Search Results for author: Sushma Venkatesh

Found 17 papers, 0 papers with code

VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection

no code implementations19 Apr 2024 Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, R. S. Gad

In this work, we propose a novel Presentation Attack Detection (PAD) algorithm based on 3D point clouds captured using the frontal camera of a smartphone to detect presentation attacks.

Does complimentary information from multispectral imaging improve face presentation attack detection?

no code implementations20 Nov 2023 Narayan Vetrekar, Raghavendra Ramachandra, Sushma Venkatesh, Jyoti D. Pawar, R. S. Gad

We present PAD based on multispectral images constructed for eight different presentation artifacts resulted from three different artifact species.

Face Presentation Attack Detection

Fingervein Verification using Convolutional Multi-Head Attention Network

no code implementations25 Oct 2023 Raghavendra Ramachandra, Sushma Venkatesh

The proposed VeinAtnNet was trained on the newly constructed fingervein dataset with 300 unique fingervein patterns that were captured in multiple sessions to obtain 92 samples per unique fingervein.

Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes

no code implementations24 Sep 2023 Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh

In this paper, we present an acoustic echo-based face Presentation Attack Detection (PAD) on a smartphone in which the PAs are detected based on the reflection profiles of the transmitted signal.

Face Presentation Attack Detection

Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study

no code implementations7 Apr 2023 Raghavendra Ramachandra, Sushma Venkatesh, Naser Damer, Narayan Vetrekar, Rajendra Gad

The D-MAD methods are based on using two facial images that are captured from the ePassport (also called the reference image) and the trusted device (for example, Automatic Border Control (ABC) gates) to detect whether the face image presented in ePassport is morphed.

Face Morphing Attack Detection

Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins

no code implementations24 Mar 2023 Raghavendra Ramachandra, Sushma Venkatesh, Gaurav Jaswal, Guoqiang Li

We present a systematic study on benchmarking the vulnerability of Face Recognition Systems (FRS) to lookalike and identical twin morphing images.

Benchmarking Face Recognition

Analyzing Human Observer Ability in Morphing Attack Detection -- Where Do We Stand?

no code implementations24 Feb 2022 Sankini Rancha Godage, Frøy Løvåsdal, Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

One prevalent misconception is that an examiner's or observer's capacity for facial morph detection depends on their subject expertise, experience, and familiarity with the issue and that no works have reported the specific results of observers who regularly verify identity (ID) documents for their jobs.

MORPH

ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation

no code implementations20 Aug 2021 Naser Damer, Kiran Raja, Marius Süßmilch, Sushma Venkatesh, Fadi Boutros, Meiling Fang, Florian Kirchbuchner, Raghavendra Ramachandra, Arjan Kuijper

Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks.

Face Recognition Generative Adversarial Network

Face Morphing Attack Generation & Detection: A Comprehensive Survey

no code implementations3 Nov 2020 Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community.

Benchmarking Face Recognition +1

MIPGAN -- Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN

no code implementations3 Sep 2020 Haoyu Zhang, Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch

Extensive experiments are carried out to assess the FRS's vulnerability against the proposed morphed face generation technique on three types of data such as digital images, re-digitized (printed and scanned) images, and compressed images after re-digitization from newly generated MIPGAN Face Morph Dataset.

Face Generation Face Recognition +2

On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection

no code implementations6 Jul 2020 Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

To this extent, we have introduced a new morphed face dataset with ageing derived from the publicly available MORPH II face dataset, which we refer to as MorphAge dataset.

Face Recognition MORPH

Morton Filters for Superior Template Protection for Iris Recognition

no code implementations15 Jan 2020 Kiran B. Raja, R. Raghavendra, Sushma Venkatesh, Christoph Busch

To this end, we propose and extend our earlier ideas of Morton-filters for obtaining better and reliable templates for iris.

Iris Recognition

Smartphone Multi-modal Biometric Authentication: Database and Evaluation

no code implementations5 Dec 2019 Raghavendra Ramachandra, Martin Stokkenes, Amir Mohammadi, Sushma Venkatesh, Kiran Raja, Pankaj Wasnik, Eric Poiret, Sébastien Marcel, Christoph Busch

One of the unique features of this dataset is that it is collected in four different geographic locations representing a diverse population and ethnicity.

Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition

no code implementations3 Dec 2019 Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch

We establish the superiority of the proposed approach by benchmarking it with classical textural feature-descriptor applied directly on finger-vein images.

Benchmarking Finger Vein Recognition

Cannot find the paper you are looking for? You can Submit a new open access paper.