Raghavendra Ramachandra

ORCID: 0000-0003-0484-3956
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biometric Identification and Security
  • Face recognition and analysis
  • Face and Expression Recognition
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Advanced Image Processing Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Steganography and Watermarking Techniques
  • Video Surveillance and Tracking Methods
  • Facial Nerve Paralysis Treatment and Research
  • Image Processing Techniques and Applications
  • Advanced Vision and Imaging
  • Handwritten Text Recognition Techniques
  • Anomaly Detection Techniques and Applications
  • Forensic and Genetic Research
  • Forensic Fingerprint Detection Methods
  • Image and Signal Denoising Methods
  • Remote-Sensing Image Classification
  • Speech and Audio Processing
  • Image Enhancement Techniques
  • Adversarial Robustness in Machine Learning
  • Music and Audio Processing
  • Advanced Image Fusion Techniques
  • Spectroscopy and Chemometric Analyses
  • Image Processing and 3D Reconstruction

Norwegian University of Science and Technology
2016-2025

Jain University
2024

Advanced Micro Devices (Canada)
2024

NTNU Samfunnsforskning
2016-2023

Zimmer Biomet (United States)
2023

Rangaraya Medical College
2023

Centre de Recerca Matemàtica
2021

Computer Vision Center
2021

Infosys (India)
2021

Escuela Superior Politecnica del Litoral
2020

Face biometrics is widely used in various applications including border control and facilitating the verification of travellers' identity claim with respect to his electronic passport (ePass). As most countries, passports are issued a citizen based on submitted photo which allows applicant provide morphed face conceal during application process. In this work, we propose novel approach leveraging transferable features from pre-trained Deep Convolutional Neural Networks (D-CNN) detect both...

10.1109/cvprw.2017.228 article EN 2017-07-01

The vulnerability of face recognition systems is a growing concern that has drawn the interest from both academic and research communities. Despite availability broad range presentation attack detection (PAD) (or countermeasure or antispoofing) schemes, there exists no superior PAD technique due to evolution sophisticated attacks spoof attacks). In this paper, we present new perspective for by introducing light field camera (LFC). Since use LFC can record direction each incoming ray in...

10.1109/tip.2015.2395951 article EN IEEE Transactions on Image Processing 2015-01-22

Widespread deployment of Automatic Border Control (ABC) along with the electronic Machine Readable Travel Documents (eMRTD) for person verification has enabled a prominent use case face biometrics in border control applications. Many countries issue eMRTD passports on basis printed biometric photo submitted by applicant. Some offer web-portals passport renewal, where citizens can upload their photo. These applications allow possibility being altered to beautify appearance data subject or...

10.1109/btas.2016.7791169 article EN 2016-09-01

With advancements in technology, it is now possible to create representations of human faces a seamless manner for fake media, leveraging the large-scale availability videos. These can be used conduct personation attacks on targeted subjects. Availability open source software and variety commercial applications provides an opportunity generate videos particular target subject number ways. In this article, we evaluate generalizability face detection methods through series studies benchmark...

10.23919/biosig.2018.8553251 article EN 2018-09-01

With the widespread deployment of biometric recognition systems, interest in attacking these systems is increasing. One easiest ways to circumvent a system are so-called presentation attacks, which artefacts presented sensor either impersonate another subject or avoid being recognised. In recent past, vulnerabilities morphing attacks have been unveiled. such samples multiple subjects merged signal feature domain, order allow successful verification all contributing against morphed identity....

10.23919/biosig.2017.8053499 article EN 2017-09-01

Morphed face images are artificially generated images, which blend the facial of two or more different data subjects into one. The resulting morphed image resembles constituent faces, both in visual and feature representation. If a is enroled as probe biometric system, contributing to will be verified against probe. As result this infiltration, referred attack, unambiguous assignment not warranted, i.e. unique link between subject annulled. In work, we investigate vulnerability systems such...

10.1109/iwbf.2017.7935088 article EN 2017-04-01

Vulnerability of iris recognition systems remains a challenge due to diverse presentation attacks that fail assure the reliability when adopting these in real-life scenarios. In this paper, we present an in-depth analysis on especially focusing photo print and electronic display (or screen) attack. To extent, introduce new relatively large scale visible spectrum artefact database comprised 3300 normal samples are captured by simulating five different system. We also propose novel attack...

10.1109/tifs.2015.2400393 article EN IEEE Transactions on Information Forensics and Security 2015-02-05

The Face Recognition System (FRS) is known to be vulnerable the attacks using morphed face. As use of face characteristics are mandatory in electronic passport (ePass), morphing have raised potential concerns border security. In this paper, we analyze vulnerability FRS new attack performed averaged generated by simple pixel level averaging two images corresponding different subjects. We benchmark commercial both conventional and based attacks. further propose a novel algorithm on...

