Skip to main content

Showing 1–50 of 75 results for author: Ramachandra, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.15332  [pdf, ps, other

    cs.CV

    Towards Zero-Shot Differential Morphing Attack Detection with Multimodal Large Language Models

    Authors: Ria Shekhawat, Hailin Li, Raghavendra Ramachandra, Sushma Venkatesh

    Abstract: Leveraging the power of multimodal large language models (LLMs) offers a promising approach to enhancing the accuracy and interpretability of morphing attack detection (MAD), especially in real-world biometric applications. This work introduces the use of LLMs for differential morphing attack detection (D-MAD). To the best of our knowledge, this is the first study to employ multimodal LLMs to D-MA… ▽ More

    Submitted 21 May, 2025; originally announced May 2025.

    Comments: Accepted at IEEE International Conference on Automatic Face and Gesture Recognition (FG 2025)

  2. arXiv:2504.14582  [pdf, other

    cs.CV

    NTIRE 2025 Challenge on Image Super-Resolution ($\times$4): Methods and Results

    Authors: Zheng Chen, Kai Liu, Jue Gong, Jingkai Wang, Lei Sun, Zongwei Wu, Radu Timofte, Yulun Zhang, Xiangyu Kong, Xiaoxuan Yu, Hyunhee Park, Suejin Han, Hakjae Jeon, Dafeng Zhang, Hyung-Ju Chun, Donghun Ryou, Inju Ha, Bohyung Han, Lu Zhao, Yuyi Zhang, Pengyu Yan, Jiawei Hu, Pengwei Liu, Fengjun Guo, Hongyuan Yu , et al. (86 additional authors not shown)

    Abstract: This paper presents the NTIRE 2025 image super-resolution ($\times$4) challenge, one of the associated competitions of the 10th NTIRE Workshop at CVPR 2025. The challenge aims to recover high-resolution (HR) images from low-resolution (LR) counterparts generated through bicubic downsampling with a $\times$4 scaling factor. The objective is to develop effective network designs or solutions that ach… ▽ More

    Submitted 28 April, 2025; v1 submitted 20 April, 2025; originally announced April 2025.

    Comments: NTIRE 2025 webpage: https://www.cvlai.net/ntire/2025. Code: https://github.com/zhengchen1999/NTIRE2025_ImageSR_x4

  3. arXiv:2503.10937  [pdf, other

    cs.CV cs.AI cs.LG

    ChatGPT Encounters Morphing Attack Detection: Zero-Shot MAD with Multi-Modal Large Language Models and General Vision Models

    Authors: Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: Face Recognition Systems (FRS) are increasingly vulnerable to face-morphing attacks, prompting the development of Morphing Attack Detection (MAD) algorithms. However, a key challenge in MAD lies in its limited generalizability to unseen data and its lack of explainability-critical for practical application environments such as enrolment stations and automated border control systems. Recognizing th… ▽ More

    Submitted 13 March, 2025; originally announced March 2025.

  4. arXiv:2503.05247  [pdf, other

    cs.CV

    ColFigPhotoAttnNet: Reliable Finger Photo Presentation Attack Detection Leveraging Window-Attention on Color Spaces

    Authors: Anudeep Vurity, Emanuela Marasco, Raghavendra Ramachandra, Jongwoo Park

    Abstract: Finger photo Presentation Attack Detection (PAD) can significantly strengthen smartphone device security. However, these algorithms are trained to detect certain types of attacks. Furthermore, they are designed to operate on images acquired by specific capture devices, leading to poor generalization and a lack of robustness in handling the evolving nature of mobile hardware. The proposed investiga… ▽ More

    Submitted 7 March, 2025; originally announced March 2025.

    Comments: Accepted in Winter Conference on Applications of Computer Vision (WACV) 2025

  5. arXiv:2501.13889  [pdf, other

    cs.CV

    Generating Realistic Forehead-Creases for User Verification via Conditioned Piecewise Polynomial Curves

    Authors: Abhishek Tandon, Geetanjali Sharma, Gaurav Jaswal, Aditya Nigam, Raghavendra Ramachandra

    Abstract: We propose a trait-specific image generation method that models forehead creases geometrically using B-spline and Bézier curves. This approach ensures the realistic generation of both principal creases and non-prominent crease patterns, effectively constructing detailed and authentic forehead-crease images. These geometrically rendered images serve as visual prompts for a diffusion-based Edge-to-I… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

