no code implementations • 9 Sep 2024 • Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
Face morphing attack detection (MAD) algorithms have become essential to overcome the vulnerability of face recognition systems.
1 code implementation • 24 Aug 2024 • Juan E. Tapia, Sebastian Gonzalez, Daniel Benalcazar, Christoph Busch
In the last few years, face morphing has been shown to be a complex challenge for Face Recognition Systems (FRS).
no code implementations • 21 Aug 2024 • André Dörsch, Torsten Schlett, Peter Munch, Christian Rathgeb, Christoph Busch
Quality assessment algorithms measure the quality of a captured biometric sample.
2 code implementations • 18 Aug 2024 • Juan E. Tapia, Maximilian Russo, Christoph Busch
Morphing Attack Detection (MAD) is a relevant topic that aims to detect attempts by unauthorised individuals to access a "valid" identity.
no code implementations • 2 May 2024 • Praveen Kumar Chandaliya, Kiran Raja, Raghavendra Ramachandra, Zahid Akhtar, Christoph Busch
Numerous studies have shown that existing Face Recognition Systems (FRS), including commercial ones, often exhibit biases toward certain ethnicities due to under-represented data.
no code implementations • 27 Apr 2024 • Oubaida Chouchane, Christoph Busch, Chiara Galdi, Nicholas Evans, Massimiliano Todisco
When decisions are made and when personal data is treated by automated processes, there is an expectation of fairness -- that members of different demographic groups receive equitable treatment.
no code implementations • 14 Mar 2024 • Juan Tapia, Christoph Busch
Our results show that MAD trained on EfficientNetB0 from FERET, FRGCv2, and FRLL can reach a lower error rate in comparison with SOTA.
no code implementations • 8 Feb 2024 • Marcel Grimmer, Raymond N. J. Veldhuis, Christoph Busch
The recognition performance of biometric systems strongly depends on the quality of the compared biometric samples.
1 code implementation • 25 Jan 2024 • Torsten Schlett, Christian Rathgeb, Juan Tapia, Christoph Busch
Additional steps based on face recognition and face image quality assessment models reduce false positives, and facilitate the deduplication of the face images both for intra- and inter-subject duplicate sets.
no code implementations • 21 Jan 2024 • Mathias Ibsen, Lázaro J. González-Soler, Christian Rathgeb, Christoph Busch
Face recognition systems are widely deployed in high-security applications such as for biometric verification at border controls.
no code implementations • 22 Dec 2023 • Wassim Kabbani, Christoph Busch, Kiran Raja
Face image quality assessment (FIQA) is crucial for obtaining good face recognition performance.
no code implementations • 22 Dec 2023 • Wassim Kabbani, Marcel Grimmer, Christoph Busch
In this work, EGAIN, an architecture for constructing GAN inversion models, is presented.
no code implementations • 8 Nov 2023 • Marta Gomez-Barrero, Javier Galbally, Christian Rathgeb, Christoph Busch
The wide deployment of biometric recognition systems in the last two decades has raised privacy concerns regarding the storage and use of biometric data.
no code implementations • 2 Nov 2023 • Fernando Alonso-Fernandez, Kiran B. Raja, Christoph Busch, Josef Bigun
The proliferation of cameras and personal devices results in a wide variability of imaging conditions, producing large intra-class variations and a significant performance drop when images from heterogeneous environments are compared.
no code implementations • 6 Oct 2023 • Patrick Tinsley, Sandip Purnapatra, Mahsa Mitcheff, Aidan Boyd, Colton Crum, Kevin Bowyer, Patrick Flynn, Stephanie Schuckers, Adam Czajka, Meiling Fang, Naser Damer, Xingyu Liu, Caiyong Wang, Xianyun Sun, Zhaohua Chang, Xinyue Li, Guangzhe Zhao, Juan Tapia, Christoph Busch, Carlos Aravena, Daniel Schulz
New elements in this fifth competition include (1) GAN-generated iris images as a category of presentation attack instruments (PAI), and (2) an evaluation of human accuracy at detecting PAI as a reference benchmark.
no code implementations • 4 Oct 2023 • Daile Osorio-Roig, Lazaro J. Gonzalez-Soler, Christian Rathgeb, Christoph Busch
In the context of privacy protection, several template protection schemes have been proposed in the past.
