5,742 results on '"Jain, Anil"'
Search Results
2. GenPalm: Contactless Palmprint Generation with Diffusion Models
- Author
-
Grosz, Steven A. and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
The scarcity of large-scale palmprint databases poses a significant bottleneck to advancements in contactless palmprint recognition. To address this, researchers have turned to synthetic data generation. While Generative Adversarial Networks (GANs) have been widely used, they suffer from instability and mode collapse. Recently, diffusion probabilistic models have emerged as a promising alternative, offering stable training and better distribution coverage. This paper introduces a novel palmprint generation method using diffusion probabilistic models, develops an end-to-end framework for synthesizing multiple palm identities, and validates the realism and utility of the generated palmprints. Experimental results demonstrate the effectiveness of our approach in generating palmprint images which enhance contactless palmprint recognition performance across several test databases utilizing challenging cross-database and time-separated evaluation protocols.
- Published
- 2024
3. Hide and Seek: How Does Watermarking Impact Face Recognition?
- Author
-
Yao, Yuguang, Grosz, Steven, Liu, Sijia, and Jain, Anil
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
The recent progress in generative models has revolutionized the synthesis of highly realistic images, including face images. This technological development has undoubtedly helped face recognition, such as training data augmentation for higher recognition accuracy and data privacy. However, it has also introduced novel challenges concerning the responsible use and proper attribution of computer generated images. We investigate the impact of digital watermarking, a technique for embedding ownership signatures into images, on the effectiveness of face recognition models. We propose a comprehensive pipeline that integrates face image generation, watermarking, and face recognition to systematically examine this question. The proposed watermarking scheme, based on an encoder-decoder architecture, successfully embeds and recovers signatures from both real and synthetic face images while preserving their visual fidelity. Through extensive experiments, we unveil that while watermarking enables robust image attribution, it results in a slight decline in face recognition accuracy, particularly evident for face images with challenging poses and expressions. Additionally, we find that directly training face recognition models on watermarked images offers only a limited alleviation of this performance decline. Our findings underscore the intricate trade off between watermarking and face recognition accuracy. This work represents a pivotal step towards the responsible utilization of generative models in face recognition and serves to initiate discussions regarding the broader implications of watermarking in biometrics.
- Published
- 2024
4. Universal Fingerprint Generation: Controllable Diffusion Model with Multimodal Conditions
- Author
-
Grosz, Steven A. and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
The utilization of synthetic data for fingerprint recognition has garnered increased attention due to its potential to alleviate privacy concerns surrounding sensitive biometric data. However, current methods for generating fingerprints have limitations in creating impressions of the same finger with useful intra-class variations. To tackle this challenge, we present GenPrint, a framework to produce fingerprint images of various types while maintaining identity and offering humanly understandable control over different appearance factors such as fingerprint class, acquisition type, sensor device, and quality level. Unlike previous fingerprint generation approaches, GenPrint is not confined to replicating style characteristics from the training dataset alone: it enables the generation of novel styles from unseen devices without requiring additional fine-tuning. To accomplish these objectives, we developed GenPrint using latent diffusion models with multimodal conditions (text and image) for consistent generation of style and identity. Our experiments leverage a variety of publicly available datasets for training and evaluation. Results demonstrate the benefits of GenPrint in terms of identity preservation, explainable control, and universality of generated images. Importantly, the GenPrint-generated images yield comparable or even superior accuracy to models trained solely on real data and further enhances performance when augmenting the diversity of existing real fingerprint datasets.
- Published
- 2024
5. KeyPoint Relative Position Encoding for Face Recognition
- Author
-
Kim, Minchul, Su, Yiyang, Liu, Feng, Jain, Anil, and Liu, Xiaoming
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
In this paper, we address the challenge of making ViT models more robust to unseen affine transformations. Such robustness becomes useful in various recognition tasks such as face recognition when image alignment failures occur. We propose a novel method called KP-RPE, which leverages key points (e.g.~facial landmarks) to make ViT more resilient to scale, translation, and pose variations. We begin with the observation that Relative Position Encoding (RPE) is a good way to bring affine transform generalization to ViTs. RPE, however, can only inject the model with prior knowledge that nearby pixels are more important than far pixels. Keypoint RPE (KP-RPE) is an extension of this principle, where the significance of pixels is not solely dictated by their proximity but also by their relative positions to specific keypoints within the image. By anchoring the significance of pixels around keypoints, the model can more effectively retain spatial relationships, even when those relationships are disrupted by affine transformations. We show the merit of KP-RPE in face and gait recognition. The experimental results demonstrate the effectiveness in improving face recognition performance from low-quality images, particularly where alignment is prone to failure. Code and pre-trained models are available., Comment: To appear in CVPR2024
- Published
- 2024
6. Evaluating Pumped Hydro storage technology in the era of renewable generation and ancillary Markets
- Author
-
Jain, Anil, Chakraborty, Arindam, Gupta, Sanjay Kumar, Kandpal, Krishna Kumar, Shukla, Nitu, and Prashant
- Published
- 2019
7. AdvGen: Physical Adversarial Attack on Face Presentation Attack Detection Systems
- Author
-
Patnaik, Sai Amrit, Chansoriya, Shivali, Jain, Anil K., and Namboodiri, Anoop M.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Evaluating the risk level of adversarial images is essential for safely deploying face authentication models in the real world. Popular approaches for physical-world attacks, such as print or replay attacks, suffer from some limitations, like including physical and geometrical artifacts. Recently, adversarial attacks have gained attraction, which try to digitally deceive the learning strategy of a recognition system using slight modifications to the captured image. While most previous research assumes that the adversarial image could be digitally fed into the authentication systems, this is not always the case for systems deployed in the real world. This paper demonstrates the vulnerability of face authentication systems to adversarial images in physical world scenarios. We propose AdvGen, an automated Generative Adversarial Network, to simulate print and replay attacks and generate adversarial images that can fool state-of-the-art PADs in a physical domain attack setting. Using this attack strategy, the attack success rate goes up to 82.01%. We test AdvGen extensively on four datasets and ten state-of-the-art PADs. We also demonstrate the effectiveness of our attack by conducting experiments in a realistic, physical environment., Comment: 10 pages, 9 figures, Accepted to the International Joint Conference on Biometrics (IJCB 2023)
- Published
- 2023
8. Drug-Resistant Bone, Joint and Spine Tuberculosis: Evolution of Diagnosis and Treatment
- Author
-
Jain, Anil K., Jain, Pragya, Jaggi, Karan, Suresh, Abhimanyu, Yadav, Manish, Gain, Amartya, and Gupta, Himanshu
- Published
- 2024
- Full Text
- View/download PDF
9. Bibliometric study on LIS education
- Author
-
Kumar, Mahendra and Jain, Anil Kumar
- Published
- 2018
- Full Text
- View/download PDF
10. Rich Magnetic Phase Diagram of Putative Helimagnet Sr$_3$Fe$_2$O$_7$
- Author
-
Andriushin, Nikita D., Grumbach, Justus, Kim, Jung-Hwa, Reehuis, Manfred, Tymoshenko, Yuliia V., Onykiienko, Yevhen A., Jain, Anil, MacFarlane, W. Andrew, Maljuk, Andrey, Granovsky, Sergey, Hoser, Andreas, Pomjakushin, Vladimir, Ollivier, Jacques, Doerr, Mathias, Keimer, Bernhard, Inosov, Dmytro S., and Peets, Darren C.