    Comments: Accepted at WACV-W 2025

  6. arXiv:2501.09817  [pdf, other

    cs.CV cs.AI

    Generalized Single-Image-Based Morphing Attack Detection Using Deep Representations from Vision Transformer

    Authors: Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: Face morphing attacks have posed severe threats to Face Recognition Systems (FRS), which are operated in border control and passport issuance use cases. Correspondingly, morphing attack detection algorithms (MAD) are needed to defend against such attacks. MAD approaches must be robust enough to handle unknown attacks in an open-set scenario where attacks can originate from various morphing generat… ▽ More

    Submitted 16 January, 2025; originally announced January 2025.

  7. Demographic Variability in Face Image Quality Measures

    Authors: Wassim Kabbani, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Face image quality assessment (FIQA) algorithms are being integrated into online identity management applications. These applications allow users to upload a face image as part of their document issuance process, where the image is then run through a quality assessment process to make sure it meets the quality and compliance requirements. Concerns about demographic bias have been raised about biom… ▽ More

    Submitted 14 January, 2025; originally announced January 2025.

    Journal ref: 2024 International Conference of the Biometrics Special Interest Group (BIOSIG)

  8. arXiv:2501.07202  [pdf, other

    cs.CV

    FaceOracle: Chat with a Face Image Oracle

    Authors: Wassim Kabbani, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: A face image is a mandatory part of ID and travel documents. Obtaining high-quality face images when issuing such documents is crucial for both human examiners and automated face recognition systems. In several international standards, face image quality requirements are intricate and defined in detail. Identifying and understanding non-compliance or defects in the submitted face images is crucial… ▽ More

    Submitted 13 January, 2025; originally announced January 2025.

    Journal ref: ECCV 2024 Workshops

  9. Radial Distortion in Face Images: Detection and Impact

    Authors: Wassim Kabbani, Tristan Le Pessot, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Acquiring face images of sufficiently high quality is important for online ID and travel document issuance applications using face recognition systems (FRS). Low-quality, manipulated (intentionally or unintentionally), or distorted images degrade the FRS performance and facilitate documents' misuse. Securing quality for enrolment images, especially in the unsupervised self-enrolment scenario via a… ▽ More

    Submitted 13 January, 2025; originally announced January 2025.

    Journal ref: 2024 IEEE International Joint Conference on Biometrics (IJCB)

  10. Eye Sclera for Fair Face Image Quality Assessment

    Authors: Wassim Kabbani, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Fair operational systems are crucial in gaining and maintaining society's trust in face recognition systems (FRS). FRS start with capturing an image and assessing its quality before using it further for enrollment or verification. Fair Face Image Quality Assessment (FIQA) schemes therefore become equally important in the context of fair FRS. This work examines the sclera as a quality assessment re… ▽ More

    Submitted 13 January, 2025; originally announced January 2025.

    Journal ref: 2024 12th International Workshop on Biometrics and Forensics (IWBF)

  11. arXiv:2501.02892  [pdf, ps, other

    cs.CV

    FoundPAD: Foundation Models Reloaded for Face Presentation Attack Detection

    Authors: Guray Ozgur, Eduarda Caldeira, Tahar Chettaoui, Fadi Boutros, Raghavendra Ramachandra, Naser Damer

    Abstract: Although face recognition systems have seen a massive performance enhancement in recent years, they are still targeted by threats such as presentation attacks, leading to the need for generalizable presentation attack detection (PAD) algorithms. Current PAD solutions suffer from two main problems: low generalization to unknown cenarios and large training data requirements. Foundation models (FM) a… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

    Comments: Accepted at WACV 2025 workshops

  12. arXiv:2411.10489  [pdf, other

    cs.CR cs.AI cs.CV

    Biometrics in Extended Reality: A Review

    Authors: Ayush Agarwal, Raghavendra Ramachandra, Sushma Venkatesh, S. R. Mahadeva Prasanna

    Abstract: In the domain of Extended Reality (XR), particularly Virtual Reality (VR), extensive research has been devoted to harnessing this transformative technology in various real-world applications. However, a critical challenge that must be addressed before unleashing the full potential of XR in practical scenarios is to ensure robust security and safeguard user privacy. This paper presents a systematic… ▽ More

    Submitted 14 November, 2024; originally announced November 2024.