no code implementations • 4 Oct 2023 • Daile Osorio-Roig, Paul A. Gerlitz, Christian Rathgeb, Christoph Busch
Generally, privacy-enhancing face recognition systems are designed to offer permanent protection of face embeddings.
no code implementations • 4 Oct 2023 • Daile Osorio-Roig, Mahdi Ghafourian, Christian Rathgeb, Ruben Vera-Rodriguez, Christoph Busch, Julian Fierrez
Nowadays, facial recognition systems are still vulnerable to adversarial attacks.
no code implementations • 19 Aug 2023 • Marcel Grimmer, Christian Rathgeb, Raymond Veldhuis, Christoph Busch
Accurate face recognition systems are increasingly important in sensitive applications like border control or migration management.
no code implementations • 17 Jul 2023 • Tim Rohwedder, Daile Osorio-Roig, Christian Rathgeb, Christoph Busch
We also study the impact in terms of recognition performance of the fingerprint textural information for two sensor types, i. e. optical and capacitive.
no code implementations • 29 May 2023 • Roman Kessler, Kiran Raja, Juan Tapia, Christoph Busch
The results endorse the advantages of face embeddings in more effective image pre-selection for face morphing and accurate detection of morphed face images.
no code implementations • 27 Apr 2023 • Jannis Priesnitz, Axel Weißenfeld, Laurenz Ruzicka, Christian Rathgeb, Bernhard Strobl, Ralph Lessmann, Christoph Busch
In experiments, the MCLFIQ method is compared against the original NFIQ 2. 2 method, a sharpness-based quality assessment algorithm developed for contactless fingerprint images \rev{and the general purpose image quality assessment method BRISQUE.
no code implementations • 25 Apr 2023 • Juan Tapia, Christoph Busch
This paper proposes an explainable visualisation of different face feature extraction algorithms that enable the detection of bona fide and morphing images for single morphing attack detection.
1 code implementation • 25 Apr 2023 • Diego Pasmino, Carlos Aravena, Juan Tapia, Christoph Busch
This will help researchers to compare new approaches to existing algorithms on a wider database.
no code implementations • 3 Apr 2023 • Xinwei Liu, Kiran Raja, Renfang Wang, Hong Qiu, Hucheng Wu, Dechao Sun, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra, Christoph Busch
Further, existing databases for latent fingerprint recognition do not have a large number of unique subjects/fingerprint instances or do not provide ground truth/reference fingerprint images to conduct a cross-comparison against the latent.
1 code implementation • 23 Mar 2023 • Torsten Schlett, Christian Rathgeb, Juan Tapia, Christoph Busch
Additionally, a discard fraction limit or range must be selected to compute pAUC values, which can then be used to quantitatively rank quality assessment algorithms.
no code implementations • 5 Mar 2023 • Christian Rathgeb, Jascha Kolberg, Andreas Uhl, Christoph Busch
Biometric systems utilising deep learning have been shown to achieve auspicious recognition accuracy, surpassing human performance.
1 code implementation • 1 Mar 2023 • Marcel Grimmer, Christian Rathgeb, Christoph Busch
Evaluating the quality of facial images is essential for operating face recognition systems with sufficient accuracy.
no code implementations • 26 Feb 2023 • Hatef Otroshi Shahreza, Pietro Melzi, Dailé Osorio-Roig, Christian Rathgeb, Christoph Busch, Sébastien Marcel, Ruben Tolosana, Ruben Vera-Rodriguez
In this paper, we benchmark several cancelable biometrics (CB) schemes on different biometric characteristics.
no code implementations • 24 Feb 2023 • Torsten Schlett, Sebastian Schachner, Christian Rathgeb, Juan Tapia, Christoph Busch
This work investigates the effect of lossy image compression on a state-of-the-art face recognition model, and on multiple face image quality assessment models.
no code implementations • 22 Nov 2022 • Dhruv Patel, Abhinav Jain, Simran Bawkar, Manav Khorasiya, Kalpesh Prajapati, Kishor Upla, Kiran Raja, Raghavendra Ramachandra, Christoph Busch
We introduce a new triplet-based adversarial loss function that exploits the information provided in the LR image by using it as a negative sample.
