![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Channel Attention Network for Wireless Capsule Endoscopy Image Super-Resolution
Wireless Capsule Endoscopy (WCE) is a technology used for examination of Gastrointestinal (GI) tract. WCE is comparatively pain-free process to examine the parts of GI tract including internal walls of small i...
-
Chapter and Conference Paper
COMPUSR: Computationally Efficient Unsupervised Super-Resolution Approach for Wireless Capsule Endoscopy
Wireless Capsule Endoscopy (WCE) is an imaging technology for diseases related to Gastrointestinal (GI) track. However, due to limited hardware, the spatial resolution of acquired images is usually coarser lea...
-
Chapter and Conference Paper
MuSTAT: Face Ageing Using Multi-scale Target Age Style Transfer
Most existing bottleneck-based Generative Adversarial Networks suffer from ghosting artifacts or blur for generating ageing results with an increased age gap. Although this can be solved using data collected o...
-
Chapter
Smartphone Multi-modal Biometric Presentation Attack Detection
Biometric verification is widely employed on smartphones for various applications, including financial transactions. In this work, we present a new multi-modal biometric dataset (face, voice, and periocular) a...
-
Chapter and Conference Paper
SRTGAN: Triplet Loss Based Generative Adversarial Network for Real-World Super-Resolution
Many applications such as forensics, surveillance, satellite imaging, medical imaging, etc., demand High-Resolution (HR) images. However, obtaining an HR image is not always possible due to the limitations of ...
-
Chapter
Vision Transformers for Fingerprint Presentation Attack Detection
Automated fingerprint recognition systems, while widely used, are still vulnerable to presentation attacks (PAs). The attacks can employ a wide range of presentation attack species (i.e., artifacts), varying f...
-
Article
Compact and progressive network for enhanced single image super-resolution—ComPrESRNet
The use of deep convolutional neural networks (CNNs) for single image super-resolution (SISR) in the recent years has led to numerous vision-based applications. Complementing the growing interest in the comput...
-
Chapter
Adversarial Attacks on Face Recognition Systems
Face has been widely used for identity verification both in supervised and unsupervised access control applications. The advancement in deep neural networks has opened up the possibility of scaling it to m...
-
Living Reference Work Entry In depth
Periocular Biometrics
-
Chapter and Conference Paper
Unsupervised Single Image Super-Resolution Using Cycle Generative Adversarial Network
The current state-of-the-art deep learning based Single Image Super-Resolution (SISR) techniques employ supervised learning in the training process. In this learning, the Low-Resolution (LR) images are prepare...
-
Chapter and Conference Paper
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a ...
-
Chapter and Conference Paper
Unsupervised Real-World Super-resolution Using Variational Auto-encoder and Generative Adversarial Network
Convolutional Neural Networks (CNNs) have shown promising results on Single Image Super-Resolution (SISR) task. A pair of Low-Resolution (LR) and High-Resolution (HR) images are typically used in the CNN model...
-
Chapter and Conference Paper
Face Presentation Attack Detection Using Multi-classifier Fusion of Off-the-Shelf Deep Features
Face recognition systems are vulnerable to the presentation (or spoof or direct) attacks that can be carried out by presenting the face artefact corresponding to the legitimate user. Thus, it is essential to d...
-
Chapter and Conference Paper
Collaborative Representation of Statistically Independent Filters’ Response: An Application to Face Recognition Under Illicit Drug Abuse Alterations
Face biometrics is widely deployed in many security and surveillance applications that demand a secure and reliable authentication service. The performance of face recognition systems is primarily based on the...