Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Sushma Venkatesh"'
Face Recognition System (FRS) are shown to be vulnerable to morphed images of newborns. Detecting morphing attacks stemming from face images of newborn is important to avoid unwanted consequences, both for security and society. In this paper, we pres
Externí odkaz:
http://arxiv.org/abs/2305.03264
Autor:
Martin Stokkenes, Raghavendra Ramachandra, Amir Mohammadi, Sushma Venkatesh, Kiran Raja, Pankaj Wasnik, Eric Poiret, Sébastien Marcel, Christoph Busch
Publikováno v:
Handbook of Biometric Anti-Spoofing ISBN: 9789811952876
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5837755d55303a67bdcfeabf85e148bd
https://doi.org/10.1007/978-981-19-5288-3_19
https://doi.org/10.1007/978-981-19-5288-3_19
Autor:
Kiran Raja, Raghavendra Ramachandra, Sushma Venkatesh, Marta Gomez-Barrero, Christian Rathgeb, Christoph Busch
Publikováno v:
Handbook of Biometric Anti-Spoofing ISBN: 9789811952876
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a42fb31824c1f15833337438a55469c5
https://doi.org/10.1007/978-981-19-5288-3_2
https://doi.org/10.1007/978-981-19-5288-3_2
Publikováno v:
IEEE Transactions on Technology and Society. 2:128-145
Face recognition has been successfully deployed in real-time applications, including secure applications such as border control. The vulnerability of face recognition systems (FRSs) to various kinds of attacks (both direct and indirect attacks) and f
Autor:
Sushma Venkatesh
Publikováno v:
2022 IEEE International Conference on Imaging Systems and Techniques (IST).
Autor:
Sankini Rancha Godage, Froy Lovasdaly, Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch
Few studies have focused on examining how people recognize morphing attacks, even as several publications have examined the susceptibility of automated FRS and offered morphing attack detection (MAD) approaches. MAD approaches base their decisions ei
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f583906207abe14417dd275748e6f26d
http://arxiv.org/abs/2202.12426
http://arxiv.org/abs/2202.12426
Publikováno v:
Image and Vision Computing
Face recognition systems (FRS) are vulnerable to different kinds of attacks. Morphing attack combines multiple face images to obtain a single face image that can verify equally against all contributing subjects. Various Morphing Attack Detection (MAD
Publikováno v:
IJCB
Face morphing attacks are evolving as a significant threat to the Face Recognition Systems (FRS) operating in border control and passport issuance. As newborn face has very limited discriminative facial characteristics, it is challenging for both hum
Publikováno v:
IEEE Sensors Journal. 19:6102-6111
Biometrics-based authentication of subjects is widely deployed in several real-life applications. Among various biometric characteristics, the finger-vein characteristic has demonstrated both reliable and highly accurate authentications for access co
Publikováno v:
ICPR
Wrist-wearable devices such as smartwatch hardware have gained popularity as they provide quick access to various information and easy access to multiple applications. Among the numerous smartwatch applications, user verification based on the handwri