- Subjects
Condensed Matter - Strongly Correlated Electrons - Abstract
The cubic perovskite SrFeO$_3$ was recently reported to host hedgehog- and skyrmion-lattice phases in a highly symmetric crystal structure which does not support the Dzyaloshinskii-Moriya interactions commonly invoked to explain such magnetic order. Hints of a complex magnetic phase diagram have also recently been found in powder samples of the single-layer Ruddlesden-Popper analog Sr$_2$FeO$_4$, so a reinvestigation of the bilayer material Sr$_3$Fe$_2$O$_7$, believed to be a simple helimagnet, is called for. Our magnetization and dilatometry studies reveal a rich magnetic phase diagram with at least 6 distinct magnetically ordered phases and strong similarities to that of SrFeO$_3$. In particular, at least one phase is apparently multiple-$\mathbf{q}$, and the $\mathbf{q}$s are not observed to vary among the phases. Since Sr$_3$Fe$_2$O$_7$ has only two possible orientations for its propagation vector, some of the phases are likely exotic multiple-$\mathbf{q}$ order, and it is possible to fully detwin all phases and more readily access their exotic physics., Comment: 14 pages, 13 figures
- Published
- 2023
- Full Text
- View/download PDF
11. Learning Clothing and Pose Invariant 3D Shape Representation for Long-Term Person Re-Identification
- Author
-
Liu, Feng, Kim, Minchul, Gu, ZiAng, Jain, Anil, and Liu, Xiaoming
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Long-Term Person Re-Identification (LT-ReID) has become increasingly crucial in computer vision and biometrics. In this work, we aim to extend LT-ReID beyond pedestrian recognition to include a wider range of real-world human activities while still accounting for cloth-changing scenarios over large time gaps. This setting poses additional challenges due to the geometric misalignment and appearance ambiguity caused by the diversity of human pose and clothing. To address these challenges, we propose a new approach 3DInvarReID for (i) disentangling identity from non-identity components (pose, clothing shape, and texture) of 3D clothed humans, and (ii) reconstructing accurate 3D clothed body shapes and learning discriminative features of naked body shapes for person ReID in a joint manner. To better evaluate our study of LT-ReID, we collect a real-world dataset called CCDA, which contains a wide variety of human activities and clothing changes. Experimentally, we show the superior performance of our approach for person ReID., Comment: 10 pages, 7 figures, accepted by ICCV 2023
- Published
- 2023
12. Treatment Outcome of Drug-Resistant Skeletal Tuberculosis: A Retrospective Analysis
- Author
-
Gupta, Himanshu, Arora, Rajesh, Chadha, Manish, Dhammi, I. K., and Jain, Anil K.
- Published
- 2024
- Full Text
- View/download PDF
13. FarSight: A Physics-Driven Whole-Body Biometric System at Large Distance and Altitude
- Author
-
Liu, Feng, Ashbaugh, Ryan, Chimitt, Nicholas, Hassan, Najmul, Hassani, Ali, Jaiswal, Ajay, Kim, Minchul, Mao, Zhiyuan, Perry, Christopher, Ren, Zhiyuan, Su, Yiyang, Varghaei, Pegah, Wang, Kai, Zhang, Xingguang, Chan, Stanley, Ross, Arun, Shi, Humphrey, Wang, Zhangyang, Jain, Anil, and Liu, Xiaoming
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Whole-body biometric recognition is an important area of research due to its vast applications in law enforcement, border security, and surveillance. This paper presents the end-to-end design, development and evaluation of FarSight, an innovative software system designed for whole-body (fusion of face, gait and body shape) biometric recognition. FarSight accepts videos from elevated platforms and drones as input and outputs a candidate list of identities from a gallery. The system is designed to address several challenges, including (i) low-quality imagery, (ii) large yaw and pitch angles, (iii) robust feature extraction to accommodate large intra-person variabilities and large inter-person similarities, and (iv) the large domain gap between training and test sets. FarSight combines the physics of imaging and deep learning models to enhance image restoration and biometric feature encoding. We test FarSight's effectiveness using the newly acquired IARPA Biometric Recognition and Identification at Altitude and Range (BRIAR) dataset. Notably, FarSight demonstrated a substantial performance increase on the BRIAR dataset, with gains of +11.82% Rank-20 identification and +11.3% TAR@1% FAR., Comment: 11 pages, 7 figures, accepted in WACV 2024
- Published
- 2023
14. Accelerated Fingerprint Enhancement: A GPU-Optimized Mixed Architecture Approach
- Author
-
Wyzykowski, André Brasil Vieira and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
This document presents a preliminary approach to latent fingerprint enhancement, fundamentally designed around a mixed Unet architecture. It combines the capabilities of the Resnet-101 network and Unet encoder, aiming to form a potentially powerful composite. This combination, enhanced with attention mechanisms and forward skip connections, is intended to optimize the enhancement of ridge and minutiae features in fingerprints. One innovative element of this approach includes a novel Fingerprint Enhancement Gabor layer, specifically designed for GPU computations. This illustrates how modern computational resources might be harnessed to expedite enhancement. Given its potential functionality as either a CNN or Transformer layer, this Gabor layer could offer improved agility and processing speed to the system. However, it is important to note that this approach is still in the early stages of development and has not yet been fully validated through rigorous experiments. As such, it may require additional time and testing to establish its robustness and usability in the field of latent fingerprint enhancement. This includes improvements in processing speed, enhancement adaptability with distinct latent fingerprint types, and full validation in experimental approaches such as open-set (identification 1:N) and open-set validation, fingerprint quality evaluation, among others.