no code implementations • 31 Oct 2022 • Daniel Benalcazar, Juan E. Tapia, Sebastian Gonzalez, Christoph Busch
Currently, it is ever more common to access online services for activities which formerly required physical attendance.
no code implementations • 24 Oct 2022 • Daniel P. Benalcazar, Juan E. Tapia, Mauricio Vasquez, Leonardo Causa, Enrique Lopez Droguett, Christoph Busch
Iris Recognition (IR) is one of the market's most reliable and accurate biometric systems.
no code implementations • 30 Sep 2022 • Carlos Aravena, Diego Pasmino, Juan E. Tapia, Christoph Busch
In this paper, we study the effect of quality assessment methods on filtering bona fide and attack samples, their impact on PAD systems, and how the performance of such systems is improved when training on a filtered (by quality) dataset.
no code implementations • 4 Sep 2022 • Juan Tapia, Daniel Benalcazar, Andres Valenzuela, Leonardo Causa, Enrique Lopez Droguett, Christoph Busch
This research proposes a new database and method to detect the reduction of alertness conditions due to alcohol, drug consumption and sleepiness deprivation from Near-Infra-Red (NIR) periocular eye images.
1 code implementation • 4 Sep 2022 • Juan Tapia, Enrique Lopez Droguett, Christoph Busch
This research proposes a method to detect alcohol consumption from Near-Infra-Red (NIR) periocular eye images.
no code implementations • 19 Aug 2022 • Indu Joshi, Marcel Grimmer, Christian Rathgeb, Christoph Busch, Francois Bremond, Antitza Dantcheva
This survey is intended for researchers and practitioners in the field of human analysis.
no code implementations • 17 Aug 2022 • Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
The vast progress in synthetic image synthesis enables the generation of facial images in high resolution and photorealism.
no code implementations • 22 Jun 2022 • Juan Tapia, Daniel Schulz, Christoph Busch
This paper proposes a framework following the Few-Shot-Learning approach that shares image information based on the siamese network using triplet-semi-hard-loss to tackle the morphing attack detection and boost the clustering classification process.
no code implementations • 21 Jun 2022 • Pietro Melzi, Christian Rathgeb, Ruben Tolosana, Ruben Vera-Rodriguez, Christoph Busch
Privacy-enhancing technologies are technologies that implement fundamental data protection principles.
1 code implementation • 28 Apr 2022 • Matteo Ferrara, Annalisa Franco, Davide Maltoni, Christoph Busch
In security systems the risk assessment in the sense of common criteria testing is a very relevant topic; this requires quantifying the attack potential in terms of the expertise of the attacker, his knowledge about the target and access to equipment.
no code implementations • 24 Feb 2022 • Sankini Rancha Godage, Frøy Løvåsdal, Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch
One prevalent misconception is that an examiner's or observer's capacity for facial morph detection depends on their subject expertise, experience, and familiarity with the issue and that no works have reported the specific results of observers who regularly verify identity (ID) documents for their jobs.
no code implementations • 12 Feb 2022 • Cristian Botezatu, Mathias Ibsen, Christian Rathgeb, Christoph Busch
This work investigates the impact of fun selfie filters, which are frequently used to modify selfies, on face recognition systems.
no code implementations • 10 Feb 2022 • Mathias Ibsen, Christian Rathgeb, Pawel Drozdowski, Christoph Busch
Moreover, we demonstrate the feasibility of the generation by using a deep learning-based model for removing tattoos from face images.
no code implementations • 31 Jan 2022 • Christian Rathgeb, Robert Nichols, Mathias Ibsen, Pawel Drozdowski, Christoph Busch
To this end, various decision fusion methods are proposed incorporating the examiners' decision confidence, experience level, and their time to take a decision.
no code implementations • 28 Jan 2022 • Robert Nichols, Christian Rathgeb, Pawel Drozdowski, Christoph Busch
In recent years, increasing deployment of face recognition technology in security-critical settings, such as border control or law enforcement, has led to considerable interest in the vulnerability of face recognition systems to attacks utilising legitimate documents, which are issued on the basis of digitally manipulated face images.
no code implementations • 21 Jan 2022 • Christian Rathgeb, Daniel Fischer, Pawel Drozdowski, Christoph Busch
Doppelg\"angers (or lookalikes) usually yield an increased probability of false matches in a facial recognition system, as opposed to random face image pairs selected for non-mated comparison trials.