  13. arXiv:2411.08490  [pdf, ps, other

    cs.CV

    Impact of Iris Pigmentation on Performance Bias in Visible Iris Verification Systems: A Comparative Study

    Authors: Geetanjali Sharma, Abhishek Tandon, Gaurav Jaswal, Aditya Nigam, Raghavendra Ramachandra

    Abstract: Iris recognition technology plays a critical role in biometric identification systems, but their performance can be affected by variations in iris pigmentation. In this work, we investigate the impact of iris pigmentation on the efficacy of biometric recognition systems, focusing on a comparative analysis of blue and dark irises. Data sets were collected using multiple devices, including P1, P2, a… ▽ More

    Submitted 13 November, 2024; originally announced November 2024.

    Comments: 14 pages, 5 figures, 5 Tables

  14. arXiv:2410.07625  [pdf, other

    cs.CV

    MorCode: Face Morphing Attack Generation using Generative Codebooks

    Authors: Aravinda Reddy PN, Raghavendra Ramachandra, Sushma Venkatesh, Krothapalli Sreenivasa Rao, Pabitra Mitra, Rakesh Krishna

    Abstract: Face recognition systems (FRS) can be compromised by face morphing attacks, which blend textural and geometric information from multiple facial images. The rapid evolution of generative AI, especially Generative Adversarial Networks (GAN) or Diffusion models, where encoded images are interpolated to generate high-quality face morphing images. In this work, we present a novel method for the automat… ▽ More

    Submitted 10 October, 2024; originally announced October 2024.

  15. arXiv:2410.06543  [pdf, other

    cs.CR cs.SD eess.AS

    Gumbel Rao Monte Carlo based Bi-Modal Neural Architecture Search for Audio-Visual Deepfake Detection

    Authors: Aravinda Reddy PN, Raghavendra Ramachandra, Krothapalli Sreenivasa Rao, Pabitra Mitra Vinod Rathod

    Abstract: Deepfakes pose a critical threat to biometric authentication systems by generating highly realistic synthetic media. Existing multimodal deepfake detectors often struggle to adapt to diverse data and rely on simple fusion methods. To address these challenges, we propose Gumbel-Rao Monte Carlo Bi-modal Neural Architecture Search (GRMC-BMNAS), a novel architecture search framework that employs Gumbe… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

  16. arXiv:2409.18636  [pdf, other

    cs.CV

    Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models

    Authors: Hailin Li, Raghavendra Ramachandra, Mohamed Ragab, Soumik Mondal, Yong Kiam Tan, Khin Mi Mi Aung

    Abstract: Smartphone-based contactless fingerphoto authentication has become a reliable alternative to traditional contact-based fingerprint biometric systems owing to rapid advances in smartphone camera technology. Despite its convenience, fingerprint authentication through fingerphotos is more vulnerable to presentation attacks, which has motivated recent research efforts towards developing fingerphoto Pr… ▽ More

    Submitted 27 September, 2024; originally announced September 2024.

    Comments: Accepted by IJCB 2024

  17. SynMorph: Generating Synthetic Face Morphing Dataset with Mated Samples

    Authors: Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: Face morphing attack detection (MAD) algorithms have become essential to overcome the vulnerability of face recognition systems. To solve the lack of large-scale and public-available datasets due to privacy concerns and restrictions, in this work we propose a new method to generate a synthetic face morphing dataset with 2450 identities and more than 100k morphs. The proposed synthetic face morphin… ▽ More

    Submitted 22 March, 2025; v1 submitted 9 September, 2024; originally announced September 2024.

    Comments: This preprint has been further published in IEEE Access. Print ISSN: 2169-3536. Online ISSN: 2169-3536. Digital Object Identifier: 10.1109/ACCESS.2025.3548957

    Journal ref: IEEE Access 2025

  18. First Competition on Presentation Attack Detection on ID Card

    Authors: Juan E. Tapia, Naser Damer, Christoph Busch, Juan M. Espin, Javier Barrachina, Alvaro S. Rocamora, Kristof Ocvirk, Leon Alessio, Borut Batagelj, Sushrut Patwardhan, Raghavendra Ramachandra, Raghavendra Mudgalgundurao, Kiran Raja, Daniel Schulz, Carlos Aravena

    Abstract: This paper summarises the Competition on Presentation Attack Detection on ID Cards (PAD-IDCard) held at the 2024 International Joint Conference on Biometrics (IJCB2024). The competition attracted a total of ten registered teams, both from academia and industry. In the end, the participating teams submitted five valid submissions, with eight models to be evaluated by the organisers. The competition… ▽ More

    Submitted 31 August, 2024; originally announced September 2024.

