Skip to main content

Showing 1–50 of 55 results for author: Ramachandra, R

  1. arXiv:2406.13384  [pdf, other

    cs.SD cs.CV cs.MM eess.AS

    Straight Through Gumbel Softmax Estimator based Bimodal Neural Architecture Search for Audio-Visual Deepfake Detection

    Authors: Aravinda Reddy PN, Raghavendra Ramachandra, Krothapalli Sreenivasa Rao, Pabitra Mitra, Vinod Rathod

    Abstract: Deepfakes are a major security risk for biometric authentication. This technology creates realistic fake videos that can impersonate real people, fooling systems that rely on facial features and voice patterns for identification. Existing multimodal deepfake detectors rely on conventional fusion methods, such as majority rule and ensemble voting, which often struggle to adapt to changing data char… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  2. arXiv:2405.01273  [pdf, other

    cs.CV cs.AI

    Towards Inclusive Face Recognition Through Synthetic Ethnicity Alteration

    Authors: Praveen Kumar Chandaliya, Kiran Raja, Raghavendra Ramachandra, Zahid Akhtar, Christoph Busch

    Abstract: Numerous studies have shown that existing Face Recognition Systems (FRS), including commercial ones, often exhibit biases toward certain ethnicities due to under-represented data. In this work, we explore ethnicity alteration and skin tone modification using synthetic face image generation methods to increase the diversity of datasets. We conduct a detailed analysis by first constructing a balance… ▽ More

    Submitted 6 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: 8 Pages

    Journal ref: Automatic Face and Gesture Recognition 2024

  3. arXiv:2404.15765  [pdf, other

    cs.CV

    3D Face Morphing Attack Generation using Non-Rigid Registration

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face Recognition Systems (FRS) are widely used in commercial environments, such as e-commerce and e-banking, owing to their high accuracy in real-world conditions. However, these systems are vulnerable to facial morphing attacks, which are generated by blending face color images of different subjects. This paper presents a new method for generating 3D face morphs from two bona fide point clouds. T… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: Accepted to 2024 18th International Conference on Automatic Face and Gesture Recognition (FG) as short paper

  4. arXiv:2404.12680  [pdf, other

    cs.CV cs.CR

    VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection

    Authors: Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, R. S. Gad

    Abstract: Facial biometrics are an essential components of smartphones to ensure reliable and trustworthy authentication. However, face biometric systems are vulnerable to Presentation Attacks (PAs), and the availability of more sophisticated presentation attack instruments such as 3D silicone face masks will allow attackers to deceive face recognition systems easily. In this work, we propose a novel Presen… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Accepted in 2024 18th International Conference on Automatic Face and Gesture Recognition (FG)

  5. arXiv:2404.12679  [pdf, other

    cs.CV cs.CR

    MLSD-GAN -- Generating Strong High Quality Face Morphing Attacks using Latent Semantic Disentanglement

    Authors: Aravinda Reddy PN, Raghavendra Ramachandra, Krothapalli Sreenivasa Rao, Pabitra Mitra

    Abstract: Face-morphing attacks are a growing concern for biometric researchers, as they can be used to fool face recognition systems (FRS). These attacks can be generated at the image level (supervised) or representation level (unsupervised). Previous unsupervised morphing attacks have relied on generative adversarial networks (GANs). More recently, researchers have used linear interpolation of StyleGAN-en… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  6. arXiv:2404.09790  [pdf, other

    cs.CV

    NTIRE 2024 Challenge on Image Super-Resolution ($\times$4): Methods and Results

    Authors: Zheng Chen, Zongwei Wu, Eduard Zamfir, Kai Zhang, Yulun Zhang, Radu Timofte, Xiaokang Yang, Hongyuan Yu, Cheng Wan, Yuxin Hong, Zhijuan Huang, Yajun Zou, Yuan Huang, Jiamin Lin, Bingnan Han, Xianyu Guan, Yongsheng Yu, Daoan Zhang, Xuanwu Yin, Kunlong Zuo, Jinhua Hao, Kai Zhao, Kun Yuan, Ming Sun, Chao Zhou , et al. (63 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2024 challenge on image super-resolution ($\times$4), highlighting the solutions proposed and the outcomes obtained. The challenge involves generating corresponding high-resolution (HR) images, magnified by a factor of four, from low-resolution (LR) inputs using prior information. The LR images originate from bicubic downsampling degradation. The aim of the challenge i… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: NTIRE 2024 webpage: https://cvlai.net/ntire/2024. Code: https://github.com/zhengchen1999/NTIRE2024_ImageSR_x4