no code implementations • 7 Dec 2021 • Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
Mated samples are generated by manipulating latent vectors, and more precisely, we exploit Principal Component Analysis (PCA) to define semantically meaningful directions in the latent space and control the similarity between the original and the mated samples using a pre-trained face recognition system.
no code implementations • 24 Nov 2021 • Rodrigo Lara, Andres Valenzuela, Daniel Schulz, Juan Tapia, Christoph Busch
The best results for the fused multi-country dataset of ID Card images from Chile, Argentina and Mexico reached an IoU of 0. 9911.
no code implementations • 24 Nov 2021 • Dailé Osorio-Roig, Christian Rathgeb, Pawel Drozdowski, Philipp Terhörst, Vitomir Štruc, Christoph Busch
Future works on privacy-enhancing face recognition are encouraged to include the proposed attack in evaluations on the privacy protection.
no code implementations • 23 Nov 2021 • Raghavendra Ramachandra, Kiran Raja, Christoph Busch
In this paper, we study and present a comprehensive analysis of algorithmic fairness of the existing Single image-based Morph Attack Detection (S-MAD) algorithms.
1 code implementation • 22 Nov 2021 • Wentian Zhang, Haozhe Liu, Feng Liu, Raghavendra Ramachandra, Christoph Busch
The proposed method, first introduces task specific features from other face related task, then, we design a Cross-Modal Adapter using a Graph Attention Network (GAT) to re-map such features to adapt to PAD task.
no code implementations • 26 Oct 2021 • Juan Tapia, Christoph Busch
Face morphing attack detection is a challenging task.
no code implementations • 18 Oct 2021 • Jannis Priesnitz, Christian Rathgeb, Nicolas Buchmann, Christoph Busch
We present the first method for synthetic generation of contactless fingerprint images, referred to as SynCoLFinGer.
no code implementations • 7 Oct 2021 • Mathias Ibsen, Lázaro J. González-Soler, Christian Rathgeb, Pawel Drozdowski, Marta Gomez-Barrero, Christoph Busch
Due to their convenience and high accuracy, face recognition systems are widely employed in governmental and personal security applications to automatically recognise individuals.
no code implementations • 9 Sep 2021 • Hareesh Mandalapu, Aravinda Reddy P N, Raghavendra Ramachandra, K Sreenivasa Rao, Pabitra Mitra, S R Mahadeva Prasanna, Christoph Busch
This new dataset contains 103 subjects captured in three different sessions considering the different real-world scenarios.
no code implementations • 27 Jul 2021 • Pawel Drozdowski, Fabian Stockhardt, Christian Rathgeb, Dailé Osorio-Roig, Christoph Busch
Protection of the biometric probe templates, as well as the stored reference templates and the created index is carried out using homomorphic encryption.
no code implementations • 26 Jul 2021 • Jose Maureira, Juan Tapia, Claudia Arellano, Christoph Busch
Such results demonstrated the feasibility of synthetic images to fool presentation attacks detection algorithms and the need for such algorithms to be constantly updated and trained with a larger number of images and PAI scenarios.
no code implementations • 30 Jun 2021 • Juan Tapia, Enrique Lopez Droguett, Andres Valenzuela, Daniel Benalcazar, Leonardo Causa, Christoph Busch
The purpose of the system is to measure the fitness for duty.
no code implementations • 15 Jun 2021 • Pawel Drozdowski, Christian Rathgeb, Christoph Busch
Recently, different researchers have found that the gallery composition of a face database can induce performance differentials to facial identification systems in which a probe image is compared against up to all stored reference images to reach a biometric decision.
no code implementations • 31 May 2021 • Christian Rathgeb, Pawel Drozdowski, Naser Damer, Dinusha C. Frings, Christoph Busch
Algorithmic decision systems have frequently been labelled as "biased", "racist", "sexist", or "unfair" by numerous media outlets, organisations, and researchers.
no code implementations • 28 May 2021 • Juan Tapia, Sebastian Gonzalez, Christoph Busch
The bona fide class consists of live iris images, whereas the attack presentation instrument classes are comprised of cadaver, printed, and contact lenses images, for a total of four scenarios.
