![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Comparative Analysis of Stress Prediction Using Unsupervised Machine Learning Algorithms
Stress has become prevalent in today’s fast-paced lives, leading to numerous physical and mental health issues. Thus, its detection and intervention at the preliminary stage are crucial to protect a person fro...
-
Chapter and Conference Paper
ExtSwap: Leveraging Extended Latent Mapper for Generating High Quality Face Swap**
We present a novel face swap** method using the progressively growing structure of a pre-trained StyleGAN. Previous methods use different encoder-decoder structures, embedding integration networks to produce...
-
Chapter and Conference Paper
MuSTAT: Face Ageing Using Multi-scale Target Age Style Transfer
Most existing bottleneck-based Generative Adversarial Networks suffer from ghosting artifacts or blur for generating ageing results with an increased age gap. Although this can be solved using data collected o...
-
Chapter and Conference Paper
Face Presentation Attack Detection Using Remote Photoplethysmography Transformer Model
Face Presentation Attack Detection (PAD) is essential for face recognition systems to achieve reliable verification in secured authentication applications. The face Presentation Attack Instruments include the ...
-
Chapter
Smartphone Multi-modal Biometric Presentation Attack Detection
Biometric verification is widely employed on smartphones for various applications, including financial transactions. In this work, we present a new multi-modal biometric dataset (face, voice, and periocular) a...
-
Chapter and Conference Paper
SRTGAN: Triplet Loss Based Generative Adversarial Network for Real-World Super-Resolution
Many applications such as forensics, surveillance, satellite imaging, medical imaging, etc., demand High-Resolution (HR) images. However, obtaining an HR image is not always possible due to the limitations of ...
-
Chapter
Vision Transformers for Fingerprint Presentation Attack Detection
Automated fingerprint recognition systems, while widely used, are still vulnerable to presentation attacks (PAs). The attacks can employ a wide range of presentation attack species (i.e., artifacts), varying f...
-
Chapter and Conference Paper
Gaussian Kernels Based Network for Multiple License Plate Number Detection in Day-Night Images
Detecting multiple license plate numbers is crucial for vehicle tracking and re-identification. The reliable detection of multiple license plate numbers requires addressing the challenges like image defocusing...
-
Article
Compact and progressive network for enhanced single image super-resolution—ComPrESRNet
The use of deep convolutional neural networks (CNNs) for single image super-resolution (SISR) in the recent years has led to numerous vision-based applications. Complementing the growing interest in the comput...
-
Chapter and Conference Paper
Effective Presentation Attack Detection Driven by Face Related Task
The robustness and generalization ability of Presentation Attack Detection (PAD) methods is critical to ensure the security of Face Recognition Systems (FRSs). However, in a real scenario, Presentation Attacks...
-
Chapter
Adversarial Attacks on Face Recognition Systems
Face has been widely used for identity verification both in supervised and unsupervised access control applications. The advancement in deep neural networks has opened up the possibility of scaling it to m...
-
Chapter and Conference Paper
Cross-lingual Speaker Verification: Evaluation on X-Vector Method
Automatic Speaker Verification (ASV) systems accuracy is based on the spoken language used in training and enrolling speakers. Language dependency makes voice-based security systems less robust and generalizab...
-
Living Reference Work Entry In depth
Periocular Biometrics
-
Chapter and Conference Paper
Unsupervised Single Image Super-Resolution Using Cycle Generative Adversarial Network
The current state-of-the-art deep learning based Single Image Super-Resolution (SISR) techniques employ supervised learning in the training process. In this learning, the Low-Resolution (LR) images are prepare...
-
Chapter and Conference Paper
Multilingual Voice Impersonation Dataset and Evaluation
Well-known vulnerabilities of voice-based biometrics are impersonation, replay attacks, artificial signals/speech synthesis, and voice conversion. Among these, voice impersonation is the obvious and simplest w...
-
Chapter and Conference Paper
Hierarchical Interpolation of Imagenet Features for Cross-Dataset Presentation Attack Detection
Face Recognition Systems (FRS) are vulnerable to spoofing attacks (a.k.a presentation attacks), which can be carried out by presenting a printed photo (print-photo), displaying a photo (display-photo), or disp...
-
Chapter and Conference Paper
Fusion of Texture and Optical Flow Using Convolutional Neural Networks for Gender Classification in Videos
Automatic Gender Classification (AGC) is an essential problem due to its growing demand in commercial applications, including social media and security environments such as the airport. AGC is a well-researche...
-
Chapter and Conference Paper
A Survey on Unknown Presentation Attack Detection for Fingerprint
Fingerprint recognition systems are widely deployed in various real-life applications as they have achieved high accuracy. The widely used applications include border control, automated teller machine (ATM), a...
-
Chapter and Conference Paper
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border checks. While creating a ...
-
Chapter and Conference Paper
Unsupervised Real-World Super-resolution Using Variational Auto-encoder and Generative Adversarial Network
Convolutional Neural Networks (CNNs) have shown promising results on Single Image Super-Resolution (SISR) task. A pair of Low-Resolution (LR) and High-Resolution (HR) images are typically used in the CNN model...