Skip to main content

Showing 1–10 of 10 results for author: Singh, J M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.15765  [pdf, other

    cs.CV

    3D Face Morphing Attack Generation using Non-Rigid Registration

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face Recognition Systems (FRS) are widely used in commercial environments, such as e-commerce and e-banking, owing to their high accuracy in real-world conditions. However, these systems are vulnerable to facial morphing attacks, which are generated by blending face color images of different subjects. This paper presents a new method for generating 3D face morphs from two bona fide point clouds. T… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: Accepted to 2024 18th International Conference on Automatic Face and Gesture Recognition (FG) as short paper

  2. arXiv:2404.12680  [pdf, other

    cs.CV cs.CR

    VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection

    Authors: Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, R. S. Gad

    Abstract: Facial biometrics are an essential components of smartphones to ensure reliable and trustworthy authentication. However, face biometric systems are vulnerable to Presentation Attacks (PAs), and the availability of more sophisticated presentation attack instruments such as 3D silicone face masks will allow attackers to deceive face recognition systems easily. In this work, we propose a novel Presen… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Accepted in 2024 18th International Conference on Automatic Face and Gesture Recognition (FG)

  3. arXiv:2309.13704  [pdf, other

    cs.CV

    Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes

    Authors: Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh

    Abstract: Facial biometrics are widely deployed in smartphone-based applications because of their usability and increased verification accuracy in unconstrained scenarios. The evolving applications of smartphone-based facial recognition have also increased Presentation Attacks (PAs), where an attacker can present a Presentation Attack Instrument (PAI) to maliciously gain access to the application. Because t… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: Accepted in IJCB 2023

  4. arXiv:2211.11039  [pdf, other

    cs.CV

    Deep Composite Face Image Attacks: Generation, Vulnerability and Detection

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks (CFIA) based on facial attributes using Generative Adversarial Networks (GANs). Given the face images corresponding to two unique data subjects, the proposed CFIA method will indepen… ▽ More

    Submitted 20 March, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

    Comments: The submitted paper is accepted in IEEE Access 2023

  5. arXiv:2209.15474  [pdf, other

    cs.CV

    Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face Recognition Systems (FRS) are vulnerable to various attacks performed directly and indirectly. Among these attacks, face morphing attacks are highly potential in deceiving automatic FRS and human observers and indicate a severe security threat, especially in the border control scenario. This work presents a face morphing attack detection, especially in the On-The-Fly (OTF) Automatic Border Co… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

    Comments: The paper is accepted at the International Joint Conference on Biometrics (IJCB) 2022

  6. arXiv:2201.03454  [pdf, other

    cs.CV

    3D Face Morphing Attacks: Generation, Vulnerability and Detection

    Authors: Jag Mohan Singh, Raghavendra Ramachandra

    Abstract: Face Recognition systems (FRS) have been found to be vulnerable to morphing attacks, where the morphed face image is generated by blending the face images from contributory data subjects. This work presents a novel direction for generating face-morphing attacks in 3D. To this extent, we introduced a novel approach based on blending 3D face point clouds corresponding to contributory data subjects.… ▽ More

    Submitted 13 October, 2023; v1 submitted 10 January, 2022; originally announced January 2022.

    Comments: The paper is accepted at IEEE Transactions on Biometrics, Behavior and Identity Science

  7. Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking

    Authors: Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond Veldhuis, Davide Maltoni, Christoph Busch

    Abstract: Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to age, gender, ethnicity that are inadequately addressed. Morphing Attack Detection (MAD) algorithms often are prone to generalization challenges as th… ▽ More

    Submitted 28 September, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: This paper is a pre-print. The article is accepted for publication in IEEE Transactions on Information Forensics and Security (TIFS)

    Journal ref: 10.1109/TIFS.2020.3035252

  8. arXiv:2005.08337  [pdf, other

    cs.CV cs.CR eess.IV

    A Survey on Unknown Presentation Attack Detection for Fingerprint

    Authors: Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra

    Abstract: Fingerprint recognition systems are widely deployed in various real-life applications as they have achieved high accuracy. The widely used applications include border control, automated teller machine (ATM), and attendance monitoring systems. However, these critical systems are prone to spoofing attacks (a.k.a presentation attacks (PA)). PA for fingerprint can be performed by presenting gummy fing… ▽ More

    Submitted 17 May, 2020; originally announced May 2020.

    Comments: Submitted to 3rd International Conference on Intelligent Technologies and Applications INTAP 2020

  9. arXiv:1912.01408  [pdf, other

    cs.CV eess.IV

    Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition

    Authors: Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch

    Abstract: Despite the high biometric performance, finger-vein recognition systems are vulnerable to presentation attacks (aka., spoofing attacks). In this paper, we present a new and robust approach for detecting presentation attacks on finger-vein biometric systems exploiting the 3D Shape (normal-map) and material properties (diffuse-map) of the finger. Observing the normal-map and diffuse-map exhibiting e… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: This work was accepted in The 15th International Conference on SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS, 2019

    MSC Class: I.5.4; I.4.9; I.2.10 ACM Class: I.5.4; I.4.9; I.2.10

  10. arXiv:1912.01372  [pdf, other

    cs.CV

    Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance

    Authors: Jag Mohan Singh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch

    Abstract: Face recognition is widely employed in Automated Border Control (ABC) gates, which verify the face image on passport or electronic Machine Readable Travel Document (eMTRD) against the captured image to confirm the identity of the passport holder. In this paper, we present a robust morph detection algorithm that is based on differential morph detection. The proposed method decomposes the bona fide… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: This work was accepted in The 15th International Conference on SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS, 2019

    MSC Class: I.5.4; I.4.9; I.2.10 ACM Class: I.5.4; I.4.9; I.2.10