-
Article
Open AccessUbiquitous multi-occupant detection in smart environments
Recent advancements in ubiquitous computing have emphasized the need for privacy-preserving occupancy detection in smart environments to enhance security. This work presents a novel occupancy detection solutio...
-
Chapter
Intra and Cross-spectrum Iris Presentation Attack Detection in the NIR and Visible Domains
Iris Presentation Attack Detection (PAD) is essential to secure iris recognition systems. Recent iris PAD solutions achieved good performance by leveraging deep learning techniques. However, most results were ...
-
Article
Open AccessThe overlap** effect and fusion protocols of data augmentation techniques in iris PAD
Iris Presentation Attack Detection (PAD) algorithms address the vulnerability of iris recognition systems to presentation attacks. With the great success of deep learning methods in various computer vision fie...
-
Chapter and Conference Paper
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a ...
-
Chapter and Conference Paper
PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection
A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based on identity verification, such as border checks. Various methods have been propo...
-
Chapter and Conference Paper
Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts
Face morphing attacks create face images that are verifiable to multiple identities. Associating such images to identity documents lead to building faulty identity links, causing attacks on operations like bor...