Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Detecting Face Morphing Attacks with Collaborative Representation of Steerable Features

    have used face characteristics to verify and establish the identity of an individual. Face images provide high accuracy in verification and also present the opportunity of verifying the identity visua...

    Raghavendra Ramachandra, Sushma Venkatesh in Proceedings of 3rd International Conferenc… (2020)

  2. Chapter

    Adversarial Attacks on Face Recognition Systems

    Face  has been widely used for identity verification both in supervised and unsupervised access control applications. The advancement in deep neural networks has opened up the possibility of scaling it to m...

    Ying Xu, Kiran Raja, Raghavendra Ramachandra in Handbook of Digital Face Manipulation and … (2022)

  3. No Access

    Chapter

    Smartphone Multi-modal Biometric Presentation Attack Detection

    Biometric verification is widely employed on smartphones for various applications, including financial transactions. In this work, we present a new multi-modal biometric dataset (face, voice, and periocular) a...

    Martin Stokkenes, Raghavendra Ramachandra in Handbook of Biometric Anti-Spoofing (2023)

  4. No Access

    Chapter

    Vision Transformers for Fingerprint Presentation Attack Detection

    Automated fingerprint recognition systems, while widely used, are still vulnerable to presentation attacks (PAs). The attacks can employ a wide range of presentation attack species (i.e., artifacts), varying f...

    Kiran Raja, Raghavendra Ramachandra in Handbook of Biometric Anti-Spoofing (2023)