  7. arXiv:2403.16202  [pdf, other

    cs.CV

    FH-SSTNet: Forehead Creases based User Verification using Spatio-Spatial Temporal Network

    Authors: Geetanjali Sharma, Gaurav Jaswal, Aditya Nigam, Raghavendra Ramachandra

    Abstract: Biometric authentication, which utilizes contactless features, such as forehead patterns, has become increasingly important for identity verification and access management. The proposed method is based on learning a 3D spatio-spatial temporal convolution to create detailed pictures of forehead patterns. We introduce a new CNN model called the Forehead Spatio-Spatial Temporal Network (FH-SSTNet), w… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

    Comments: 6 pages, 5 Figure, IWBF conference

  8. arXiv:2401.00512  [pdf, ps, other

    cs.LO

    A parametricity-based formalization of semi-simplicial and semi-cubical sets

    Authors: Hugo Herbelin, Ramkumar Ramachandra

    Abstract: Semi-simplicial and semi-cubical sets are commonly defined as presheaves over respectively, the semi-simplex or semi-cube category. Homotopy Type Theory then popularized an alternative definition, where the set of n-simplices or n-cubes are instead regrouped into the families of the fibers over their faces, leading to a characterization we call indexed. Moreover, it is known that semi-simplicial a… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

    Comments: Associated formalization in Coq at https://github.com/artagnon/bonak

    ACM Class: F.4.1

  9. arXiv:2311.11566  [pdf, other

    cs.CV

    Does complimentary information from multispectral imaging improve face presentation attack detection?

    Authors: Narayan Vetrekar, Raghavendra Ramachandra, Sushma Venkatesh, Jyoti D. Pawar, R. S. Gad

    Abstract: Presentation Attack Detection (PAD) has been extensively studied, particularly in the visible spectrum. With the advancement of sensing technology beyond the visible range, multispectral imaging has gained significant attention in this direction. We present PAD based on multispectral images constructed for eight different presentation artifacts resulted from three different artifact species. In th… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: Accepted in International IEEE Applied Sensing Conference (IEEE APSCON) 2024

  10. arXiv:2311.05336  [pdf, other

    cs.CV

    SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data

    Authors: Meiling Fang, Marco Huber, Julian Fierrez, Raghavendra Ramachandra, Naser Damer, Alhasan Alkhaddour, Maksim Kasantcev, Vasiliy Pryadchenko, Ziyuan Yang, Huijie Huangfu, Yingyu Chen, Yi Zhang, Yuchen Pan, Junjun Jiang, Xianming Liu, Xianyun Sun, Caiyong Wang, Xingyu Liu, Zhaohua Chang, Guangzhe Zhao, Juan Tapia, Lazaro Gonzalez-Soler, Carlos Aravena, Daniel Schulz

    Abstract: This paper presents a summary of the Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data (SynFacePAD 2023) held at the 2023 International Joint Conference on Biometrics (IJCB 2023). The competition attracted a total of 8 participating teams with valid submissions from academia and industry. The competition aimed to motivate and attract solutions that ta… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: Accepted at IJCB2 023

  11. arXiv:2310.16808  [pdf, other

    cs.CV

    Fingervein Verification using Convolutional Multi-Head Attention Network

    Authors: Raghavendra Ramachandra, Sushma Venkatesh

    Abstract: Biometric verification systems are deployed in various security-based access-control applications that require user-friendly and reliable person verification. Among the different biometric characteristics, fingervein biometrics have been extensively studied owing to their reliable verification performance. Furthermore, fingervein patterns reside inside the skin and are not visible outside; therefo… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: Accepted in IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2024

  12. arXiv:2310.12736  [pdf, other

    cs.CV

    ExtSwap: Leveraging Extended Latent Mapper for Generating High Quality Face Swapping

    Authors: Aravinda Reddy PN, K. Sreenivasa Rao, Raghavendra Ramachandra, Pabitra mitra

