4, September 2014, pp 460-467

  50. arXiv:1409.4364  [pdf

    cs.CL

    Computational Algorithms Based on the Paninian System to Process Euphonic Conjunctions for Word Searches

    Authors: S. V. Kasmir Raja, V. Rajitha, Meenakshi Lakshmanan

    Abstract: Searching for words in Sanskrit E-text is a problem that is accompanied by complexities introduced by features of Sanskrit such as euphonic conjunctions or sandhis. A word could occur in an E-text in a transformed form owing to the operation of rules of sandhi. Simple word search would not yield these transformed forms of the word. Further, there is no search engine in the literature that can comp… ▽ More

    Submitted 15 September, 2014; originally announced September 2014.

    Journal ref: International Journal of Computer Science and Information Security, Vol. 12, No. 8, 2014, pp. 64-76