Skip to main content

Showing 1–9 of 9 results for author: Busch, C

Searching in archive eess. Search in all archives.
.
  1. arXiv:2404.17810  [pdf, other

    eess.AS cs.SD

    A Comparison of Differential Performance Metrics for the Evaluation of Automatic Speaker Verification Fairness

    Authors: Oubaida Chouchane, Christoph Busch, Chiara Galdi, Nicholas Evans, Massimiliano Todisco

    Abstract: When decisions are made and when personal data is treated by automated processes, there is an expectation of fairness -- that members of different demographic groups receive equitable treatment. This expectation applies to biometric systems such as automatic speaker verification (ASV). We present a comparison of three candidate fairness metrics and extend previous work performed for face recogniti… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

    Comments: 8 pages, 7 figures

  2. arXiv:2211.12180  [pdf, other

    eess.IV cs.CV

    SRTGAN: Triplet Loss based Generative Adversarial Network for Real-World Super-Resolution

    Authors: Dhruv Patel, Abhinav Jain, Simran Bawkar, Manav Khorasiya, Kalpesh Prajapati, Kishor Upla, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Many applications such as forensics, surveillance, satellite imaging, medical imaging, etc., demand High-Resolution (HR) images. However, obtaining an HR image is not always possible due to the limitations of optical sensors and their costs. An alternative solution called Single Image Super-Resolution (SISR) is a software-driven approach that aims to take a Low-Resolution (LR) image and obtain the… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

    Comments: Affiliated with the Sardar Vallabhbhai National Institute of Technology (SVNIT), India and Norwegian University of Science and Technology (NTNU), Norway. Presented at the 7th International Conference on Computer Vision and Image Processing (CVIP) 2022

  3. arXiv:2105.07809  [pdf, other

    eess.IV cs.CV cs.LG

    Learned Smartphone ISP on Mobile NPUs with Deep Learning, Mobile AI 2021 Challenge: Report

    Authors: Andrey Ignatov, Cheng-Ming Chiang, Hsien-Kai Kuo, Anastasia Sycheva, Radu Timofte, Min-Hung Chen, Man-Yu Lee, Yu-Syuan Xu, Yu Tseng, Shusong Xu, Jin Guo, Chao-Hung Chen, Ming-Chun Hsyu, Wen-Chia Tsai, Chao-Wei Chen, Grigory Malivenko, Minsu Kwon, Myungje Lee, Jaeyoon Yoo, Changbeom Kang, Shinjo Wang, Zheng Shaolong, Hao Dejun, Xie Fen, Feng Zhuang , et al. (16 additional authors not shown)

    Abstract: As the quality of mobile cameras starts to play a crucial role in modern smartphones, more and more attention is now being paid to ISP algorithms used to improve various perceptual aspects of mobile photos. In this Mobile AI challenge, the target was to develop an end-to-end deep learning-based image signal processing (ISP) pipeline that can replace classical hand-crafted ISPs and achieve nearly r… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: Mobile AI 2021 Workshop and Challenges: https://ai-benchmark.com/workshops/mai/2021/

  4. arXiv:2102.08449  [pdf, other

    cs.CV eess.IV

    Selfie Periocular Verification using an Efficient Super-Resolution Approach

    Authors: Juan Tapia, Andres Valenzuela, Rodrigo Lara, Marta Gomez-Barrero, Christoph Busch

    Abstract: Selfie-based biometrics has great potential for a wide range of applications since, e.g. periocular verification is contactless and is safe to use in pandemics such as COVID-19, when a major portion of a face is covered by a facial mask. Despite its advantages, selfie-based biometrics presents challenges since there is limited control over data acquisition at different distances. Therefore, Super-… ▽ More

    Submitted 18 March, 2022; v1 submitted 16 February, 2021; originally announced February 2021.

  5. arXiv:2010.04038  [pdf, ps, other

    cs.SD cs.CV cs.LG eess.AS

    Texture-based Presentation Attack Detection for Automatic Speaker Verification

    Authors: Lazaro J. Gonzalez-Soler, Jose Patino, Marta Gomez-Barrero, Massimiliano Todisco, Christoph Busch, Nicholas Evans

    Abstract: Biometric systems are nowadays employed across a broad range of applications. They provide high security and efficiency and, in many cases, are user friendly. Despite these and other advantages, biometric systems in general and Automatic speaker verification (ASV) systems in particular can be vulnerable to attack presentations. The most recent ASVSpoof 2019 competition showed that most forms of at… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

  6. arXiv:2007.03621  [pdf, other

    cs.CV cs.CR eess.IV

    Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? -- Vulnerability and Detection

    Authors: Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Naser Damer, Christoph Busch

    Abstract: The primary objective of face morphing is to combine face images of different data subjects (e.g. a malicious actor and an accomplice) to generate a face image that can be equally verified for both contributing data subjects. In this paper, we propose a new framework for generating face morphs using a newer Generative Adversarial Network (GAN) - StyleGAN. In contrast to earlier works, we generate… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: Accepted in IWBF 2020

  7. arXiv:2007.02684  [pdf, other

    cs.CV cs.CY eess.IV

    On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection

    Authors: Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Face morphing attacks have raised critical concerns as they demonstrate a new vulnerability of Face Recognition Systems (FRS), which are widely deployed in border control applications. The face morphing process uses the images from multiple data subjects and performs an image blending operation to generate a morphed image of high quality. The generated morphed image exhibits similar visual charact… ▽ More

    Submitted 19 September, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: Accepted in IJCB 2020

  8. arXiv:1912.01408  [pdf, other

    cs.CV eess.IV

    Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition

    Authors: Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Despite the high biometric performance, finger-vein recognition systems are vulnerable to presentation attacks (aka., spoofing attacks). In this paper, we present a new and robust approach for detecting presentation attacks on finger-vein biometric systems exploiting the 3D Shape (normal-map) and material properties (diffuse-map) of the finger. Observing the normal-map and diffuse-map exhibiting e… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: This work was accepted in The 15th International Conference on SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS, 2019

    MSC Class: I.5.4; I.4.9; I.2.10 ACM Class: I.5.4; I.4.9; I.2.10

  9. arXiv:1803.03559  [pdf, ps, other

    cs.CR cs.SD eess.AS

    Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

    Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch

    Abstract: Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application. Ensuring unlinkability across biometric service operators, irreversibility of leaked encrypted templates, and renewability of e.g., voice models following the i-vector paradigm,… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

    Journal ref: Proc. Odyssey 2018: The Speaker and Language Recognition Workshop