- Published
- 2023
15. A Universal Latent Fingerprint Enhancer Using Transformers
- Author
-
Wyzykowski, Andre Brasil Vieira and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Forensic science heavily relies on analyzing latent fingerprints, which are crucial for criminal investigations. However, various challenges, such as background noise, overlapping prints, and contamination, make the identification process difficult. Moreover, limited access to real crime scene and laboratory-generated databases hinders the development of efficient recognition algorithms. This study aims to develop a fast method, which we call ULPrint, to enhance various latent fingerprint types, including those obtained from real crime scenes and laboratory-created samples, to boost fingerprint recognition system performance. In closed-set identification accuracy experiments, the enhanced image was able to improve the performance of the MSU-AFIS from 61.56\% to 75.19\% in the NIST SD27 database, from 67.63\% to 77.02\% in the MSP Latent database, and from 46.90\% to 52.12\% in the NIST SD302 database. Our contributions include (1) the development of a two-step latent fingerprint enhancement method that combines Ridge Segmentation with UNet and Mix Visual Transformer (MiT) SegFormer-B5 encoder architecture, (2) the implementation of multiple dilated convolutions in the UNet architecture to capture intricate, non-local patterns better and enhance ridge segmentation, and (3) the guided blending of the predicted ridge mask with the latent fingerprint. This novel approach, ULPrint, streamlines the enhancement process, addressing challenges across diverse latent fingerprint types to improve forensic investigations and criminal justice outcomes.
- Published
- 2023
16. ViT Unified: Joint Fingerprint Recognition and Presentation Attack Detection
- Author
-
Grosz, Steven A., Wijewardena, Kanishka P., and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
A secure fingerprint recognition system must contain both a presentation attack (i.e., spoof) detection and recognition module in order to protect users against unwanted access by malicious users. Traditionally, these tasks would be carried out by two independent systems; however, recent studies have demonstrated the potential to have one unified system architecture in order to reduce the computational burdens on the system, while maintaining high accuracy. In this work, we leverage a vision transformer architecture for joint spoof detection and matching and report competitive results with state-of-the-art (SOTA) models for both a sequential system (two ViT models operating independently) and a unified architecture (a single ViT model for both tasks). ViT models are particularly well suited for this task as the ViT's global embedding encodes features useful for recognition, whereas the individual, local embeddings are useful for spoof detection. We demonstrate the capability of our unified model to achieve an average integrated matching (IM) accuracy of 98.87% across LivDet 2013 and 2015 CrossMatch sensors. This is comparable to IM accuracy of 98.95% of our sequential dual-ViT system, but with ~50% of the parameters and ~58% of the latency.
- Published
- 2023
17. Child Palm-ID: Contactless Palmprint Recognition for Children
- Author
-
Godbole, Akash, Grosz, Steven A., and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Effective distribution of nutritional and healthcare aid for children, particularly infants and toddlers, in some of the least developed and most impoverished countries of the world, is a major problem due to the lack of reliable identification documents. Biometric authentication technology has been investigated to address child recognition in the absence of reliable ID documents. We present a mobile-based contactless palmprint recognition system, called Child Palm-ID, which meets the requirements of usability, hygiene, cost, and accuracy for child recognition. Using a contactless child palmprint database, Child-PalmDB1, consisting of 19,158 images from 1,020 unique palms (in the age range of 6 mos. to 48 mos.), we report a TAR=94.11% @ FAR=0.1%. The proposed Child Palm-ID system is also able to recognize adults, achieving a TAR=99.4% on the CASIA contactless palmprint database and a TAR=100% on the COEP contactless adult palmprint database, both @ FAR=0.1%. These accuracies are competitive with the SOTA provided by COTS systems. Despite these high accuracies, we show that the TAR for time-separated child-palmprints is only 78.1% @ FAR=0.1%.
- Published
- 2023
18. Reducing Bias in Face Recognition
- Author
-
Gong, Sixue, Liu, Xiaoming, Jain, Anil K., Li, Stan Z., editor, Jain, Anil K., editor, and Deng, Jiankang, editor
- Published
- 2024
- Full Text
- View/download PDF
19. Uncertainty-Aware Face Recognition
- Author
-
Shi, Yichun, Jain, Anil K., Li, Stan Z., editor, Jain, Anil K., editor, and Deng, Jiankang, editor
- Published
- 2024
- Full Text
- View/download PDF
20. Latent Fingerprint Recognition: Fusion of Local and Global Embeddings
- Author
-
Grosz, Steven A. and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning - Abstract
One of the most challenging problems in fingerprint recognition continues to be establishing the identity of a suspect associated with partial and smudgy fingerprints left at a crime scene (i.e., latent prints or fingermarks). Despite the success of fixed-length embeddings for rolled and slap fingerprint recognition, the features learned for latent fingerprint matching have mostly been limited to local minutiae-based embeddings and have not directly leveraged global representations for matching. In this paper, we combine global embeddings with local embeddings for state-of-the-art latent to rolled matching accuracy with high throughput. The combination of both local and global representations leads to improved recognition accuracy across NIST SD 27, NIST SD 302, MSP, MOLF DB1/DB4, and MOLF DB2/DB4 latent fingerprint datasets for both closed-set (84.11%, 54.36%, 84.35%, 70.43%, 62.86% rank-1 retrieval rate, respectively) and open-set (0.50, 0.74, 0.44, 0.60, 0.68 FNIR at FPIR=0.02, respectively) identification scenarios on a gallery of 100K rolled fingerprints. Not only do we fuse the complimentary representations, we also use the local features to guide the global representations to focus on discriminatory regions in two fingerprint images to be compared. This leads to a multi-stage matching paradigm in which subsets of the retrieved candidate lists for each probe image are passed to subsequent stages for further processing, resulting in a considerable reduction in latency (requiring just 0.068 ms per latent to rolled comparison on a AMD EPYC 7543 32-Core Processor, roughly 15K comparisons per second). Finally, we show the generalizability of the fused representations for improving authentication accuracy across several rolled, plain, and contactless fingerprint datasets.