  19. arXiv:2408.15693  [pdf, other

    cs.CV

    Synthetic Forehead-creases Biometric Generation for Reliable User Verification

    Authors: Abhishek Tandon, Geetanjali Sharma, Gaurav Jaswal, Aditya Nigam, Raghavendra Ramachandra

    Abstract: Recent studies have emphasized the potential of forehead-crease patterns as an alternative for face, iris, and periocular recognition, presenting contactless and convenient solutions, particularly in situations where faces are covered by surgical masks. However, collecting forehead data presents challenges, including cost and time constraints, as developing and optimizing forehead verification met… ▽ More

    Submitted 28 August, 2024; originally announced August 2024.

    Comments: Accepted at Generative AI for Futuristic Biometrics - IJCB'24 Special Session

  20. arXiv:2408.04362  [pdf, other

    cs.SD eess.AS

    NeuralMultiling: A Novel Neural Architecture Search for Smartphone based Multilingual Speaker Verification

    Authors: Aravinda Reddy PN, Raghavendra Ramachandra, K. Sreenivasa Rao, Pabitra Mitra

    Abstract: Multilingual speaker verification introduces the challenge of verifying a speaker in multiple languages. Existing systems were built using i-vector/x-vector approaches along with Bi-LSTMs, which were trained to discriminate speakers, irrespective of the language. Instead of exploring the design space manually, we propose a neural architecture search for multilingual speaker verification suitable f… ▽ More

    Submitted 8 August, 2024; originally announced August 2024.

  21. arXiv:2406.13384  [pdf, other

    cs.SD cs.CV cs.MM eess.AS

    Straight Through Gumbel Softmax Estimator based Bimodal Neural Architecture Search for Audio-Visual Deepfake Detection

    Authors: Aravinda Reddy PN, Raghavendra Ramachandra, Krothapalli Sreenivasa Rao, Pabitra Mitra, Vinod Rathod

    Abstract: Deepfakes are a major security risk for biometric authentication. This technology creates realistic fake videos that can impersonate real people, fooling systems that rely on facial features and voice patterns for identification. Existing multimodal deepfake detectors rely on conventional fusion methods, such as majority rule and ensemble voting, which often struggle to adapt to changing data char… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  22. arXiv:2405.01273  [pdf, other

    cs.CV cs.AI

    Towards Inclusive Face Recognition Through Synthetic Ethnicity Alteration

    Authors: Praveen Kumar Chandaliya, Kiran Raja, Raghavendra Ramachandra, Zahid Akhtar, Christoph Busch

    Abstract: Numerous studies have shown that existing Face Recognition Systems (FRS), including commercial ones, often exhibit biases toward certain ethnicities due to under-represented data. In this work, we explore ethnicity alteration and skin tone modification using synthetic face image generation methods to increase the diversity of datasets. We conduct a detailed analysis by first constructing a balance… ▽ More

    Submitted 6 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: 8 Pages

    Journal ref: Automatic Face and Gesture Recognition 2024

  23. arXiv:2404.15765  [pdf, other

    cs.CV

    3D Face Morphing Attack Generation using Non-Rigid Registration

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face Recognition Systems (FRS) are widely used in commercial environments, such as e-commerce and e-banking, owing to their high accuracy in real-world conditions. However, these systems are vulnerable to facial morphing attacks, which are generated by blending face color images of different subjects. This paper presents a new method for generating 3D face morphs from two bona fide point clouds. T… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: Accepted to 2024 18th International Conference on Automatic Face and Gesture Recognition (FG) as short paper

  24. arXiv:2404.12680  [pdf, other

    cs.CV cs.CR

    VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection

    Authors: Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, R. S. Gad

    Abstract: Facial biometrics are an essential components of smartphones to ensure reliable and trustworthy authentication. However, face biometric systems are vulnerable to Presentation Attacks (PAs), and the availability of more sophisticated presentation attack instruments such as 3D silicone face masks will allow attackers to deceive face recognition systems easily. In this work, we propose a novel Presen… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Accepted in 2024 18th International Conference on Automatic Face and Gesture Recognition (FG)

  25. arXiv:2404.12679  [pdf, other

    cs.CV cs.CR

    MLSD-GAN -- Generating Strong High Quality Face Morphing Attacks using Latent Semantic Disentanglement