2 code implementations • 17 May 2021 • Andrey Ignatov, Cheng-Ming Chiang, Hsien-Kai Kuo, Anastasia Sycheva, Radu Timofte, Min-Hung Chen, Man-Yu Lee, Yu-Syuan Xu, Yu Tseng, Shusong Xu, Jin Guo, Chao-Hung Chen, Ming-Chun Hsyu, Wen-Chia Tsai, Chao-Wei Chen, Grigory Malivenko, Minsu Kwon, Myungje Lee, Jaeyoon Yoo, Changbeom Kang, Shinjo Wang, Zheng Shaolong, Hao Dejun, Xie Fen, Feng Zhuang, Yipeng Ma, Jingyang Peng, Tao Wang, Fenglong Song, Chih-Chung Hsu, Kwan-Lin Chen, Mei-Hsuang Wu, Vishal Chudasama, Kalpesh Prajapati, Heena Patel, Anjali Sarvaiya, Kishor Upla, Kiran Raja, Raghavendra Ramachandra, Christoph Busch, Etienne de Stoutz
As the quality of mobile cameras starts to play a crucial role in modern smartphones, more and more attention is now being paid to ISP algorithms used to improve various perceptual aspects of mobile photos.
no code implementations • 6 Apr 2021 • Haoyu Zhang, Marcel Grimmer, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
Face verification has come into increasing focus in various applications including the European Entry/Exit System, which integrates face recognition mechanisms.
no code implementations • 17 Mar 2021 • Mathias Ibsen, Christian Rathgeb, Thomas Fink, Pawel Drozdowski, Christoph Busch
In this work, we investigate the impact that facial tattoos and paintings have on current face recognition systems.
no code implementations • 5 Mar 2021 • Christian Rathgeb, Kevin Bernardo, Nathania E. Haryanto, Christoph Busch
Results obtained from challenging cross-database experiments in which the analyzed retouching technique is unknown during training yield interesting findings: (1) most competitive detection performance is achieved for differential scenarios employing deep face representations; (2) image compression severely impacts the performance of face image manipulation detection schemes based on texture descriptors while methods utilizing deep face representations are found to be highly robust; (3) in some cases, the application of image compression might as well improve detection performance.
no code implementations • 5 Mar 2021 • Pawel Drozdowski, Fabian Stockhardt, Christian Rathgeb, Christoph Busch
The growing scope, scale, and number of biometric deployments around the world emphasise the need for research into technologies facilitating efficient and reliable biometric identification queries.
1 code implementation • 4 Mar 2021 • Jannis Priesnitz, Rolf Huesmann, Christian Rathgeb, Nicolas Buchmann, Christoph Busch
We provide a comprehensive description of the entire recognition pipeline and discuss important requirements for a fully automated capturing system.
no code implementations • 2 Mar 2021 • Lázaro J. González-Soler, Marta Gomez-Barrero, Christoph Busch
In order to mitigate those security concerns, most face Presentation Attack Detection techniques have reported a good detection performance when they are evaluated on known Presentation Attack Instruments (PAI) and acquisition conditions, in contrast to more challenging scenarios where unknown attacks are included in the test set.
no code implementations • 18 Feb 2021 • Marta Gomez-Barrero, Pawel Drozdowski, Christian Rathgeb, Jose Patino, Massimmiliano Todisco, Andras Nautsch, Naser Damer, Jannis Priesnitz, Nicholas Evans, Christoph Busch
Since early 2020 the COVID-19 pandemic has had a considerable impact on many aspects of daily life.
no code implementations • 16 Feb 2021 • Juan Tapia, Andres Valenzuela, Rodrigo Lara, Marta Gomez-Barrero, Christoph Busch
Selfie-based biometrics has great potential for a wide range of applications since, e. g. periocular verification is contactless and is safe to use in pandemics such as COVID-19, when a major portion of a face is covered by a facial mask.
no code implementations • 3 Nov 2020 • Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community.
no code implementations • 19 Oct 2020 • Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch
Therefore, presentation attack detection (PAD) methods are of utmost importance in order to distinguish between bona fide and attack presentations.