10.1109/btas.2017.8272742 article EN 2017-10-01

Face recognition has been successfully deployed in real-time applications, including secure applications such as border control. The vulnerability of face systems (FRSs) to various kinds attacks (both direct and indirect attacks) morphing received great interest from the biometric community. goal a attack is subvert an FRS at automatic control (ABC) gate by presenting electronic machine-readable travel document (eMRTD) or e-passport that obtained based on morphed image. Since application...

10.1109/tts.2021.3066254 article EN cc-by-nc-nd IEEE Transactions on Technology and Society 2021-03-17

The primary objective of face morphing is to com-bine images different data subjects (e.g. an malicious actor and accomplice) generate a image that can be equally verified for both contributing subjects. In this paper, we propose new framework generating morphs using newer Generative Adversarial Network (GAN) - StyleGAN. contrast earlier works, realistic high-quality high resolution 1024 × pixels. With the newly created dataset 2500 morphed images, pose critical question in work. (i) Can GAN...

10.1109/iwbf49977.2020.9107970 article EN 2020-04-01

Face morphing attacks target to circumvent Recognition Systems (FRS) by employing face images derived from multiple data subjects (e.g., accomplices and malicious actors). Morphed can be verified against contributing with a reasonable success rate, given they have high degree of facial resemblance. The is directly dependent on the quality generated morph images. We present new approach for generating strong extending our earlier framework morphs. using an Identity Prior Driven Generative...

10.1109/tbiom.2021.3072349 article EN cc-by-nc-nd IEEE Transactions on Biometrics Behavior and Identity Science 2021-04-14

Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations age, gender, ethnicity that are inadequately addressed. Attack Detection (MAD) algorithms often prone generalization they database dependent. The existing databases, mostly semi-public nature, lack diversity terms ethnicity, various morphing...

10.1109/tifs.2020.3035252 article EN cc-by IEEE Transactions on Information Forensics and Security 2020-11-02

This work reviews the results of NTIRE 2021 Challenge on Non-Homogeneous Dehazing. The proposed techniques and their have been evaluated a novel dataset that extends NH-Haze datset. It consists additional 35 pairs real haze free nonhomogeneous hazy images recorded outdoor. has introduced in outdoor scenes by using professional setup imitates conditions scenes. 327 participants registered challenge 23 teams competed final testing phase. solutions gauge state-of-the-art image dehazing.

10.1109/cvprw53098.2021.00074 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2021-06-01

This paper reviews the NTIRE 2023 challenge on image super-resolution (×4), focusing proposed solutions and results. The task of (SR) is to generate a high-resolution (HR) output from corresponding low-resolution (LR) input by leveraging prior information paired LR-HR images. aim obtain network design/solution capable produce high-quality results with best performance (e.g., PSNR). We want explore how high we can achieve regardless computational cost model size FLOPs) data. track was measure...

10.1109/cvprw59228.2023.00185 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2023-06-01

Secure authentication for smartphones is becoming important many applications such as financial transactions. Until today PIN and password are the most commonly used methods smartphone access control. Specifically a limited length passwords, level of security low thus can be compromised easily. In this work, we propose multi-modal biometric system, which uses face, periocular iris characteristics authentication. The proposed system tested on two different devices - Samsung Galaxy S5 Note...

10.1109/icb.2015.7139044 article EN 2015-05-01

This paper presents a novel method for global anomaly detection in crowded scenes. The proposed introduces the Particle Swarm Optimization (PSO) as robust algorithm optimizing interaction force computed using Social Force Model (SFM). main objective of is to drift population particles towards areas image motion. Such displacement driven by PSO fitness function aimed at minimizing force, so model most diffused and typical crowd behavior. Experiments are extensively conducted on public...

10.1109/iccvw.2011.6130235 article EN 2011-11-01

The vulnerability of finger vein recognition to spoofing attacks has emerged as a crucial security problem in the recent years mainly due high applications where biometric technology is used. Recent works shown that biometrics vulnerable attacks, pointing out importance investigate counter-measures against this type fraudulent actions. goal 1st Competition on Counter Measures Finger Vein Spoofing Attacks challenge researchers create can detect printed effectively. submitted approaches are...

10.1109/icb.2015.7139067 article EN 2015-05-01

Contact lens detection in the eye is a significant task to improve reliability of iris recognition systems. A contact overlays region and prevents sensor from capturing normal region. In this paper, we present novel scheme for detecting using Deep Convolutional Neural Network (CNN). The proposed CNN architecture ContlensNet structured have fifteen layers configured three-class problem with following classes: images textured (or colored) lens, soft transparent) no lens. trained numerous image...

10.1109/wacv.2017.134 article EN 2017-03-01
Coming Soon ...