    Authors: Aravinda Reddy PN, Raghavendra Ramachandra, Krothapalli Sreenivasa Rao, Pabitra Mitra

    Abstract: Face-morphing attacks are a growing concern for biometric researchers, as they can be used to fool face recognition systems (FRS). These attacks can be generated at the image level (supervised) or representation level (unsupervised). Previous unsupervised morphing attacks have relied on generative adversarial networks (GANs). More recently, researchers have used linear interpolation of StyleGAN-en… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  26. arXiv:2404.09790  [pdf, other

    cs.CV

    NTIRE 2024 Challenge on Image Super-Resolution ($\times$4): Methods and Results

    Authors: Zheng Chen, Zongwei Wu, Eduard Zamfir, Kai Zhang, Yulun Zhang, Radu Timofte, Xiaokang Yang, Hongyuan Yu, Cheng Wan, Yuxin Hong, Zhijuan Huang, Yajun Zou, Yuan Huang, Jiamin Lin, Bingnan Han, Xianyu Guan, Yongsheng Yu, Daoan Zhang, Xuanwu Yin, Kunlong Zuo, Jinhua Hao, Kai Zhao, Kun Yuan, Ming Sun, Chao Zhou , et al. (63 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2024 challenge on image super-resolution ($\times$4), highlighting the solutions proposed and the outcomes obtained. The challenge involves generating corresponding high-resolution (HR) images, magnified by a factor of four, from low-resolution (LR) inputs using prior information. The LR images originate from bicubic downsampling degradation. The aim of the challenge i… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: NTIRE 2024 webpage: https://cvlai.net/ntire/2024. Code: https://github.com/zhengchen1999/NTIRE2024_ImageSR_x4

  27. arXiv:2403.16202  [pdf, other

    cs.CV

    FH-SSTNet: Forehead Creases based User Verification using Spatio-Spatial Temporal Network

    Authors: Geetanjali Sharma, Gaurav Jaswal, Aditya Nigam, Raghavendra Ramachandra

    Abstract: Biometric authentication, which utilizes contactless features, such as forehead patterns, has become increasingly important for identity verification and access management. The proposed method is based on learning a 3D spatio-spatial temporal convolution to create detailed pictures of forehead patterns. We introduce a new CNN model called the Forehead Spatio-Spatial Temporal Network (FH-SSTNet), w… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

    Comments: 6 pages, 5 Figure, IWBF conference

  28. A parametricity-based formalization of semi-simplicial and semi-cubical sets

    Authors: Hugo Herbelin, Ramkumar Ramachandra

    Abstract: Semi-simplicial and semi-cubical sets are commonly defined as presheaves over respectively, the semi-simplex or semi-cube category. Homotopy Type Theory then popularized an alternative definition, where the set of n-simplices or n-cubes are instead regrouped into the families of the fibers over their faces, leading to a characterization we call indexed. Moreover, it is known that semi-simplicial a… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

    Comments: Associated formalization in Coq at https://github.com/artagnon/bonak

    ACM Class: F.4.1

    Journal ref: Math. Struct. Comp. Sci. 35 (2025) e13

  29. arXiv:2311.11566  [pdf, other

    cs.CV

    Does complimentary information from multispectral imaging improve face presentation attack detection?

    Authors: Narayan Vetrekar, Raghavendra Ramachandra, Sushma Venkatesh, Jyoti D. Pawar, R. S. Gad

    Abstract: Presentation Attack Detection (PAD) has been extensively studied, particularly in the visible spectrum. With the advancement of sensing technology beyond the visible range, multispectral imaging has gained significant attention in this direction. We present PAD based on multispectral images constructed for eight different presentation artifacts resulted from three different artifact species. In th… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: Accepted in International IEEE Applied Sensing Conference (IEEE APSCON) 2024

  30. arXiv:2311.05336  [pdf, other

    cs.CV

    SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data

    Authors: Meiling Fang, Marco Huber, Julian Fierrez, Raghavendra Ramachandra, Naser Damer, Alhasan Alkhaddour, Maksim Kasantcev, Vasiliy Pryadchenko, Ziyuan Yang, Huijie Huangfu, Yingyu Chen, Yi Zhang, Yuchen Pan, Junjun Jiang, Xianming Liu, Xianyun Sun, Caiyong Wang, Xingyu Liu, Zhaohua Chang, Guangzhe Zhao, Juan Tapia, Lazaro Gonzalez-Soler, Carlos Aravena, Daniel Schulz

