Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Comparative Analysis of Stress Prediction Using Unsupervised Machine Learning Algorithms

    Stress has become prevalent in today’s fast-paced lives, leading to numerous physical and mental health issues. Thus, its detection and intervention at the preliminary stage are crucial to protect a person fro...

    Istuti Maurya, Anjali Sarvaiya, Kishor Upla in Computer Vision and Image Processing (2024)

  2. No Access

    Chapter and Conference Paper

    ExtSwap: Leveraging Extended Latent Mapper for Generating High Quality Face Swap**

    We present a novel face swap** method using the progressively growing structure of a pre-trained StyleGAN. Previous methods use different encoder-decoder structures, embedding integration networks to produce...

    P. N. Aravinda Reddy, K. Sreenivasa Rao in Computer Vision and Image Processing (2024)

  3. No Access

    Chapter and Conference Paper

    MuSTAT: Face Ageing Using Multi-scale Target Age Style Transfer

    Most existing bottleneck-based Generative Adversarial Networks suffer from ghosting artifacts or blur for generating ageing results with an increased age gap. Although this can be solved using data collected o...

    Praveen Kumar Chandaliya, Kiran Raja in Computer Vision and Image Processing (2024)

  4. No Access

    Chapter and Conference Paper

    Face Presentation Attack Detection Using Remote Photoplethysmography Transformer Model

    Face Presentation Attack Detection (PAD) is essential for face recognition systems to achieve reliable verification in secured authentication applications. The face Presentation Attack Instruments include the ...

    Haoyu Zhang, Raghavendra Ramachandra in Computer Vision and Image Processing (2023)

  5. No Access

    Chapter

    Smartphone Multi-modal Biometric Presentation Attack Detection

    Biometric verification is widely employed on smartphones for various applications, including financial transactions. In this work, we present a new multi-modal biometric dataset (face, voice, and periocular) a...

    Martin Stokkenes, Raghavendra Ramachandra in Handbook of Biometric Anti-Spoofing (2023)

  6. No Access

    Chapter and Conference Paper

    SRTGAN: Triplet Loss Based Generative Adversarial Network for Real-World Super-Resolution

    Many applications such as forensics, surveillance, satellite imaging, medical imaging, etc., demand High-Resolution (HR) images. However, obtaining an HR image is not always possible due to the limitations of ...

    Dhruv Patel, Abhinav Jain, Simran Bawkar in Computer Vision and Image Processing (2023)

  7. No Access

    Chapter

    Vision Transformers for Fingerprint Presentation Attack Detection

    Automated fingerprint recognition systems, while widely used, are still vulnerable to presentation attacks (PAs). The attacks can employ a wide range of presentation attack species (i.e., artifacts), varying f...

    Kiran Raja, Raghavendra Ramachandra in Handbook of Biometric Anti-Spoofing (2023)

  8. No Access

    Chapter and Conference Paper

    Gaussian Kernels Based Network for Multiple License Plate Number Detection in Day-Night Images

    Detecting multiple license plate numbers is crucial for vehicle tracking and re-identification. The reliable detection of multiple license plate numbers requires addressing the challenges like image defocusing...

    Soumi Das, Palaiahnakote Shivakumara in Document Analysis and Recognition - ICDAR … (2023)

  9. No Access

    Article

    Compact and progressive network for enhanced single image super-resolution—ComPrESRNet

    The use of deep convolutional neural networks (CNNs) for single image super-resolution (SISR) in the recent years has led to numerous vision-based applications. Complementing the growing interest in the comput...

    Vishal Chudasama, Kishor Upla, Kiran Raja, Raghavendra Ramachandra in The Visual Computer (2022)

  10. No Access

    Chapter and Conference Paper

    Effective Presentation Attack Detection Driven by Face Related Task

    The robustness and generalization ability of Presentation Attack Detection (PAD) methods is critical to ensure the security of Face Recognition Systems (FRSs). However, in a real scenario, Presentation Attacks...