    Abstract: We present a novel face swapping method using the progressively growing structure of a pre-trained StyleGAN. Previous methods use different encoder decoder structures, embedding integration networks to produce high-quality results, but their quality suffers from entangled representation. We disentangle semantics by deriving identity and attribute features separately. By learning to map the concate… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

  13. arXiv:2309.13704  [pdf, other

    cs.CV

    Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes

    Authors: Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh

    Abstract: Facial biometrics are widely deployed in smartphone-based applications because of their usability and increased verification accuracy in unconstrained scenarios. The evolving applications of smartphone-based facial recognition have also increased Presentation Attacks (PAs), where an attacker can present a Presentation Attack Instrument (PAI) to maliciously gain access to the application. Because t… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: Accepted in IJCB 2023

  14. arXiv:2307.01845  [pdf, other

    cs.CV

    Deep Features for Contactless Fingerprint Presentation Attack Detection: Can They Be Generalized?

    Authors: Hailin Li, Raghavendra Ramachandra

    Abstract: The rapid evolution of high-end smartphones with advanced high-resolution cameras has resulted in contactless capture of fingerprint biometrics that are more reliable and suitable for verification. Similar to other biometric systems, contactless fingerprint-verification systems are vulnerable to presentation attacks. In this paper, we present a comparative study on the generalizability of seven di… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Comments: Preprint paper accepted by First Workshop on Contactless Hand Biometrics and Gesture Recognition (CHBGR-2023)

  15. arXiv:2305.17522  [pdf, other

    cs.CV

    Deep Learning based Fingerprint Presentation Attack Detection: A Comprehensive Survey

    Authors: Hailin Li, Raghavendra Ramachandra

    Abstract: The vulnerabilities of fingerprint authentication systems have raised security concerns when adapting them to highly secure access-control applications. Therefore, Fingerprint Presentation Attack Detection (FPAD) methods are essential for ensuring reliable fingerprint authentication. Owing to the lack of generation capacity of traditional handcrafted based approaches, deep learning-based FPAD has… ▽ More

    Submitted 27 May, 2023; originally announced May 2023.

    Comments: 29 pages, submitted to ACM computing survey journal

  16. arXiv:2305.03264  [pdf, other

    cs.CV

    Robust Face Morphing Attack Detection Using Fusion of Multiple Features and Classification Techniques

    Authors: Jag Mohan Singh Sushma Venkatesh Raghavendra Ramachandra

    Abstract: Face Recognition System (FRS) are shown to be vulnerable to morphed images of newborns. Detecting morphing attacks stemming from face images of newborn is important to avoid unwanted consequences, both for security and society. In this paper, we present a new reference-based/Differential Morphing Attack Detection (MAD) method to detect newborn morphing images using Wavelet Scattering Network (WSN)… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: 26TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION 2023

  17. arXiv:2305.01294  [pdf, other

    cs.CV

    Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Guoqiang Li, Kiran Raja

    Abstract: Face Recognition System (FRS) are shown to be vulnerable to morphed images of newborns. Detecting morphing attacks stemming from face images of newborn is important to avoid unwanted consequences, both for security and society. In this paper, we present a new reference-based/Differential Morphing Attack Detection (MAD) method to detect newborn morphing images using Wavelet Scattering Network (WSN)… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: accepted in 5th International Conference on Bio-engineering for Smart Technologies (BIO-SMART 2023)

  18. arXiv:2304.03510  [pdf, other

    cs.CV

    Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Naser Damer, Narayan Vetrekar, Rajendra Gad

    Abstract: Face morphing attack detection is emerging as an increasingly challenging problem owing to advancements in high-quality and realistic morphing attack generation. Reliable detection of morphing attacks is essential because these attacks are targeted for border control applications. This paper presents a multispectral framework for differential morphing-attack detection (D-MAD). The D-MAD methods ar… ▽ More

    Submitted 25 October, 2023; v1 submitted 7 April, 2023; originally announced April 2023.

