Search Results for author: Baaria Chaudhary

Found 6 papers, 0 papers with code

Morph Detection Enhanced by Structured Group Sparsity

no code implementations29 Nov 2021 Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi

As such, instead of using images in the RGB domain, we decompose every image into its wavelet sub-bands using 2D wavelet decomposition and a deep supervised feature selection scheme is employed to find the most discriminative wavelet sub-bands of input images.

Face Recognition feature selection +1

Adversarially Perturbed Wavelet-based Morphed Face Generation

no code implementations3 Nov 2021 Kelsey O'Haire, Sobhan Soleymani, Baaria Chaudhary, Poorya Aghdaie, Jeremy Dawson, Nasser M. Nasrabadi

In this paper, we explore combination of two methods for morphed image generation, those of geometric transformation (warping and blending to create morphed images) and photometric perturbation.

Face Generation MORPH

Attention Aware Wavelet-based Detection of Morphed Face Images

no code implementations29 Jun 2021 Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi

Morphed images have exploited loopholes in the face recognition checkpoints, e. g., Credential Authentication Technology (CAT), used by Transportation Security Administration (TSA), which is a non-trivial security concern.

Face Recognition MORPH

Differential Morph Face Detection using Discriminative Wavelet Sub-bands

no code implementations24 Jun 2021 Baaria Chaudhary, Poorya Aghdaie, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi

For some of the sub-bands, there is a marked difference between the entropy of the sub-band in a bona fide image and the identical sub-band's entropy in a morphed image.

Face Detection Face Recognition +1

Detection of Morphed Face Images Using Discriminative Wavelet Sub-bands

no code implementations16 Jun 2021 Poorya Aghdaie, Baaria Chaudhary, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi

To detect morphing attacks, we propose a method which is based on a discriminative 2D Discrete Wavelet Transform (2D-DWT).

Face Recognition MORPH

Differential Morphed Face Detection Using Deep Siamese Networks

no code implementations2 Dec 2020 Sobhan Soleymani, Baaria Chaudhary, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi

Although biometric facial recognition systems are fast becoming part of security applications, these systems are still vulnerable to morphing attacks, in which a facial reference image can be verified as two or more separate identities.

Decision Making Face Detection +1

Cannot find the paper you are looking for? You can Submit a new open access paper.