- Published
- 2023
21. DCFace: Synthetic Face Generation with Dual Condition Diffusion Model
- Author
-
Kim, Minchul, Liu, Feng, Jain, Anil, and Liu, Xiaoming
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Generating synthetic datasets for training face recognition models is challenging because dataset generation entails more than creating high fidelity images. It involves generating multiple images of same subjects under different factors (\textit{e.g.}, variations in pose, illumination, expression, aging and occlusion) which follows the real image conditional distribution. Previous works have studied the generation of synthetic datasets using GAN or 3D models. In this work, we approach the problem from the aspect of combining subject appearance (ID) and external factor (style) conditions. These two conditions provide a direct way to control the inter-class and intra-class variations. To this end, we propose a Dual Condition Face Generator (DCFace) based on a diffusion model. Our novel Patch-wise style extractor and Time-step dependent ID loss enables DCFace to consistently produce face images of the same subject under different styles with precise control. Face recognition models trained on synthetic images from the proposed DCFace provide higher verification accuracies compared to previous works by $6.11\%$ on average in $4$ out of $5$ test datasets, LFW, CFP-FP, CPLFW, AgeDB and CALFW. Code is available at https://github.com/mk-minchul/dcface, Comment: To appear in CVPR 2023
- Published
- 2023
22. Dynamic economic load dispatch in microgrid using hybrid moth-flame optimization algorithm
- Author
-
Jain, Anil Kumar and Gidwani, Lata
- Published
- 2024
- Full Text
- View/download PDF
23. Incidence and Patterns of Drug Resistance in Patients with Spinal Tuberculosis: a Prospective, Single-Center Study from a Tuberculosis-Endemic Country
- Author
-
Yadav, Manish, Jain, Anil K., Singhal, Ritu, Chadha, Manish, Arora, Vinod Kumar, and Bhargava, Aayush
- Published
- 2023
- Full Text
- View/download PDF
24. Child PalmID: Contactless Palmprint Recognition
- Author
-
Jain, Anil K., Godbole, Akash, Bhatnagar, Anjoo, and Sudhish, Prem Sewak
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Developing and least developed countries face the dire challenge of ensuring that each child in their country receives required doses of vaccination, adequate nutrition and proper medication. International agencies such as UNICEF, WHO and WFP, among other organizations, strive to find innovative solutions to determine which child has received the benefits and which have not. Biometric recognition systems have been sought out to help solve this problem. To that end, this report establishes a baseline accuracy of a commercial contactless palmprint recognition system that may be deployed for recognizing children in the age group of one to five years old. On a database of contactless palmprint images of one thousand unique palms from 500 children, we establish SOTA authentication accuracy of 90.85% @ FAR of 0.01%, rank-1 identification accuracy of 99.0% (closed set), and FPIR=0.01 @ FNIR=0.3 for open-set identification using PalmMobile SDK from Armatura., Comment: 9 pages, 14 figures
- Published
- 2022
25. AFR-Net: Attention-Driven Fingerprint Recognition Network
- Author
-
Grosz, Steven A. and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
The use of vision transformers (ViT) in computer vision is increasing due to limited inductive biases (e.g., locality, weight sharing, etc.) and increased scalability compared to other deep learning methods. This has led to some initial studies on the use of ViT for biometric recognition, including fingerprint recognition. In this work, we improve on these initial studies for transformers in fingerprint recognition by i.) evaluating additional attention-based architectures, ii.) scaling to larger and more diverse training and evaluation datasets, and iii.) combining the complimentary representations of attention-based and CNN-based embeddings for improved state-of-the-art (SOTA) fingerprint recognition (both authentication and identification). Our combined architecture, AFR-Net (Attention-Driven Fingerprint Recognition Network), outperforms several baseline transformer and CNN-based models, including a SOTA commercial fingerprint system, Verifinger v12.3, across intra-sensor, cross-sensor, and latent to rolled fingerprint matching datasets. Additionally, we propose a realignment strategy using local embeddings extracted from intermediate feature maps within the networks to refine the global embeddings in low certainty situations, which boosts the overall recognition accuracy significantly across each of the models. This realignment strategy requires no additional training and can be applied as a wrapper to any existing deep learning network (including attention-based, CNN-based, or both) to boost its performance.
- Published
- 2022
26. Minutiae-Guided Fingerprint Embeddings via Vision Transformers
- Author
-
Grosz, Steven A., Engelsma, Joshua J., Ranjan, Rajeev, Ramakrishnan, Naveen, Aggarwal, Manoj, Medioni, Gerard G., and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Minutiae matching has long dominated the field of fingerprint recognition. However, deep networks can be used to extract fixed-length embeddings from fingerprints. To date, the few studies that have explored the use of CNN architectures to extract such embeddings have shown extreme promise. Inspired by these early works, we propose the first use of a Vision Transformer (ViT) to learn a discriminative fixed-length fingerprint embedding. We further demonstrate that by guiding the ViT to focus in on local, minutiae related features, we can boost the recognition performance. Finally, we show that by fusing embeddings learned by CNNs and ViTs we can reach near parity with a commercial state-of-the-art (SOTA) matcher. In particular, we obtain a TAR=94.23% @ FAR=0.1% on the NIST SD 302 public-domain dataset, compared to a SOTA commercial matcher which obtains TAR=96.71% @ FAR=0.1%. Additionally, our fixed-length embeddings can be matched orders of magnitude faster than the commercial system (2.5 million matches/second compared to 50K matches/second). We make our code and models publicly available to encourage further research on this topic: https://github.com/tba.