    Comments: Accepted in IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2024

  19. arXiv:2304.00979  [pdf, other

    cs.CV

    A Latent Fingerprint in the Wild Database

    Authors: Xinwei Liu, Kiran Raja, Renfang Wang, Hong Qiu, Hucheng Wu, Dechao Sun, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra, Christoph Busch

    Abstract: Latent fingerprints are among the most important and widely used evidence in crime scenes, digital forensics and law enforcement worldwide. Despite the number of advancements reported in recent works, we note that significant open issues such as independent benchmarking and lack of large-scale evaluation databases for improving the algorithms are inadequately addressed. The available databases are… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security (under review)

  20. arXiv:2303.14004  [pdf, other

    cs.CV

    Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Gaurav Jaswal, Guoqiang Li

    Abstract: Face morphing attacks have emerged as a potential threat, particularly in automatic border control scenarios. Morphing attacks permit more than one individual to use travel documents that can be used to cross borders using automatic border control gates. The potential for morphing attacks depends on the selection of data subjects (accomplice and malicious actors). This work investigates lookalike… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: Accepted in IWBF 2023

  21. arXiv:2302.03954  [pdf

    cs.RO

    Temporal Video-Language Alignment Network for Reward Shaping in Reinforcement Learning

    Authors: Ziyuan Cao, Reshma Anugundanahalli Ramachandra, Kelin Yu

    Abstract: Designing appropriate reward functions for Reinforcement Learning (RL) approaches has been a significant problem, especially for complex environments such as Atari games. Utilizing natural language instructions to provide intermediate rewards to RL agents in a process known as reward shaping can help the agent in reaching the goal state faster. In this work, we propose a natural language-based rew… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

  22. arXiv:2212.14143  [pdf, other

    cs.CV

    Multimodal Wildland Fire Smoke Detection

    Authors: Siddhant Baldota, Shreyas Anantha Ramaprasad, Jaspreet Kaur Bhamra, Shane Luna, Ravi Ramachandra, Eugene Zen, Harrison Kim, Daniel Crawl, Ismael Perez, Ilkay Altintas, Garrison W. Cottrell, Mai H. Nguyen

    Abstract: Research has shown that climate change creates warmer temperatures and drier conditions, leading to longer wildfire seasons and increased wildfire risks in the United States. These factors have in turn led to increases in the frequency, extent, and severity of wildfires in recent years. Given the danger posed by wildland fires to people, property, wildlife, and the environment, there is an urgency… ▽ More

    Submitted 28 December, 2022; originally announced December 2022.

  23. arXiv:2212.05884  [pdf, other

    cs.CV cs.CR

    Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network

    Authors: Raghavendra Ramachandra, Hailin Li

    Abstract: Fingerphoto images captured using a smartphone are successfully used to verify the individuals that have enabled several applications. This work presents a novel algorithm for fingerphoto verification using a nested residual block: Finger-NestNet. The proposed Finger-NestNet architecture is designed with three consecutive convolution blocks followed by a series of nested residual blocks to achieve… ▽ More

    Submitted 9 December, 2022; originally announced December 2022.

    Comments: a preprint paper accepted in wacv2023 workshop

  24. arXiv:2211.12180  [pdf, other

    eess.IV cs.CV

    SRTGAN: Triplet Loss based Generative Adversarial Network for Real-World Super-Resolution

    Authors: Dhruv Patel, Abhinav Jain, Simran Bawkar, Manav Khorasiya, Kalpesh Prajapati, Kishor Upla, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Many applications such as forensics, surveillance, satellite imaging, medical imaging, etc., demand High-Resolution (HR) images. However, obtaining an HR image is not always possible due to the limitations of optical sensors and their costs. An alternative solution called Single Image Super-Resolution (SISR) is a software-driven approach that aims to take a Low-Resolution (LR) image and obtain the… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

    Comments: Affiliated with the Sardar Vallabhbhai National Institute of Technology (SVNIT), India and Norwegian University of Science and Technology (NTNU), Norway. Presented at the 7th International Conference on Computer Vision and Image Processing (CVIP) 2022

  25. arXiv:2211.11039  [pdf, other

    cs.CV

    Deep Composite Face Image Attacks: Generation, Vulnerability and Detection

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks (CFIA) based on facial attributes using Generative Adversarial Networks (GANs). Given the face images corresponding to two unique data subjects, the proposed CFIA method will indepen… ▽ More