    Abstract: This paper presents a summary of the Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data (SynFacePAD 2023) held at the 2023 International Joint Conference on Biometrics (IJCB 2023). The competition attracted a total of 8 participating teams with valid submissions from academia and industry. The competition aimed to motivate and attract solutions that ta… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: Accepted at IJCB2 023

  31. arXiv:2310.16808  [pdf, other

    cs.CV

    Fingervein Verification using Convolutional Multi-Head Attention Network

    Authors: Raghavendra Ramachandra, Sushma Venkatesh

    Abstract: Biometric verification systems are deployed in various security-based access-control applications that require user-friendly and reliable person verification. Among the different biometric characteristics, fingervein biometrics have been extensively studied owing to their reliable verification performance. Furthermore, fingervein patterns reside inside the skin and are not visible outside; therefo… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: Accepted in IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2024

  32. arXiv:2310.12736  [pdf, other

    cs.CV

    ExtSwap: Leveraging Extended Latent Mapper for Generating High Quality Face Swapping

    Authors: Aravinda Reddy PN, K. Sreenivasa Rao, Raghavendra Ramachandra, Pabitra mitra

    Abstract: We present a novel face swapping method using the progressively growing structure of a pre-trained StyleGAN. Previous methods use different encoder decoder structures, embedding integration networks to produce high-quality results, but their quality suffers from entangled representation. We disentangle semantics by deriving identity and attribute features separately. By learning to map the concate… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

  33. arXiv:2309.13704  [pdf, other

    cs.CV

    Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes

    Authors: Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh

    Abstract: Facial biometrics are widely deployed in smartphone-based applications because of their usability and increased verification accuracy in unconstrained scenarios. The evolving applications of smartphone-based facial recognition have also increased Presentation Attacks (PAs), where an attacker can present a Presentation Attack Instrument (PAI) to maliciously gain access to the application. Because t… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: Accepted in IJCB 2023

  34. arXiv:2307.01845  [pdf, other

    cs.CV

    Deep Features for Contactless Fingerprint Presentation Attack Detection: Can They Be Generalized?

    Authors: Hailin Li, Raghavendra Ramachandra

    Abstract: The rapid evolution of high-end smartphones with advanced high-resolution cameras has resulted in contactless capture of fingerprint biometrics that are more reliable and suitable for verification. Similar to other biometric systems, contactless fingerprint-verification systems are vulnerable to presentation attacks. In this paper, we present a comparative study on the generalizability of seven di… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Comments: Preprint paper accepted by First Workshop on Contactless Hand Biometrics and Gesture Recognition (CHBGR-2023)

  35. arXiv:2305.17522  [pdf, other

    cs.CV

    Deep Learning based Fingerprint Presentation Attack Detection: A Comprehensive Survey

    Authors: Hailin Li, Raghavendra Ramachandra

    Abstract: The vulnerabilities of fingerprint authentication systems have raised security concerns when adapting them to highly secure access-control applications. Therefore, Fingerprint Presentation Attack Detection (FPAD) methods are essential for ensuring reliable fingerprint authentication. Owing to the lack of generation capacity of traditional handcrafted based approaches, deep learning-based FPAD has… ▽ More

    Submitted 27 May, 2023; originally announced May 2023.

    Comments: 29 pages, submitted to ACM computing survey journal

  36. arXiv:2305.03264  [pdf, other

    cs.CV

    Robust Face Morphing Attack Detection Using Fusion of Multiple Features and Classification Techniques

    Authors: Jag Mohan Singh Sushma Venkatesh Raghavendra Ramachandra

    Abstract: Face Recognition System (FRS) are shown to be vulnerable to morphed images of newborns. Detecting morphing attacks stemming from face images of newborn is important to avoid unwanted consequences, both for security and society. In this paper, we present a new reference-based/Differential Morphing Attack Detection (MAD) method to detect newborn morphing images using Wavelet Scattering Network (WSN)… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: 26TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION 2023

  37. arXiv:2305.01294  [pdf, other

    cs.CV

    Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Guoqiang Li, Kiran Raja

    Abstract: Face Recognition System (FRS) are shown to be vulnerable to morphed images of newborns. Detecting morphing attacks stemming from face images of newborn is important to avoid unwanted consequences, both for security and society. In this paper, we present a new reference-based/Differential Morphing Attack Detection (MAD) method to detect newborn morphing images using Wavelet Scattering Network (WSN)… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

