Skip to main content

Showing 1–3 of 3 results for author: Al-Ghadi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.00573   

    cs.CV

    IDTrust: Deep Identity Document Quality Detection with Bandpass Filtering

    Authors: Musab Al-Ghadi, Joris Voerman, Souhail Bakkali, Mickaël Coustaty, Nicolas Sidere, Xavier St-Georges

    Abstract: The increasing use of digital technologies and mobile-based registration procedures highlights the vital role of personal identity documents (IDs) in verifying users and safeguarding sensitive information. However, the rise in counterfeit ID production poses a significant challenge, necessitating the development of reliable and efficient automated verification methods. This paper introduces IDTrus… ▽ More

    Submitted 26 June, 2024; v1 submitted 1 March, 2024; originally announced March 2024.

    Comments: The primary reason is confidentiality and the joint ownership between the L3i laboratory and the company IMDS

  2. arXiv:2206.10989  [pdf, other

    cs.CV cs.CR

    Identity Documents Authentication based on Forgery Detection of Guilloche Pattern

    Authors: Musab Al-Ghadi, Zuheng Ming, Petra Gomez-Krämer, Jean-Christophe Burie

    Abstract: In cases such as digital enrolment via mobile and online services, identity document verification is critical in order to efficiently detect forgery and therefore build user trust in the digital world. In this paper, an authentication model for identity documents based on forgery detection of guilloche patterns is proposed. The proposed approach is made up of two steps: feature extraction and simi… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

  3. arXiv:2203.01562  [pdf, other

    cs.CV

    ViTransPAD: Video Transformer using convolution and self-attention for Face Presentation Attack Detection

    Authors: Zuheng Ming, Zitong Yu, Musab Al-Ghadi, Muriel Visani, Muhammad MuzzamilLuqman, Jean-Christophe Burie

    Abstract: Face Presentation Attack Detection (PAD) is an important measure to prevent spoof attacks for face biometric systems. Many works based on Convolution Neural Networks (CNNs) for face PAD formulate the problem as an image-level binary classification task without considering the context. Alternatively, Vision Transformers (ViT) using self-attention to attend the context of an image become the mainstr… ▽ More

    Submitted 14 March, 2022; v1 submitted 3 March, 2022; originally announced March 2022.