    Submitted 20 March, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

    Comments: The submitted paper is accepted in IEEE Access 2023

  26. arXiv:2209.15474  [pdf, other

    cs.CV

    Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face Recognition Systems (FRS) are vulnerable to various attacks performed directly and indirectly. Among these attacks, face morphing attacks are highly potential in deceiving automatic FRS and human observers and indicate a severe security threat, especially in the border control scenario. This work presents a face morphing attack detection, especially in the On-The-Fly (OTF) Automatic Border Co… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

    Comments: The paper is accepted at the International Joint Conference on Biometrics (IJCB) 2022

  27. arXiv:2209.12208  [pdf, other

    cs.CV

    A Uniform Representation Learning Method for OCT-based Fingerprint Presentation Attack Detection and Reconstruction

    Authors: Wentian Zhang, Haozhe Liu, Feng Liu, Raghavendra Ramachandra

    Abstract: The technology of optical coherence tomography (OCT) to fingerprint imaging opens up a new research potential for fingerprint recognition owing to its ability to capture depth information of the skin layers. Developing robust and high security Automated Fingerprint Recognition Systems (AFRSs) are possible if the depth information can be fully utilized. However, in existing studies, Presentation At… ▽ More

    Submitted 25 September, 2022; originally announced September 2022.

    Comments: 13 pages, 8 figures

  28. arXiv:2208.08207  [pdf, other

    cs.CV cs.AI

    Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data

    Authors: Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: The vast progress in synthetic image synthesis enables the generation of facial images in high resolution and photorealism. In biometric applications, the main motivation for using synthetic data is to solve the shortage of publicly-available biometric data while reducing privacy risks when processing such sensitive information. These advantages are exploited in this work by simulating human face… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

  29. arXiv:2208.07337  [pdf, other

    cs.CV

    SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data

    Authors: Marco Huber, Fadi Boutros, Anh Thi Luu, Kiran Raja, Raghavendra Ramachandra, Naser Damer, Pedro C. Neto, Tiago Gonçalves, Ana F. Sequeira, Jaime S. Cardoso, João Tremoço, Miguel Lourenço, Sergio Serra, Eduardo Cermeño, Marija Ivanovska, Borut Batagelj, Andrej Kronovšek, Peter Peer, Vitomir Štruc

    Abstract: This paper presents a summary of the Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 International Joint Conference on Biometrics (IJCB 2022). The competition attracted a total of 12 participating teams, both from academia and industry and present in 11 different countries. In the end, seven valid submissions were submitted by… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: Accepted at International Joint Conference on Biometrics (IJCB) 2022

  30. arXiv:2207.00506  [pdf, other

    cs.CV cs.CG

    How Far Can I Go ? : A Self-Supervised Approach for Deterministic Video Depth Forecasting

    Authors: Sauradip Nag, Nisarg Shah, Anran Qi, Raghavendra Ramachandra

    Abstract: In this paper we present a novel self-supervised method to anticipate the depth estimate for a future, unobserved real-world urban scene. This work is the first to explore self-supervised learning for estimation of monocular depth of future unobserved frames of a video. Existing works rely on a large number of annotated samples to generate the probabilistic prediction of depth for unseen frames. H… ▽ More

    Submitted 8 July, 2022; v1 submitted 1 July, 2022; originally announced July 2022.

    Comments: Accepted in ML4AD Workshop, NeurIPS 2021

  31. arXiv:2202.12426  [pdf, other

    cs.CV cs.CY

    Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?

    Authors: Sankini Rancha Godage, Frøy Løvåsdal, Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Few studies have focused on examining how people recognize morphing attacks, even as several publications have examined the susceptibility of automated FRS and offered morphing attack detection (MAD) approaches. MAD approaches base their decisions either on a single image with no reference to compare against (S-MAD) or using a reference image (D-MAD). One prevalent misconception is that an examine… ▽ More

    Submitted 5 September, 2022; v1 submitted 24 February, 2022; originally announced February 2022.

  32. arXiv:2201.03454  [pdf, other

    cs.CV

    3D Face Morphing Attacks: Generation, Vulnerability and Detection

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face Recognition systems (FRS) have been found to be vulnerable to morphing attacks, where the morphed face image is generated by blending the face images from contributory data subjects. This work presents a novel direction for generating face-morphing attacks in 3D. To this extent, we introduced a novel approach based on blending 3D face point clouds corresponding to contributory data subjects.… ▽ More

    Submitted 13 October, 2023; v1 submitted 10 January, 2022; originally announced January 2022.