    Comments: accepted in 5th International Conference on Bio-engineering for Smart Technologies (BIO-SMART 2023)

  38. arXiv:2304.03510  [pdf, other

    cs.CV

    Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Naser Damer, Narayan Vetrekar, Rajendra Gad

    Abstract: Face morphing attack detection is emerging as an increasingly challenging problem owing to advancements in high-quality and realistic morphing attack generation. Reliable detection of morphing attacks is essential because these attacks are targeted for border control applications. This paper presents a multispectral framework for differential morphing-attack detection (D-MAD). The D-MAD methods ar… ▽ More

    Submitted 25 October, 2023; v1 submitted 7 April, 2023; originally announced April 2023.

    Comments: Accepted in IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2024

  39. arXiv:2304.00979  [pdf, other

    cs.CV

    A Latent Fingerprint in the Wild Database

    Authors: Xinwei Liu, Kiran Raja, Renfang Wang, Hong Qiu, Hucheng Wu, Dechao Sun, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra, Christoph Busch

    Abstract: Latent fingerprints are among the most important and widely used evidence in crime scenes, digital forensics and law enforcement worldwide. Despite the number of advancements reported in recent works, we note that significant open issues such as independent benchmarking and lack of large-scale evaluation databases for improving the algorithms are inadequately addressed. The available databases are… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security (under review)

  40. arXiv:2303.14004  [pdf, other

    cs.CV

    Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins

    Authors: Raghavendra Ramachandra, Sushma Venkatesh, Gaurav Jaswal, Guoqiang Li

    Abstract: Face morphing attacks have emerged as a potential threat, particularly in automatic border control scenarios. Morphing attacks permit more than one individual to use travel documents that can be used to cross borders using automatic border control gates. The potential for morphing attacks depends on the selection of data subjects (accomplice and malicious actors). This work investigates lookalike… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

    Comments: Accepted in IWBF 2023

  41. arXiv:2302.03954  [pdf

    cs.RO

    Temporal Video-Language Alignment Network for Reward Shaping in Reinforcement Learning

    Authors: Ziyuan Cao, Reshma Anugundanahalli Ramachandra, Kelin Yu

    Abstract: Designing appropriate reward functions for Reinforcement Learning (RL) approaches has been a significant problem, especially for complex environments such as Atari games. Utilizing natural language instructions to provide intermediate rewards to RL agents in a process known as reward shaping can help the agent in reaching the goal state faster. In this work, we propose a natural language-based rew… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

  42. arXiv:2212.14143  [pdf, other

    cs.CV

    Multimodal Wildland Fire Smoke Detection

    Authors: Siddhant Baldota, Shreyas Anantha Ramaprasad, Jaspreet Kaur Bhamra, Shane Luna, Ravi Ramachandra, Eugene Zen, Harrison Kim, Daniel Crawl, Ismael Perez, Ilkay Altintas, Garrison W. Cottrell, Mai H. Nguyen

    Abstract: Research has shown that climate change creates warmer temperatures and drier conditions, leading to longer wildfire seasons and increased wildfire risks in the United States. These factors have in turn led to increases in the frequency, extent, and severity of wildfires in recent years. Given the danger posed by wildland fires to people, property, wildlife, and the environment, there is an urgency… ▽ More

    Submitted 28 December, 2022; originally announced December 2022.

  43. arXiv:2212.05884  [pdf, other

    cs.CV cs.CR

    Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network

    Authors: Raghavendra Ramachandra, Hailin Li

    Abstract: Fingerphoto images captured using a smartphone are successfully used to verify the individuals that have enabled several applications. This work presents a novel algorithm for fingerphoto verification using a nested residual block: Finger-NestNet. The proposed Finger-NestNet architecture is designed with three consecutive convolution blocks followed by a series of nested residual blocks to achieve… ▽ More

    Submitted 9 December, 2022; originally announced December 2022.