    Wentian Zhang, Haozhe Liu, Feng Liu, Raghavendra Ramachandra in Computer Vision – ECCV 2022 (2022)

  11. Chapter

    Adversarial Attacks on Face Recognition Systems

    Face  has been widely used for identity verification both in supervised and unsupervised access control applications. The advancement in deep neural networks has opened up the possibility of scaling it to m...

    Ying Xu, Kiran Raja, Raghavendra Ramachandra in Handbook of Digital Face Manipulation and … (2022)

  12. No Access

    Chapter and Conference Paper

    Cross-lingual Speaker Verification: Evaluation on X-Vector Method

    Automatic Speaker Verification (ASV) systems accuracy is based on the spoken language used in training and enrolling speakers. Language dependency makes voice-based security systems less robust and generalizab...

    Hareesh Mandalapu, Thomas Møller Elbo in Intelligent Technologies and Applications (2021)

  13. No Access

    Living Reference Work Entry In depth

    Periocular Biometrics

    Kiran Raja, Raghavendra Ramachandra in Encyclopedia of Cryptography, Security and…

  14. No Access

    Chapter and Conference Paper

    Unsupervised Single Image Super-Resolution Using Cycle Generative Adversarial Network

    The current state-of-the-art deep learning based Single Image Super-Resolution (SISR) techniques employ supervised learning in the training process. In this learning, the Low-Resolution (LR) images are prepare...

    Kalpesh Prajapati, Vishal Chudasama in Intelligent Technologies and Applications (2021)

  15. No Access

    Chapter and Conference Paper

    Multilingual Voice Impersonation Dataset and Evaluation

    Well-known vulnerabilities of voice-based biometrics are impersonation, replay attacks, artificial signals/speech synthesis, and voice conversion. Among these, voice impersonation is the obvious and simplest w...

    Hareesh Mandalapu, Raghavendra Ramachandra in Intelligent Technologies and Applications (2021)

  16. No Access

    Chapter and Conference Paper

    Hierarchical Interpolation of Imagenet Features for Cross-Dataset Presentation Attack Detection

    Face Recognition Systems (FRS) are vulnerable to spoofing attacks (a.k.a presentation attacks), which can be carried out by presenting a printed photo (print-photo), displaying a photo (display-photo), or disp...

    Jag Mohan Singh, Raghavendra Ramachandra in Intelligent Technologies and Applications (2021)

  17. No Access

    Chapter and Conference Paper

    Fusion of Texture and Optical Flow Using Convolutional Neural Networks for Gender Classification in Videos

    Automatic Gender Classification (AGC) is an essential problem due to its growing demand in commercial applications, including social media and security environments such as the airport. AGC is a well-researche...

    Jag Mohan Singh, Raghavendra Ramachandra in Intelligent Technologies and Applications (2021)

  18. No Access

    Chapter and Conference Paper

    A Survey on Unknown Presentation Attack Detection for Fingerprint

    Fingerprint recognition systems are widely deployed in various real-life applications as they have achieved high accuracy. The widely used applications include border control, automated teller machine (ATM), a...

    Jag Mohan Singh, Ahmed Madhun, Guoqiang Li in Intelligent Technologies and Applications (2021)

  19. No Access

    Chapter and Conference Paper

    ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation

    Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a ...

    Naser Damer, Kiran Raja, Marius Süßmilch, Sushma Venkatesh in Advances in Visual Computing (2021)

  20. No Access

    Chapter and Conference Paper

    Unsupervised Real-World Super-resolution Using Variational Auto-encoder and Generative Adversarial Network

    Convolutional Neural Networks (CNNs) have shown promising results on Single Image Super-Resolution (SISR) task. A pair of Low-Resolution (LR) and High-Resolution (HR) images are typically used in the CNN model...

    Kalpesh Prajapati, Vishal Chudasama in Pattern Recognition. ICPR International Wo… (2021)

previous disabled Page of 2