Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Channel Attention Network for Wireless Capsule Endoscopy Image Super-Resolution

    Wireless Capsule Endoscopy (WCE) is a technology used for examination of Gastrointestinal (GI) tract. WCE is comparatively pain-free process to examine the parts of GI tract including internal walls of small i...

    Anjali Sarvaiya, Hiren Vaghela, Kishor Upla in Computer Vision and Image Processing (2024)

  2. No Access

    Chapter and Conference Paper

    COMPUSR: Computationally Efficient Unsupervised Super-Resolution Approach for Wireless Capsule Endoscopy

    Wireless Capsule Endoscopy (WCE) is an imaging technology for diseases related to Gastrointestinal (GI) track. However, due to limited hardware, the spatial resolution of acquired images is usually coarser lea...

    Nirban Saha, Anjali Sarvaiya, Kishor Upla in Computer Vision and Image Processing (2024)

  3. No Access

    Chapter and Conference Paper

    MuSTAT: Face Ageing Using Multi-scale Target Age Style Transfer

    Most existing bottleneck-based Generative Adversarial Networks suffer from ghosting artifacts or blur for generating ageing results with an increased age gap. Although this can be solved using data collected o...

    Praveen Kumar Chandaliya, Kiran Raja in Computer Vision and Image Processing (2024)

  4. No Access

    Chapter

    Smartphone Multi-modal Biometric Presentation Attack Detection

    Biometric verification is widely employed on smartphones for various applications, including financial transactions. In this work, we present a new multi-modal biometric dataset (face, voice, and periocular) a...

    Martin Stokkenes, Raghavendra Ramachandra in Handbook of Biometric Anti-Spoofing (2023)

  5. No Access

    Chapter and Conference Paper

    SRTGAN: Triplet Loss Based Generative Adversarial Network for Real-World Super-Resolution

    Many applications such as forensics, surveillance, satellite imaging, medical imaging, etc., demand High-Resolution (HR) images. However, obtaining an HR image is not always possible due to the limitations of ...

    Dhruv Patel, Abhinav Jain, Simran Bawkar in Computer Vision and Image Processing (2023)

  6. No Access

    Chapter

    Vision Transformers for Fingerprint Presentation Attack Detection

    Automated fingerprint recognition systems, while widely used, are still vulnerable to presentation attacks (PAs). The attacks can employ a wide range of presentation attack species (i.e., artifacts), varying f...

    Kiran Raja, Raghavendra Ramachandra in Handbook of Biometric Anti-Spoofing (2023)

  7. No Access

    Article

    Compact and progressive network for enhanced single image super-resolution—ComPrESRNet

    The use of deep convolutional neural networks (CNNs) for single image super-resolution (SISR) in the recent years has led to numerous vision-based applications. Complementing the growing interest in the comput...

    Vishal Chudasama, Kishor Upla, Kiran Raja, Raghavendra Ramachandra in The Visual Computer (2022)

  8. Chapter

    Adversarial Attacks on Face Recognition Systems

    Face  has been widely used for identity verification both in supervised and unsupervised access control applications. The advancement in deep neural networks has opened up the possibility of scaling it to m...

    Ying Xu, Kiran Raja, Raghavendra Ramachandra in Handbook of Digital Face Manipulation and … (2022)

  9. No Access

    Living Reference Work Entry In depth

    Periocular Biometrics

    Kiran Raja, Raghavendra Ramachandra in Encyclopedia of Cryptography, Security and…

  10. No Access

    Chapter and Conference Paper

    Unsupervised Single Image Super-Resolution Using Cycle Generative Adversarial Network

    The current state-of-the-art deep learning based Single Image Super-Resolution (SISR) techniques employ supervised learning in the training process. In this learning, the Low-Resolution (LR) images are prepare...

    Kalpesh Prajapati, Vishal Chudasama in Intelligent Technologies and Applications (2021)

  11. No Access

    Chapter and Conference Paper

    ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation

    Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a ...

    Naser Damer, Kiran Raja, Marius Süßmilch, Sushma Venkatesh in Advances in Visual Computing (2021)

  12. No Access

    Chapter and Conference Paper

    Unsupervised Real-World Super-resolution Using Variational Auto-encoder and Generative Adversarial Network

    Convolutional Neural Networks (CNNs) have shown promising results on Single Image Super-Resolution (SISR) task. A pair of Low-Resolution (LR) and High-Resolution (HR) images are typically used in the CNN model...

    Kalpesh Prajapati, Vishal Chudasama in Pattern Recognition. ICPR International Wo… (2021)

  13. No Access

    Chapter and Conference Paper

    Face Presentation Attack Detection Using Multi-classifier Fusion of Off-the-Shelf Deep Features

    Face recognition systems are vulnerable to the presentation (or spoof or direct) attacks that can be carried out by presenting the face artefact corresponding to the legitimate user. Thus, it is essential to d...

    Raghavendra Ramachandra, Jag Mohan Singh in Computer Vision and Image Processing (2020)

  14. Chapter and Conference Paper

    Collaborative Representation of Statistically Independent Filters’ Response: An Application to Face Recognition Under Illicit Drug Abuse Alterations

    Face biometrics is widely deployed in many security and surveillance applications that demand a secure and reliable authentication service. The performance of face recognition systems is primarily based on the...

    Raghavendra Ramachandra, Kiran Raja, Sushma Venkatesh, Christoph Busch in Image Analysis (2017)