Search Results for author: Arun Ross

Found 32 papers, 6 papers with code

Periocular Biometrics and its Relevance to Partially Masked Faces: A Survey

no code implementations29 Mar 2022 Renu Sharma, Arun Ross

The performance of face recognition systems can be negatively impacted in the presence of masks and other types of facial coverings that have become prevalent due to the COVID-19 pandemic.

Face Recognition

Trust in AI and Its Role in the Acceptance of AI Technologies

no code implementations23 Mar 2022 Hyesun Choung, Prabu David, Arun Ross

This paper addresses this need by explaining the role of trust on the intention to use AI technologies.

Beyond the Visible: A Survey on Cross-spectral Face Recognition

no code implementations12 Jan 2022 David Anghelone, Cunjian Chen, Arun Ross, Antitza Dantcheva

Secondly, we discuss the appropriate spectral bands for face recognition and discuss recent CFR methods, placing emphasis on deep neural networks.

Face Recognition

The State of Aerial Surveillance: A Survey

no code implementations9 Jan 2022 Kien Nguyen, Clinton Fookes, Sridha Sridharan, YingLi Tian, Feng Liu, Xiaoming Liu, Arun Ross

The rapid emergence of airborne platforms and imaging sensors are enabling new forms of aerial surveillance due to their unprecedented advantages in scale, mobility, deployment and covert observation capabilities.

Conditional Identity Disentanglement for Differential Face Morph Detection

no code implementations5 Jul 2021 Sudipta Banerjee, Arun Ross

We performed experiments on AMSL face morph, MorGAN, and EMorGAN datasets to demonstrate the effectiveness of the proposed method.

Disentanglement

Fingerprint Presentation Attack Detection utilizing Time-Series, Color Fingerprint Captures

no code implementations8 Apr 2021 Richard Plesh, Keivan Bahmani, Ganghee Jang, David Yambay, Ken Brownlee, Timothy Swyka, Peter Johnson, Arun Ross, Stephanie Schuckers

This paper demonstrates the viability of utilizing a sensor with time-series and color-sensing capabilities to improve the robustness of a traditional fingerprint sensor and introduces a comprehensive fingerprint dataset with over 36, 000 image sequences and a state-of-the-art set of spoofing techniques.

Feature Engineering General Classification +1

One-shot Representational Learning for Joint Biometric and Device Authentication

no code implementations2 Jan 2021 Sudipta Banerjee, Arun Ross

In this work, we propose a method to simultaneously perform (i) biometric recognition (i. e., identify the individual), and (ii) device recognition, (i. e., identify the device) from a single biometric image, say, a face image, using a one-shot schema.

DeepTalk: Vocal Style Encoding for Speaker Recognition and Speech Synthesis

1 code implementation9 Dec 2020 Anurag Chowdhury, Arun Ross, Prabu David

Automatic speaker recognition algorithms typically characterize speech audio using short-term spectral features that encode the physiological and anatomical aspects of speech production.

Speaker Recognition Speech Synthesis

CIT-GAN: Cyclic Image Translation Generative Adversarial Network With Application in Iris Presentation Attack Detection

no code implementations4 Dec 2020 Shivangi Yadav, Arun Ross

The Styling Network helps the generator to drive the translation of images from a source domain to a reference domain and generate synthetic images with style characteristics of the reference domain.

Style Transfer Translation

Complex-valued Iris Recognition Network

no code implementations23 Nov 2020 Kien Nguyen, Clinton Fookes, Sridha Sridharan, Arun Ross

Unlike the problem of general object recognition, where real-valued neural networks can be used to extract pertinent features, iris recognition depends on the extraction of both phase and magnitude information from the input iris texture in order to better represent its biometric content.

Iris Recognition Object Recognition

Attention-Guided Network for Iris Presentation Attack Detection

no code implementations23 Oct 2020 Cunjian Chen, Arun Ross

Two types of attention modules are independently appended on top of the last convolutional layer of the backbone network.

Viability of Optical Coherence Tomography for Iris Presentation Attack Detection

no code implementations22 Oct 2020 Renu Sharma, Arun Ross

In this paper, we propose the use of Optical Coherence Tomography (OCT) imaging for the problem of iris presentation attack (PA) detection.

Smartphone Camera De-identification while Preserving Biometric Utility

no code implementations17 Sep 2020 Sudipta Banerjee, Arun Ross

The principle of Photo Response Non Uniformity (PRNU) is often exploited to deduce the identity of the smartphone device whose camera or sensor was used to acquire a certain image.

De-identification

DeepVOX: Discovering Features from Raw Audio for Speaker Recognition in Degraded Audio Signals

no code implementations26 Aug 2020 Anurag Chowdhury, Arun Ross

Automatic speaker recognition algorithms typically use pre-defined filterbanks, such as Mel-Frequency and Gammatone filterbanks, for characterizing speech audio.

Speaker Recognition

JukeBox: A Multilingual Singer Recognition Dataset

no code implementations8 Aug 2020 Anurag Chowdhury, Austin Cozzo, Arun Ross

We also evaluate the effect of gender and language on speaker recognition performance, both in spoken and singing voice data.