no code implementations • 8 Oct 2020 • Lazaro J. Gonzalez-Soler, Jose Patino, Marta Gomez-Barrero, Massimiliano Todisco, Christoph Busch, Nicholas Evans
Despite these and other advantages, biometric systems in general and Automatic speaker verification (ASV) systems in particular can be vulnerable to attack presentations.
no code implementations • 3 Sep 2020 • Haoyu Zhang, Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch
Extensive experiments are carried out to assess the FRS's vulnerability against the proposed morphed face generation technique on three types of data such as digital images, re-digitized (printed and scanned) images, and compressed images after re-digitization from newly generated MIPGAN Face Morph Dataset.
no code implementations • 2 Sep 2020 • Torsten Schlett, Christian Rathgeb, Olaf Henniger, Javier Galbally, Julian Fierrez, Christoph Busch
The performance of face analysis and recognition systems depends on the quality of the acquired face data, which is influenced by numerous factors.
no code implementations • 18 Aug 2020 • Jascha Kolberg, Marcel Grimmer, Marta Gomez-Barrero, Christoph Busch
In recent years, the popularity of fingerprint-based biometric authentication systems significantly increased.
no code implementations • 7 Jul 2020 • Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch
\textit{(i) Can GAN generated morphs threaten Face Recognition Systems (FRS) equally as Landmark based morphs?}
no code implementations • 6 Jul 2020 • Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch
To this extent, we have introduced a new morphed face dataset with ageing derived from the publicly available MORPH II face dataset, which we refer to as MorphAge dataset.
no code implementations • 19 Jun 2020 • Torsten Schlett, Christian Rathgeb, Christoph Busch
All tested enhancer types exclusively use depth data as input, which differs from methods that enhance depth based on additional input data such as visible light color images.
no code implementations • 11 Jun 2020 • Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond Veldhuis, Davide Maltoni, Christoph Busch
Further, we present a new online evaluation platform to test algorithms on sequestered data.
no code implementations • 9 Jun 2020 • Christian Rathgeb, Pawel Drozdowski, Christoph Busch
Facial cosmetics have the ability to substantially alter the facial appearance, which can negatively affect the decisions of a face recognition.
no code implementations • 15 Jan 2020 • Kiran B. Raja, R. Raghavendra, Sushma Venkatesh, Christoph Busch
To this end, we propose and extend our earlier ideas of Morton-filters for obtaining better and reliable templates for iris.
no code implementations • 5 Jan 2020 • Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Christoph Busch
In addition, the application of deep face representations for differential morphing attack detection algorithms is investigated.
Cryptography and Security
no code implementations • 5 Dec 2019 • Raghavendra Ramachandra, Martin Stokkenes, Amir Mohammadi, Sushma Venkatesh, Kiran Raja, Pankaj Wasnik, Eric Poiret, Sébastien Marcel, Christoph Busch
One of the unique features of this dataset is that it is collected in four different geographic locations representing a diverse population and ethnicity.
no code implementations • 3 Dec 2019 • Jag Mohan Singh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch
Face recognition is widely employed in Automated Border Control (ABC) gates, which verify the face image on passport or electronic Machine Readable Travel Document (eMTRD) against the captured image to confirm the identity of the passport holder.
no code implementations • 3 Dec 2019 • Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch
We establish the superiority of the proposed approach by benchmarking it with classical textural feature-descriptor applied directly on finger-vein images.
no code implementations • 27 Aug 2019 • Lázaro J. González-Soler, Marta Gomez-Barrero, Leonardo Chang, Airel Pérez-Suárez, Christoph Busch
Fingerprint-based biometric systems have experienced a large development in the last years.
no code implementations • 1 May 2019 • Juan Tapia, Christian Rathgeb, Christoph Busch
In this paper, we provide a comprehensive analysis of periocular-based sex-prediction (commonly referred to as gender classification) using state-of-the-art machine learning techniques.
no code implementations • 26 Apr 2019 • Ignacio Viedma, Juan Tapia, Andres Iturriaga, Christoph Busch
In this work, we analyze and demonstrate the location of the most relevant features that describe gender in periocular NIR images and evaluate its influence its classification.
no code implementations • 28 Feb 2019 • Ruben Tolosana, Marta Gomez-Barrero, Christoph Busch, Javier Ortega-Garcia
The increased need for unattended authentication in multiple scenarios has motivated a wide deployment of biometric systems in the last few years.