- Published
- 2022
27. Cluster and Aggregate: Face Recognition with Large Probe Set
- Author
-
Kim, Minchul, Liu, Feng, Jain, Anil, and Liu, Xiaoming
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
Feature fusion plays a crucial role in unconstrained face recognition where inputs (probes) comprise of a set of $N$ low quality images whose individual qualities vary. Advances in attention and recurrent modules have led to feature fusion that can model the relationship among the images in the input set. However, attention mechanisms cannot scale to large $N$ due to their quadratic complexity and recurrent modules suffer from input order sensitivity. We propose a two-stage feature fusion paradigm, Cluster and Aggregate, that can both scale to large $N$ and maintain the ability to perform sequential inference with order invariance. Specifically, Cluster stage is a linear assignment of $N$ inputs to $M$ global cluster centers, and Aggregation stage is a fusion over $M$ clustered features. The clustered features play an integral role when the inputs are sequential as they can serve as a summarization of past features. By leveraging the order-invariance of incremental averaging operation, we design an update rule that achieves batch-order invariance, which guarantees that the contributions of early image in the sequence do not diminish as time steps increase. Experiments on IJB-B and IJB-S benchmark datasets show the superiority of the proposed two-stage paradigm in unconstrained face recognition. Code and pretrained models are available in https://github.com/mk-minchul/caface, Comment: To appear in NeurIPS 2022
- Published
- 2022
28. Learning an Ensemble of Deep Fingerprint Representations
- Author
-
Godbole, Akash, Nandakumar, Karthik, and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Deep neural networks (DNNs) have shown incredible promise in learning fixed-length representations from fingerprints. Since the representation learning is often focused on capturing specific prior knowledge (e.g., minutiae), there is no universal representation that comprehensively encapsulates all the discriminatory information available in a fingerprint. While learning an ensemble of representations can mitigate this problem, two critical challenges need to be addressed: (i) How to extract multiple diverse representations from the same fingerprint image? and (ii) How to optimally exploit these representations during the matching process? In this work, we train multiple instances of DeepPrint (a state-of-the-art DNN-based fingerprint encoder) on different transformations of the input image to generate an ensemble of fingerprint embeddings. We also propose a feature fusion technique that distills these multiple representations into a single embedding, which faithfully captures the diversity present in the ensemble without increasing the computational complexity. The proposed approach has been comprehensively evaluated on five databases containing rolled, plain, and latent fingerprints (NIST SD4, NIST SD14, NIST SD27, NIST SD302, and FVC2004 DB2A) and statistically significant improvements in accuracy have been consistently demonstrated across a range of verification as well as closed- and open-set identification settings. The proposed approach serves as a wrapper capable of improving the accuracy of any DNN-based recognition system.
- Published
- 2022
29. Synthetic Latent Fingerprint Generator
- Author
-
Wyzykowski, Andre Brasil Vieira and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Given a full fingerprint image (rolled or slap), we present CycleGAN models to generate multiple latent impressions of the same identity as the full print. Our models can control the degree of distortion, noise, blurriness and occlusion in the generated latent print images to obtain Good, Bad and Ugly latent image categories as introduced in the NIST SD27 latent database. The contributions of our work are twofold: (i) demonstrate the similarity of synthetically generated latent fingerprint images to crime scene latents in NIST SD27 and MSP databases as evaluated by the NIST NFIQ 2 quality measure and ROC curves obtained by a SOTA fingerprint matcher, and (ii) use of synthetic latents to augment small-size latent training databases in the public domain to improve the performance of DeepPrint, a SOTA fingerprint matcher designed for rolled to rolled fingerprint matching on three latent databases (NIST SD27, NIST SD302, and IIITD-SLF). As an example, with synthetic latent data augmentation, the Rank-1 retrieval performance of DeepPrint is improved from 15.50% to 29.07% on challenging NIST SD27 latent database. Our approach for generating synthetic latent fingerprints can be used to improve the recognition performance of any latent matcher and its individual components (e.g., enhancement, segmentation and feature extraction).
- Published
- 2022
30. Multi-domain Learning for Updating Face Anti-spoofing Models
- Author
-
Guo, Xiao, Liu, Yaojie, Jain, Anil, and Liu, Xiaoming
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
In this work, we study multi-domain learning for face anti-spoofing(MD-FAS), where a pre-trained FAS model needs to be updated to perform equally well on both source and target domains while only using target domain data for updating. We present a new model for MD-FAS, which addresses the forgetting issue when learning new domain data, while possessing a high level of adaptability. First, we devise a simple yet effective module, called spoof region estimator(SRE), to identify spoof traces in the spoof image. Such spoof traces reflect the source pre-trained model's responses that help upgraded models combat catastrophic forgetting during updating. Unlike prior works that estimate spoof traces which generate multiple outputs or a low-resolution binary mask, SRE produces one single, detailed pixel-wise estimate in an unsupervised manner. Secondly, we propose a novel framework, named FAS-wrapper, which transfers knowledge from the pre-trained models and seamlessly integrates with different FAS models. Lastly, to help the community further advance MD-FAS, we construct a new benchmark based on SIW, SIW-Mv2 and Oulu-NPU, and introduce four distinct protocols for evaluation, where source and target domains are different in terms of spoof type, age, ethnicity, and illumination. Our proposed method achieves superior performance on the MD-FAS benchmark than previous methods. Our code and newly curated SIW-Mv2 are publicly available., Comment: To appear at ECCV 2022 as an oral presentation. The SiW-Mv2 dataset is detailed in the Appendix
- Published
- 2022
31. Controllable and Guided Face Synthesis for Unconstrained Face Recognition
- Author
-
Liu, Feng, Kim, Minchul, Jain, Anil, and Liu, Xiaoming
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Although significant advances have been made in face recognition (FR), FR in unconstrained environments remains challenging due to the domain gap between the semi-constrained training datasets and unconstrained testing scenarios. To address this problem, we propose a controllable face synthesis model (CFSM) that can mimic the distribution of target datasets in a style latent space. CFSM learns a linear subspace with orthogonal bases in the style latent space with precise control over the diversity and degree of synthesis. Furthermore, the pre-trained synthesis model can be guided by the FR model, making the resulting images more beneficial for FR model training. Besides, target dataset distributions are characterized by the learned orthogonal bases, which can be utilized to measure the distributional similarity among face datasets. Our approach yields significant performance gains on unconstrained benchmarks, such as IJB-B, IJB-C, TinyFace and IJB-S (+5.76% Rank1)., Comment: to be published in ECCV 2022
- Published
- 2022
32. On Demographic Bias in Fingerprint Recognition
- Author
-
Godbole, Akash, Grosz, Steven A., Nandakumar, Karthik, and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Fingerprint recognition systems have been deployed globally in numerous applications including personal devices, forensics, law enforcement, banking, and national identity systems. For these systems to be socially acceptable and trustworthy, it is critical that they perform equally well across different demographic groups. In this work, we propose a formal statistical framework to test for the existence of bias (demographic differentials) in fingerprint recognition across four major demographic groups (white male, white female, black male, and black female) for two state-of-the-art (SOTA) fingerprint matchers operating in verification and identification modes. Experiments on two different fingerprint databases (with 15,468 and 1,014 subjects) show that demographic differentials in SOTA fingerprint recognition systems decrease as the matcher accuracy increases and any small bias that may be evident is likely due to certain outlier, low-quality fingerprint images.