    Comments: The paper is accepted at IEEE Transactions on Biometrics, Behavior and Identity Science

  33. arXiv:2112.03632  [pdf, other

    cs.CV cs.LG

    Generation of Non-Deterministic Synthetic Face Datasets Guided by Identity Priors

    Authors: Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: Enabling highly secure applications (such as border crossing) with face recognition requires extensive biometric performance tests through large scale data. However, using real face images raises concerns about privacy as the laws do not allow the images to be used for other purposes than originally intended. Using representative and subsets of face data can also lead to unwanted demographic biase… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Journal ref: https://www.ntnu.edu/nikt2021

  34. arXiv:2111.12115  [pdf, other

    cs.CV

    Algorithmic Fairness in Face Morphing Attack Detection

    Authors: Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: Face morphing attacks can compromise Face Recognition System (FRS) by exploiting their vulnerability. Face Morphing Attack Detection (MAD) techniques have been developed in recent past to deter such attacks and mitigate risks from morphing attacks. MAD algorithms, as any other algorithms should treat the images of subjects from different ethnic origins in an equal manner and provide non-discrimina… ▽ More

    Submitted 23 November, 2021; originally announced November 2021.

    Comments: Accepted to WACVW2022

  35. arXiv:2111.11046  [pdf, other

    cs.CV

    FRT-PAD: Effective Presentation Attack Detection Driven by Face Related Task

    Authors: Wentian Zhang, Haozhe Liu, Feng Liu, Raghavendra Ramachandra, Christoph Busch

    Abstract: The robustness and generalization ability of Presentation Attack Detection (PAD) methods is critical to ensure the security of Face Recognition Systems (FRSs). However, in a real scenario, Presentation Attacks (PAs) are various and it is hard to predict the Presentation Attack Instrument (PAI) species that will be used by the attacker. Existing PAD methods are highly dependent on the limited train… ▽ More

    Submitted 31 July, 2022; v1 submitted 22 November, 2021; originally announced November 2021.

    Comments: Accepted by ECCV 2022

  36. arXiv:2111.00919  [pdf, other

    cs.CV

    DFCANet: Dense Feature Calibration-Attention Guided Network for Cross Domain Iris Presentation Attack Detection

    Authors: Gaurav Jaswal, Aman Verma, Sumantra Dutta Roy, Raghavendra Ramachandra

    Abstract: An iris presentation attack detection (IPAD) is essential for securing personal identity is widely used iris recognition systems. However, the existing IPAD algorithms do not generalize well to unseen and cross-domain scenarios because of capture in unconstrained environments and high visual correlation amongst bonafide and attack samples. These similarities in intricate textural and morphological… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

  37. arXiv:2109.04138  [pdf, other

    cs.CR cs.CV

    Multilingual Audio-Visual Smartphone Dataset And Evaluation

    Authors: Hareesh Mandalapu, Aravinda Reddy P N, Raghavendra Ramachandra, K Sreenivasa Rao, Pabitra Mitra, S R Mahadeva Prasanna, Christoph Busch

    Abstract: Smartphones have been employed with biometric-based verification systems to provide security in highly sensitive applications. Audio-visual biometrics are getting popular due to their usability, and also it will be challenging to spoof because of their multimodal nature. In this work, we present an audio-visual smartphone dataset captured in five different recent smartphones. This new dataset cont… ▽ More

    Submitted 15 November, 2021; v1 submitted 9 September, 2021; originally announced September 2021.

  38. Taming Self-Supervised Learning for Presentation Attack Detection: De-Folding and De-Mixing

    Authors: Zhe Kong, Wentian Zhang, Feng Liu, Wenhan Luo, Haozhe Liu, Linlin Shen, Raghavendra Ramachandra

    Abstract: Biometric systems are vulnerable to Presentation Attacks (PA) performed using various Presentation Attack Instruments (PAIs). Even though there are numerous Presentation Attack Detection (PAD) techniques based on both deep learning and hand-crafted features, the generalization of PAD for unknown PAI is still a challenging problem. In this work, we empirically prove that the initialization of the P… ▽ More

    Submitted 2 June, 2023; v1 submitted 9 September, 2021; originally announced September 2021.