Speaker Recognition Text-Independent Speaker Recognition

D-NetPAD: An Explainable and Interpretable Iris Presentation Attack Detector

2 code implementations2 Jul 2020 Renu Sharma, Arun Ross

An iris recognition system is vulnerable to presentation attacks, or PAs, where an adversary presents artifacts such as printed eyes, plastic eyes, or cosmetic contact lenses to circumvent the system.

Iris Recognition

Face Phylogeny Tree Using Basis Functions

no code implementations21 Feb 2020 Sudipta Banerjee, Arun Ross

We also utilize the same basis functions to model geometric transformations and deep-learning based transformations.

Image Forensics

PrivacyNet: Semi-Adversarial Networks for Multi-attribute Face Privacy

no code implementations2 Jan 2020 Vahid Mirjalili, Sebastian Raschka, Arun Ross

Further, PrivacyNet allows a person to choose specific attributes that have to be obfuscated in the input face images (e. g., age and race), while allowing for other types of attributes to be extracted (e. g., gender).

Some Research Problems in Biometrics: The Future Beckons

no code implementations12 May 2019 Arun Ross, Sudipta Banerjee, Cunjian Chen, Anurag Chowdhury, Vahid Mirjalili, Renu Sharma, Thomas Swearingen, Shivangi Yadav

The need for reliably determining the identity of a person is critical in a number of different domains ranging from personal smartphones to border security; from autonomous vehicles to e-voting; from tracking child vaccinations to preventing human trafficking; from crime scene investigation to personalization of customer service.

Autonomous Vehicles

Forecasting Pedestrian Trajectory with Machine-Annotated Training Data

1 code implementation9 May 2019 Olly Styles, Arun Ross, Victor Sanchez

In this work, we present a deep learning approach for pedestrian trajectory forecasting using a single vehicle-mounted camera.

Pedestrian Detection Trajectory Forecasting

FlowSAN: Privacy-enhancing Semi-Adversarial Networks to Confound Arbitrary Face-based Gender Classifiers

no code implementations3 May 2019 Vahid Mirjalili, Sebastian Raschka, Arun Ross

In this regard, Semi-Adversarial Networks (SAN) have recently emerged as a method for imparting soft-biometric privacy to face images.

Matching Thermal to Visible Face Images Using a Semantic-Guided Generative Adversarial Network

no code implementations3 Mar 2019 Cunjian Chen, Arun Ross

Designing face recognition systems that are capable of matching face images obtained in the thermal spectrum with those obtained in the visible spectrum is a challenging problem.

Face Generation Face Parsing +1

A Comprehensive Overview of Biometric Fusion

no code implementations8 Feb 2019 Maneet Singh, Richa Singh, Arun Ross

A comprehensive review of techniques incorporating ancillary information in the biometric recognition pipeline is also presented.

Actions Speak Louder Than (Pass)words: Passive Authentication of Smartphone Users via Deep Temporal Features

no code implementations16 Jan 2019 Debayan Deb, Arun Ross, Anil K. Jain, Kwaku Prakah-Asante, K. Venkatesh Prasad

Prevailing user authentication schemes on smartphones rely on explicit user interaction, where a user types in a passcode or presents a biometric cue such as face, fingerprint, or iris.

Spoofing PRNU Patterns of Iris Sensors while Preserving Iris Recognition

no code implementations31 Aug 2018 Sudipta Banerjee, Vahid Mirjalili, Arun Ross

The principle of Photo Response Non-Uniformity (PRNU) is used to link an image with its source, i. e., the sensor that produced it.

Iris Recognition

Gender Privacy: An Ensemble of Semi Adversarial Networks for Confounding Arbitrary Gender Classifiers

no code implementations31 Jul 2018 Vahid Mirjalili, Sebastian Raschka, Arun Ross

Recent research has proposed the use of Semi Adversarial Networks (SAN) for imparting privacy to face images.

Data Augmentation

Analyzing Covariate Influence on Gender and Race Prediction from Near-Infrared Ocular Images

1 code implementation4 May 2018 Denton Bobeldyk, Arun Ross

Recent research has explored the possibility of automatically deducing information such as gender, age and race of an individual from their biometric data.

Iris Recognition

Semi-Adversarial Networks: Convolutional Autoencoders for Imparting Privacy to Face Images

1 code implementation1 Dec 2017 Vahid Mirjalili, Sebastian Raschka, Anoop Namboodiri, Arun Ross

In this paper, we design and evaluate a convolutional autoencoder that perturbs an input face image to impart privacy to a subject.

Face Recognition

Biometrics-as-a-Service: A Framework to Promote Innovative Biometric Recognition in the Cloud

no code implementations25 Oct 2017 Veeru Talreja, Terry Ferrett, Matthew C. Valenti, Arun Ross

This paper presents a framework for Biometrics-as-a-Service (BaaS) that performs biometric matching operations in the cloud, while relying on simple and ubiquitous consumer devices such as smartphones.

DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution

no code implementations21 May 2017 Philip Bontrager, Aditi Roy, Julian Togelius, Nasir Memon, Arun Ross

The proposed method, referred to as Latent Variable Evolution, is based on training a Generative Adversarial Network on a set of real fingerprint images.

Cannot find the paper you are looking for? You can Submit a new open access paper.