- Published
- 2022
33. Fingerprint Template Invertibility: Minutiae vs. Deep Templates
- Author
-
Wijewardena, Kanishka P., Grosz, Steven A., Cao, Kai, and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Much of the success of fingerprint recognition is attributed to minutiae-based fingerprint representation. It was believed that minutiae templates could not be inverted to obtain a high fidelity fingerprint image, but this assumption has been shown to be false. The success of deep learning has resulted in alternative fingerprint representations (embeddings), in the hope that they might offer better recognition accuracy as well as non-invertibility of deep network-based templates. We evaluate whether deep fingerprint templates suffer from the same reconstruction attacks as the minutiae templates. We show that while a deep template can be inverted to produce a fingerprint image that could be matched to its source image, deep templates are more resistant to reconstruction attacks than minutiae templates. In particular, reconstructed fingerprint images from minutiae templates yield a TAR of about 100.0% (98.3%) @ FAR of 0.01% for type-I (type-II) attacks using a state-of-the-art commercial fingerprint matcher, when tested on NIST SD4. The corresponding attack performance for reconstructed fingerprint images from deep templates using the same commercial matcher yields a TAR of less than 1% for both type-I and type-II attacks; however, when the reconstructed images are matched using the same deep network, they achieve a TAR of 85.95% (68.10%) for type-I (type-II) attacks. Furthermore, what is missing from previous fingerprint template inversion studies is an evaluation of the black-box attack performance, which we perform using 3 different state-of-the-art fingerprint matchers. We conclude that fingerprint images generated by inverting minutiae templates are highly susceptible to both white-box and black-box attack evaluations, while fingerprint images generated by deep templates are resistant to black-box evaluations and comparatively less susceptible to white-box evaluations.
- Published
- 2022
34. SpoofGAN: Synthetic Fingerprint Spoof Images
- Author
-
Grosz, Steven A. and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
A major limitation to advances in fingerprint spoof detection is the lack of publicly available, large-scale fingerprint spoof datasets, a problem which has been compounded by increased concerns surrounding privacy and security of biometric data. Furthermore, most state-of-the-art spoof detection algorithms rely on deep networks which perform best in the presence of a large amount of training data. This work aims to demonstrate the utility of synthetic (both live and spoof) fingerprints in supplying these algorithms with sufficient data to improve the performance of fingerprint spoof detection algorithms beyond the capabilities when training on a limited amount of publicly available real datasets. First, we provide details of our approach in modifying a state-of-the-art generative architecture to synthesize high quality live and spoof fingerprints. Then, we provide quantitative and qualitative analysis to verify the quality of our synthetic fingerprints in mimicking the distribution of real data samples. We showcase the utility of our synthetic live and spoof fingerprints in training a deep network for fingerprint spoof detection, which dramatically boosts the performance across three different evaluation datasets compared to an identical model trained on real data alone. Finally, we demonstrate that only 25% of the original (real) dataset is required to obtain similar detection performance when augmenting the training dataset with synthetic data.
- Published
- 2022
35. AdaFace: Quality Adaptive Margin for Face Recognition
- Author
-
Kim, Minchul, Jain, Anil K., and Liu, Xiaoming
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Recognition in low quality face datasets is challenging because facial attributes are obscured and degraded. Advances in margin-based loss functions have resulted in enhanced discriminability of faces in the embedding space. Further, previous studies have studied the effect of adaptive losses to assign more importance to misclassified (hard) examples. In this work, we introduce another aspect of adaptiveness in the loss function, namely the image quality. We argue that the strategy to emphasize misclassified samples should be adjusted according to their image quality. Specifically, the relative importance of easy or hard samples should be based on the sample's image quality. We propose a new loss function that emphasizes samples of different difficulties based on their image quality. Our method achieves this in the form of an adaptive margin function by approximating the image quality with feature norms. Extensive experiments show that our method, AdaFace, improves the face recognition performance over the state-of-the-art (SoTA) on four datasets (IJB-B, IJB-C, IJB-S and TinyFace). Code and models are released in https://github.com/mk-minchul/AdaFace., Comment: Published in CVPR2022 (Oral)
- Published
- 2022
36. Observation of anisotropic thermal expansion and Jahn-Teller effect in double perovskites Sr$_{2-x}$La$_x$CoNbO$_6$ using neutron diffraction
- Author
-
Kumar, Ajay, Jain, Anil, Yusuf, S. M., and Dhaka, R. S.
- Subjects
Condensed Matter - Strongly Correlated Electrons ,Condensed Matter - Materials Science - Abstract
We use temperature dependent neutron powder diffraction (NPD) to investigate the structural changes and magnetic interactions in double perovskite Sr$_{2-x}$La$_x$CoNbO$_6$ ($x=$ 0.4 and 0.6). A structural phase transition from tetragonal ($I4/m$) to monoclinic ($P2_1/n$) is observed between $x=$ 0.4 and 0.6 samples. Interestingly, temperature evolution of the unit cell parameters follow the Gr\"uneisen approximation, and the analysis suggest the isotropic thermal expansion in case of the $x=$ 0.4 sample, whereas the $x=$ 0.6 sample shows the anisotropy where the thermal expansion along the $c$-axis significantly deviates from the Gr\"uneisen function. We observe the $z$-out Jahn-Teller distortion in the CoO$_6$ and consequently $z$-in distortion in the adjacent NbO$_6$ octahedra. With increase in the La substitution, a decrease in the degree of octahedral distortion is evident from the significant reduction in the local distortion parameter $\Delta$ around the B-site atoms., Comment: submitted
- Published
- 2022
37. Insulator-to-metal-like transition in thin films of a biological metal-organic framework
- Author
-
Sindhu, Pooja, Ananthram, K. S., Jain, Anil, Tarafder, Kartick, and Ballav, Nirmalya
- Published
- 2023
- Full Text
- View/download PDF
38. Publisher Correction: Charge-transfer interface of insulating metal-organic frameworks with metallic conduction
- Author
-
Sindhu, Pooja, Ananthram, K. S., Jain, Anil, Tarafder, Kartick, and Ballav, Nirmalya
- Published
- 2023
- Full Text
- View/download PDF
39. RealGait: Gait Recognition for Person Re-Identification
- Author
-
Zhang, Shaoxiong, Wang, Yunhong, Chai, Tianrui, Li, Annan, and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Human gait is considered a unique biometric identifier which can be acquired in a covert manner at a distance. However, models trained on existing public domain gait datasets which are captured in controlled scenarios lead to drastic performance decline when applied to real-world unconstrained gait data. On the other hand, video person re-identification techniques have achieved promising performance on large-scale publicly available datasets. Given the diversity of clothing characteristics, clothing cue is not reliable for person recognition in general. So, it is actually not clear why the state-of-the-art person re-identification methods work as well as they do. In this paper, we construct a new gait dataset by extracting silhouettes from an existing video person re-identification challenge which consists of 1,404 persons walking in an unconstrained manner. Based on this dataset, a consistent and comparative study between gait recognition and person re-identification can be carried out. Given that our experimental results show that current gait recognition approaches designed under data collected in controlled scenarios are inappropriate for real surveillance scenarios, we propose a novel gait recognition method, called RealGait. Our results suggest that recognizing people by their gait in real surveillance scenarios is feasible and the underlying gait pattern is probably the true reason why video person re-idenfification works in practice.