    Comments: Accepted by IEEE Transactions on Neural Networks and Learning Systems (TNNLS)

  39. arXiv:2108.09130  [pdf, other

    cs.CV

    ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation

    Authors: Naser Damer, Kiran Raja, Marius Süßmilch, Sushma Venkatesh, Fadi Boutros, Meiling Fang, Florian Kirchbuchner, Raghavendra Ramachandra, Arjan Kuijper

    Abstract: Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a morphed face detector (MFD), training on all possible attack types is essential to achieve good detection performance. Therefore, investigating new methods of creating morphing attacks drives… ▽ More

    Submitted 24 September, 2021; v1 submitted 20 August, 2021; originally announced August 2021.

    Comments: Accepted at the 16th International Symposium on Visual Computing (ISVC 2021)

  40. arXiv:2106.15288  [pdf, other

    cs.CV

    MFR 2021: Masked Face Recognition Competition

    Authors: Fadi Boutros, Naser Damer, Jan Niklas Kolf, Kiran Raja, Florian Kirchbuchner, Raghavendra Ramachandra, Arjan Kuijper, Pengcheng Fang, Chao Zhang, Fei Wang, David Montero, Naiara Aginako, Basilio Sierra, Marcos Nieto, Mustafa Ekrem Erakin, Ugur Demir, Hazim Kemal, Ekenel, Asaki Kataoka, Kohei Ichikawa, Shizuma Kubo, Jie Zhang, Mingjie He, Dan Han, Shiguang Shan , et al. (10 additional authors not shown)

    Abstract: This paper presents a summary of the Masked Face Recognition Competitions (MFR) held within the 2021 International Joint Conference on Biometrics (IJCB 2021). The competition attracted a total of 10 participating teams with valid submissions. The affiliations of these teams are diverse and associated with academia and industry in nine different countries. These teams successfully submitted 18 vali… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: Accepted at International Join Conference on Biometrics (IJCB 2021)

  41. arXiv:2105.07809  [pdf, other

    eess.IV cs.CV cs.LG

    Learned Smartphone ISP on Mobile NPUs with Deep Learning, Mobile AI 2021 Challenge: Report

    Authors: Andrey Ignatov, Cheng-Ming Chiang, Hsien-Kai Kuo, Anastasia Sycheva, Radu Timofte, Min-Hung Chen, Man-Yu Lee, Yu-Syuan Xu, Yu Tseng, Shusong Xu, Jin Guo, Chao-Hung Chen, Ming-Chun Hsyu, Wen-Chia Tsai, Chao-Wei Chen, Grigory Malivenko, Minsu Kwon, Myungje Lee, Jaeyoon Yoo, Changbeom Kang, Shinjo Wang, Zheng Shaolong, Hao Dejun, Xie Fen, Feng Zhuang , et al. (16 additional authors not shown)

    Abstract: As the quality of mobile cameras starts to play a crucial role in modern smartphones, more and more attention is now being paid to ISP algorithms used to improve various perceptual aspects of mobile photos. In this Mobile AI challenge, the target was to develop an end-to-end deep learning-based image signal processing (ISP) pipeline that can replace classical hand-crafted ISPs and achieve nearly r… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: Mobile AI 2021 Workshop and Challenges: https://ai-benchmark.com/workshops/mai/2021/

  42. arXiv:2104.02815  [pdf, other

    cs.CV cs.CR

    On the Applicability of Synthetic Data for Face Recognition

    Authors: Haoyu Zhang, Marcel Grimmer, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: Face verification has come into increasing focus in various applications including the European Entry/Exit System, which integrates face recognition mechanisms. At the same time, the rapid advancement of biometric authentication requires extensive performance tests in order to inhibit the discriminatory treatment of travellers due to their demographic background. However, the use of face images co… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

  43. Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey

    Authors: Hareesh Mandalapu, P N Aravinda Reddy, Raghavendra Ramachandra, K Sreenivasa Rao, Pabitra Mitra, S R Mahadeva Prasanna, Christoph Busch

    Abstract: Biometric recognition is a trending technology that uses unique characteristics data to identify or verify/authenticate security applications. Amidst the classically used biometrics, voice and face attributes are the most propitious for prevalent applications in day-to-day life because they are easy to obtain through restrained and user-friendly procedures. The pervasiveness of low-cost audio and… ▽ More

    Submitted 12 March, 2021; v1 submitted 24 January, 2021; originally announced January 2021.

