Search Results for author: Aras Asaad

Found 4 papers, 1 papers with code

Generalizability of CNN Architectures for Face Morph Presentation Attack

no code implementations17 Oct 2023 Sherko R. HmaSalah, Aras Asaad

One of the fundamental concepts of ML system design is the ability to generalize effectively to previously unseen data, hence not only we evaluate the performance of CNN models within individual datasets but also explore their performance across combined datasets and investigating each dataset in testing phase only.

Face Recognition MORPH

A Novel Poisoned Water Detection Method Using Smartphone Embedded Wi-Fi Technology and Machine Learning Algorithms

1 code implementation13 Feb 2023 Halgurd S. Maghdid, Sheerko R. Hma Salah, Akar T. Hawre, Hassan M. Bayram, Azhin T. Sabir, Kosrat N. Kaka, Salam Ghafour Taher, Ladeh S. Abdulrahman, Abdulbasit K. Al-Talabani, Safar M. Asaad, Aras Asaad

The Wi-Fi access points (WAPs) signal is acquired via equivalent smartphone-embedded Wi-Fi chipsets, and then Channel-State-Information CSI measures are extracted and converted into feature vectors to be used as input for machine learning classification algorithms.

Classification

Artificial Image Tampering Distorts Spatial Distribution of Texture Landmarks and Quality Characteristics

no code implementations4 Aug 2022 Tahir Hassan, Aras Asaad, Dashti Ali, Sabah Jassim

Advances in AI based computer vision has led to a significant growth in synthetic image generation and artificial image tampering with serious implications for unethical exploitations that undermine person identification and could make render AI predictions less explainable. Morphing, Deepfake and other artificial generation of face photographs undermine the reliability of face biometrics authentication using different electronic ID documents. Morphed face photographs on e-passports can fool automated border control systems and human guards. This paper extends our previous work on using the persistent homology (PH) of texture landmarks to detect morphing attacks. We demonstrate that artificial image tampering distorts the spatial distribution of texture landmarks (i. e. their PH) as well as that of a set of image quality characteristics. We shall demonstrate that the tamper caused distortion of these two slim feature vectors provide significant potentials for building explainable (Handcrafted) tamper detectors with low error rates and suitable for implementation on constrained devices.

Face Swapping Image Generation +1

Persistent Homology for Breast Tumor Classification using Mammogram Scans

no code implementations7 Jan 2022 Aras Asaad, Dashti Ali, Taban Majeed, Rasber Rashid

An Important tool in the field topological data analysis is known as persistent Homology (PH) which is used to encode abstract representation of the homology of data at different resolutions in the form of persistence diagram (PD).

Anomaly Detection Classification +1

Cannot find the paper you are looking for? You can Submit a new open access paper.