- Published
- 2022
40. PrintsGAN: Synthetic Fingerprint Generator
- Author
-
Engelsma, Joshua J., Grosz, Steven A., and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
A major impediment to researchers working in the area of fingerprint recognition is the lack of publicly available, large-scale, fingerprint datasets. The publicly available datasets that do exist contain very few identities and impressions per finger. This limits research on a number of topics, including e.g., using deep networks to learn fixed length fingerprint embeddings. Therefore, we propose PrintsGAN, a synthetic fingerprint generator capable of generating unique fingerprints along with multiple impressions for a given fingerprint. Using PrintsGAN, we synthesize a database of 525k fingerprints (35K distinct fingers, each with 15 impressions). Next, we show the utility of the PrintsGAN generated dataset by training a deep network to extract a fixed-length embedding from a fingerprint. In particular, an embedding model trained on our synthetic fingerprints and fine-tuned on a small number of publicly available real fingerprints (25K prints from NIST SD302) obtains a TAR of 87.03% @ FAR=0.01% on the NIST SD4 database (a boost from TAR=73.37% when only trained on NIST SD302). Prevailing synthetic fingerprint generation methods do not enable such performance gains due to i) lack of realism or ii) inability to generate multiple impressions per finger. We plan to release our database of synthetic fingerprints to the public.
- Published
- 2022
41. Cervicodorsal spine tuberculosis-- surgical approach
- Author
-
Jain, Anil K., Dhammi, Ish K., Arora, Rajesh, and Gain, Amartya
- Published
- 2024
- Full Text
- View/download PDF
42. Trustworthy AI: A Computational Perspective
- Author
-
Liu, Haochen, Wang, Yiqi, Fan, Wenqi, Liu, Xiaorui, Li, Yaxin, Jain, Shaili, Liu, Yunhao, Jain, Anil K., and Tang, Jiliang
- Subjects
Computer Science - Artificial Intelligence - Abstract
In the past few decades, artificial intelligence (AI) technology has experienced swift developments, changing everyone's daily life and profoundly altering the course of human society. The intention of developing AI is to benefit humans, by reducing human labor, bringing everyday convenience to human lives, and promoting social good. However, recent research and AI applications show that AI can cause unintentional harm to humans, such as making unreliable decisions in safety-critical scenarios or undermining fairness by inadvertently discriminating against one group. Thus, trustworthy AI has attracted immense attention recently, which requires careful consideration to avoid the adverse effects that AI may bring to humans, so that humans can fully trust and live in harmony with AI technologies. Recent years have witnessed a tremendous amount of research on trustworthy AI. In this survey, we present a comprehensive survey of trustworthy AI from a computational perspective, to help readers understand the latest technologies for achieving trustworthy AI. Trustworthy AI is a large and complex area, involving various dimensions. In this work, we focus on six of the most crucial dimensions in achieving trustworthy AI: (i) Safety & Robustness, (ii) Non-discrimination & Fairness, (iii) Explainability, (iv) Privacy, (v) Accountability & Auditability, and (vi) Environmental Well-Being. For each dimension, we review the recent related technologies according to a taxonomy and summarize their applications in real-world systems. We also discuss the accordant and conflicting interactions among different dimensions and discuss potential aspects for trustworthy AI to investigate in the future., Comment: 55 pages
- Published
- 2021
43. Towards the Memorization Effect of Neural Networks in Adversarial Training
- Author
-
Xu, Han, Liu, Xiaorui, Wang, Wentao, Ding, Wenbiao, Wu, Zhongqin, Liu, Zitao, Jain, Anil, and Tang, Jiliang
- Subjects
Computer Science - Machine Learning - Abstract
Recent studies suggest that ``memorization'' is one important factor for overparameterized deep neural networks (DNNs) to achieve optimal performance. Specifically, the perfectly fitted DNNs can memorize the labels of many atypical samples, generalize their memorization to correctly classify test atypical samples and enjoy better test performance. While, DNNs which are optimized via adversarial training algorithms can also achieve perfect training performance by memorizing the labels of atypical samples, as well as the adversarially perturbed atypical samples. However, adversarially trained models always suffer from poor generalization, with both relatively low clean accuracy and robustness on the test set. In this work, we study the effect of memorization in adversarial trained DNNs and disclose two important findings: (a) Memorizing atypical samples is only effective to improve DNN's accuracy on clean atypical samples, but hardly improve their adversarial robustness and (b) Memorizing certain atypical samples will even hurt the DNN's performance on typical samples. Based on these two findings, we propose Benign Adversarial Training (BAT) which can facilitate adversarial training to avoid fitting ``harmful'' atypical samples and fit as more ``benign'' atypical samples as possible. In our experiments, we validate the effectiveness of BAT, and show it can achieve better clean accuracy vs. robustness trade-off than baseline methods, in benchmark datasets such as CIFAR100 and Tiny~ImageNet., Comment: Preprint, under submission
- Published
- 2021
44. Biometrics: Trust, but Verify
- Author
-
Jain, Anil K., Deb, Debayan, and Engelsma, Joshua J.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Over the past two decades, biometric recognition has exploded into a plethora of different applications around the globe. This proliferation can be attributed to the high levels of authentication accuracy and user convenience that biometric recognition systems afford end-users. However, in-spite of the success of biometric recognition systems, there are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems that create an element of mistrust in their use - both by the scientific community and also the public at large. Some of these problems include: i) questions related to system recognition performance, ii) security (spoof attacks, adversarial attacks, template reconstruction attacks and demographic information leakage), iii) uncertainty over the bias and fairness of the systems to all users, iv) explainability of the seemingly black-box decisions made by most recognition systems, and v) concerns over data centralization and user privacy. In this paper, we provide an overview of each of the aforementioned open-ended challenges. We survey work that has been conducted to address each of these concerns and highlight the issues requiring further attention. Finally, we provide insights into how the biometric community can address core biometric recognition systems design issues to better instill trust, fairness, and security for all., Comment: 20 pages, 15 figures
- Published
- 2021
45. FedFace: Collaborative Learning of Face Recognition Model
- Author
-
Aggarwal, Divyansh, Zhou, Jiayu, and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
DNN-based face recognition models require large centrally aggregated face datasets for training. However, due to the growing data privacy concerns and legal restrictions, accessing and sharing face datasets has become exceedingly difficult. We propose FedFace, a federated learning (FL) framework for collaborative learning of face recognition models in a privacy-aware manner. FedFace utilizes the face images available on multiple clients to learn an accurate and generalizable face recognition model where the face images stored at each client are neither shared with other clients nor the central host and each client is a mobile device containing face images pertaining to only the owner of the device (one identity per client). Our experiments show the effectiveness of FedFace in enhancing the verification performance of pre-trained face recognition system on standard face verification benchmarks namely LFW, IJB-A, and IJB-C.