    Comments: a preprint paper accepted in wacv2023 workshop

  44. arXiv:2211.12180  [pdf, other

    eess.IV cs.CV

    SRTGAN: Triplet Loss based Generative Adversarial Network for Real-World Super-Resolution

    Authors: Dhruv Patel, Abhinav Jain, Simran Bawkar, Manav Khorasiya, Kalpesh Prajapati, Kishor Upla, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Many applications such as forensics, surveillance, satellite imaging, medical imaging, etc., demand High-Resolution (HR) images. However, obtaining an HR image is not always possible due to the limitations of optical sensors and their costs. An alternative solution called Single Image Super-Resolution (SISR) is a software-driven approach that aims to take a Low-Resolution (LR) image and obtain the… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

    Comments: Affiliated with the Sardar Vallabhbhai National Institute of Technology (SVNIT), India and Norwegian University of Science and Technology (NTNU), Norway. Presented at the 7th International Conference on Computer Vision and Image Processing (CVIP) 2022

  45. arXiv:2211.11039  [pdf, other

    cs.CV

    Deep Composite Face Image Attacks: Generation, Vulnerability and Detection

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks (CFIA) based on facial attributes using Generative Adversarial Networks (GANs). Given the face images corresponding to two unique data subjects, the proposed CFIA method will indepen… ▽ More

    Submitted 20 March, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

    Comments: The submitted paper is accepted in IEEE Access 2023

  46. arXiv:2209.15474  [pdf, other

    cs.CV

    Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face Recognition Systems (FRS) are vulnerable to various attacks performed directly and indirectly. Among these attacks, face morphing attacks are highly potential in deceiving automatic FRS and human observers and indicate a severe security threat, especially in the border control scenario. This work presents a face morphing attack detection, especially in the On-The-Fly (OTF) Automatic Border Co… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

    Comments: The paper is accepted at the International Joint Conference on Biometrics (IJCB) 2022

  47. arXiv:2209.12208  [pdf, other

    cs.CV

    A Uniform Representation Learning Method for OCT-based Fingerprint Presentation Attack Detection and Reconstruction

    Authors: Wentian Zhang, Haozhe Liu, Feng Liu, Raghavendra Ramachandra

    Abstract: The technology of optical coherence tomography (OCT) to fingerprint imaging opens up a new research potential for fingerprint recognition owing to its ability to capture depth information of the skin layers. Developing robust and high security Automated Fingerprint Recognition Systems (AFRSs) are possible if the depth information can be fully utilized. However, in existing studies, Presentation At… ▽ More

    Submitted 25 September, 2022; originally announced September 2022.

    Comments: 13 pages, 8 figures

  48. arXiv:2208.08207  [pdf, other

    cs.CV cs.AI

    Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data

    Authors: Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

    Abstract: The vast progress in synthetic image synthesis enables the generation of facial images in high resolution and photorealism. In biometric applications, the main motivation for using synthetic data is to solve the shortage of publicly-available biometric data while reducing privacy risks when processing such sensitive information. These advantages are exploited in this work by simulating human face… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

  49. arXiv:2208.07337  [pdf, other

    cs.CV

    SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data

    Authors: Marco Huber, Fadi Boutros, Anh Thi Luu, Kiran Raja, Raghavendra Ramachandra, Naser Damer, Pedro C. Neto, Tiago Gonçalves, Ana F. Sequeira, Jaime S. Cardoso, João Tremoço, Miguel Lourenço, Sergio Serra, Eduardo Cermeño, Marija Ivanovska, Borut Batagelj, Andrej Kronovšek, Peter Peer, Vitomir Štruc

    Abstract: This paper presents a summary of the Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 International Joint Conference on Biometrics (IJCB 2022). The competition attracted a total of 12 participating teams, both from academia and industry and present in 11 different countries. In the end, seven valid submissions were submitted by… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: Accepted at International Joint Conference on Biometrics (IJCB) 2022

  50. arXiv:2207.00506  [pdf, other

    cs.CV cs.CG

    How Far Can I Go ? : A Self-Supervised Approach for Deterministic Video Depth Forecasting

    Authors: Sauradip Nag, Nisarg Shah, Anran Qi, Raghavendra Ramachandra

    Abstract: In this paper we present a novel self-supervised method to anticipate the depth estimate for a future, unobserved real-world urban scene. This work is the first to explore self-supervised learning for estimation of monocular depth of future unobserved frames of a video. Existing works rely on a large number of annotated samples to generate the probabilistic prediction of depth for unseen frames. H… ▽ More

    Submitted 8 July, 2022; v1 submitted 1 July, 2022; originally announced July 2022.

    Comments: Accepted in ML4AD Workshop, NeurIPS 2021