Alert button
Picture for Raghavendra Ramachandra

Raghavendra Ramachandra

Alert button

A Latent Fingerprint in the Wild Database

Add code
Bookmark button
Alert button
Apr 03, 2023
Xinwei Liu, Kiran Raja, Renfang Wang, Hong Qiu, Hucheng Wu, Dechao Sun, Qiguang Zheng, Nian Liu, Xiaoxia Wang, Gehang Huang, Raghavendra Ramachandra, Christoph Busch

Figure 1 for A Latent Fingerprint in the Wild Database
Figure 2 for A Latent Fingerprint in the Wild Database
Figure 3 for A Latent Fingerprint in the Wild Database
Figure 4 for A Latent Fingerprint in the Wild Database
Viaarxiv icon

Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins

Add code
Bookmark button
Alert button
Mar 24, 2023
Raghavendra Ramachandra, Sushma Venkatesh, Gaurav Jaswal, Guoqiang Li

Figure 1 for Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins
Figure 2 for Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins
Figure 3 for Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins
Figure 4 for Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins
Viaarxiv icon

Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network

Add code
Bookmark button
Alert button
Dec 09, 2022
Raghavendra Ramachandra, Hailin Li

Figure 1 for Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network
Figure 2 for Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network
Figure 3 for Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network
Figure 4 for Finger-NestNet: Interpretable Fingerphoto Verification on Smartphone using Deep Nested Residual Network
Viaarxiv icon

SRTGAN: Triplet Loss based Generative Adversarial Network for Real-World Super-Resolution

Add code
Bookmark button
Alert button
Nov 22, 2022
Dhruv Patel, Abhinav Jain, Simran Bawkar, Manav Khorasiya, Kalpesh Prajapati, Kishor Upla, Kiran Raja, Raghavendra Ramachandra, Christoph Busch

Figure 1 for SRTGAN: Triplet Loss based Generative Adversarial Network for Real-World Super-Resolution
Figure 2 for SRTGAN: Triplet Loss based Generative Adversarial Network for Real-World Super-Resolution
Figure 3 for SRTGAN: Triplet Loss based Generative Adversarial Network for Real-World Super-Resolution
Figure 4 for SRTGAN: Triplet Loss based Generative Adversarial Network for Real-World Super-Resolution
Viaarxiv icon

Deep Composite Face Image Attacks: Generation, Vulnerability and Detection

Add code
Bookmark button
Alert button
Nov 20, 2022
Jag Mohan Singh, Raghavendra Ramachandra

Figure 1 for Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
Figure 2 for Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
Figure 3 for Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
Figure 4 for Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
Viaarxiv icon

Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance

Add code
Bookmark button
Alert button
Sep 30, 2022
Jag Mohan Singh, Raghavendra Ramachandra

Figure 1 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Figure 2 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Figure 3 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Figure 4 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Viaarxiv icon

A Uniform Representation Learning Method for OCT-based Fingerprint Presentation Attack Detection and Reconstruction

Add code
Bookmark button
Alert button
Sep 25, 2022
Wentian Zhang, Haozhe Liu, Feng Liu, Raghavendra Ramachandra

Figure 1 for A Uniform Representation Learning Method for OCT-based Fingerprint Presentation Attack Detection and Reconstruction
Figure 2 for A Uniform Representation Learning Method for OCT-based Fingerprint Presentation Attack Detection and Reconstruction
Figure 3 for A Uniform Representation Learning Method for OCT-based Fingerprint Presentation Attack Detection and Reconstruction
Figure 4 for A Uniform Representation Learning Method for OCT-based Fingerprint Presentation Attack Detection and Reconstruction
Viaarxiv icon

Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data

Add code
Bookmark button
Alert button
Aug 17, 2022
Marcel Grimmer, Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch

Figure 1 for Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data
Figure 2 for Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data
Figure 3 for Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data
Figure 4 for Time flies by: Analyzing the Impact of Face Ageing on the Recognition Performance with Synthetic Data
Viaarxiv icon

SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data

Add code
Bookmark button
Alert button
Aug 15, 2022
Marco Huber, Fadi Boutros, Anh Thi Luu, Kiran Raja, Raghavendra Ramachandra, Naser Damer, Pedro C. Neto, Tiago Gonçalves, Ana F. Sequeira, Jaime S. Cardoso, João Tremoço, Miguel Lourenço, Sergio Serra, Eduardo Cermeño, Marija Ivanovska, Borut Batagelj, Andrej Kronovšek, Peter Peer, Vitomir Štruc

Figure 1 for SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data
Figure 2 for SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data
Figure 3 for SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data
Figure 4 for SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data
Viaarxiv icon

How Far Can I Go ? : A Self-Supervised Approach for Deterministic Video Depth Forecasting

Add code
Bookmark button
Alert button
Jul 08, 2022
Sauradip Nag, Nisarg Shah, Anran Qi, Raghavendra Ramachandra

Figure 1 for How Far Can I Go ? : A Self-Supervised Approach for Deterministic Video Depth Forecasting
Figure 2 for How Far Can I Go ? : A Self-Supervised Approach for Deterministic Video Depth Forecasting
Figure 3 for How Far Can I Go ? : A Self-Supervised Approach for Deterministic Video Depth Forecasting
Figure 4 for How Far Can I Go ? : A Self-Supervised Approach for Deterministic Video Depth Forecasting
Viaarxiv icon