    Journal ref: in IEEE Access, vol. 9, pp. 37431-37455, 2021

  44. arXiv:2011.02045  [pdf, other

    cs.CV cs.CR cs.CY

    Face Morphing Attack Generation & Detection: A Comprehensive Survey

    Authors: Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community. The goal of a morphing attack is to subvert the FRS at Automatic Border Control (ABC) gates by presenting the Electronic Machine Readable Travel Document (eMRTD) or e-passport that is obtained based o… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

  45. arXiv:2010.11700  [pdf, other

    cs.CV cs.LG

    On Benchmarking Iris Recognition within a Head-mounted Display for AR/VR Application

    Authors: Fadi Boutros, Naser Damer, Kiran Raja, Raghavendra Ramachandra, Florian Kirchbuchner, Arjan Kuijper

    Abstract: Augmented and virtual reality is being deployed in different fields of applications. Such applications might involve accessing or processing critical and sensitive information, which requires strict and continuous access control. Given that Head-Mounted Displays (HMD) developed for such applications commonly contains internal cameras for gaze tracking purposes, we evaluate the suitability of such… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

    Comments: Accepted at International Join Conference on Biometrics (IJCB 2020)

  46. arXiv:2009.01729  [pdf, other

    cs.CV cs.CR

    MIPGAN -- Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN

    Authors: Haoyu Zhang, Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch

    Abstract: Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing face images derived from multiple data subjects (e.g., accomplices and malicious actors). Morphed images can be verified against contributing data subjects with a reasonable success rate, given they have a high degree of facial resemblance. The success of morphing attacks is directly dependent on the quality of… ▽ More

    Submitted 7 April, 2021; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: Revised version. Submitted to IEEE T-BIOM 2020

  47. arXiv:2007.11709  [pdf

    cs.CV cs.CR cs.LG eess.IV

    Adversarial Attacks against Face Recognition: A Comprehensive Study

    Authors: Fatemeh Vakhshiteh, Ahmad Nickabadi, Raghavendra Ramachandra

    Abstract: Face recognition (FR) systems have demonstrated outstanding verification performance, suggesting suitability for real-world applications ranging from photo tagging in social media to automated border control (ABC). In an advanced FR system with deep learning-based architecture, however, promoting the recognition efficiency alone is not sufficient, and the system should also withstand potential kin… ▽ More

    Submitted 6 February, 2021; v1 submitted 22 July, 2020; originally announced July 2020.

  48. arXiv:2007.03621  [pdf, other

    cs.CV cs.CR eess.IV

    Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? -- Vulnerability and Detection

    Authors: Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch

    Abstract: The primary objective of face morphing is to combine face images of different data subjects (e.g. a malicious actor and an accomplice) to generate a face image that can be equally verified for both contributing data subjects. In this paper, we propose a new framework for generating face morphs using a newer Generative Adversarial Network (GAN) - StyleGAN. In contrast to earlier works, we generate… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: Accepted in IWBF 2020

  49. arXiv:2007.02684  [pdf, other

    cs.CV cs.CY eess.IV

    On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection

    Authors: Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Face morphing attacks have raised critical concerns as they demonstrate a new vulnerability of Face Recognition Systems (FRS), which are widely deployed in border control applications. The face morphing process uses the images from multiple data subjects and performs an image blending operation to generate a morphed image of high quality. The generated morphed image exhibits similar visual charact… ▽ More

    Submitted 19 September, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: Accepted in IJCB 2020

  50. Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking

    Authors: Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond Veldhuis, Davide Maltoni, Christoph Busch

    Abstract: Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to age, gender, ethnicity that are inadequately addressed. Morphing Attack Detection (MAD) algorithms often are prone to generalization challenges as th… ▽ More

    Submitted 28 September, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: This paper is a pre-print. The article is accepted for publication in IEEE Transactions on Information Forensics and Security (TIFS)

    Journal ref: 10.1109/TIFS.2020.3035252