- Published
- 2021
46. C2CL: Contact to Contactless Fingerprint Matching
- Author
-
Grosz, Steven A., Engelsma, Joshua J., Liu, Eryun, and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Machine Learning ,Electrical Engineering and Systems Science - Image and Video Processing - Abstract
Matching contactless fingerprints or finger photos to contact-based fingerprint impressions has received increased attention in the wake of COVID-19 due to the superior hygiene of the contactless acquisition and the widespread availability of low cost mobile phones capable of capturing photos of fingerprints with sufficient resolution for verification purposes. This paper presents an end-to-end automated system, called C2CL, comprised of a mobile finger photo capture app, preprocessing, and matching algorithms to handle the challenges inhibiting previous cross-matching methods; namely i) low ridge-valley contrast of contactless fingerprints, ii) varying roll, pitch, yaw, and distance of the finger to the camera, iii) non-linear distortion of contact-based fingerprints, and vi) different image qualities of smartphone cameras. Our preprocessing algorithm segments, enhances, scales, and unwarps contactless fingerprints, while our matching algorithm extracts both minutiae and texture representations. A sequestered dataset of 9,888 contactless 2D fingerprints and corresponding contact-based fingerprints from 206 subjects (2 thumbs and 2 index fingers for each subject) acquired using our mobile capture app is used to evaluate the cross-database performance of our proposed algorithm. Furthermore, additional experimental results on 3 publicly available datasets show substantial improvement in the state-of-the-art for contact to contactless fingerprint matching (TAR in the range of 96.67% to 98.30% at FAR=0.01%).
- Published
- 2021
47. Unified Detection of Digital and Physical Face Attacks
- Author
-
Deb, Debayan, Liu, Xiaoming, and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
State-of-the-art defense mechanisms against face attacks achieve near perfect accuracies within one of three attack categories, namely adversarial, digital manipulation, or physical spoofs, however, they fail to generalize well when tested across all three categories. Poor generalization can be attributed to learning incoherent attacks jointly. To overcome this shortcoming, we propose a unified attack detection framework, namely UniFAD, that can automatically cluster 25 coherent attack types belonging to the three categories. Using a multi-task learning framework along with k-means clustering, UniFAD learns joint representations for coherent attacks, while uncorrelated attack types are learned separately. Proposed UniFAD outperforms prevailing defense methods and their fusion with an overall TDR = 94.73% @ 0.2% FDR on a large fake face dataset consisting of 341K bona fide images and 448K attack images of 25 types across all 3 categories. Proposed method can detect an attack within 3 milliseconds on a Nvidia 2080Ti. UniFAD can also identify the attack types and categories with 75.81% and 97.37% accuracies, respectively.
- Published
- 2021
48. Sanctity of Calibrations : Vital for the Export of Indian Products
- Author
-
Jain, Anil, Zafer, Afaqul, Section editor, Agarwal, Ashutosh, Section editor, Yadav, Sanjay, Section editor, Aswal, Dinesh K., editor, Yadav, Sanjay, editor, Takatsuji, Toshiyuki, editor, Rachakonda, Prem, editor, and Kumar, Harish, editor
- Published
- 2023
- Full Text
- View/download PDF
49. Recharge and vulnerability assessment of groundwater resources in North west India: Insights from isotope-geospatial modelling approach
- Author
-
Roy, Annadasankar, Chatterjee, Sitangshu, Kumar Sinha, Uday, Kumar Jain, Anil, Mohokar, Hemant, Jaryal, Ajay, Keesari, Tirumalesh, and Jagat Pant, Harish
- Published
- 2024
- Full Text
- View/download PDF
50. FaceGuard: A Self-Supervised Defense Against Adversarial Face Images
- Author
-
Deb, Debayan, Liu, Xiaoming, and Jain, Anil K.
- Subjects
Computer Science - Computer Vision and Pattern Recognition - Abstract
Prevailing defense mechanisms against adversarial face images tend to overfit to the adversarial perturbations in the training set and fail to generalize to unseen adversarial attacks. We propose a new self-supervised adversarial defense framework, namely FaceGuard, that can automatically detect, localize, and purify a wide variety of adversarial faces without utilizing pre-computed adversarial training samples. During training, FaceGuard automatically synthesizes challenging and diverse adversarial attacks, enabling a classifier to learn to distinguish them from real faces and a purifier attempts to remove the adversarial perturbations in the image space. Experimental results on LFW dataset show that FaceGuard can achieve 99.81% detection accuracy on six unseen adversarial attack types. In addition, the proposed method can enhance the face recognition performance of ArcFace from 34.27% TAR @ 0.1% FAR under no defense to 77.46% TAR @ 0.1% FAR.
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.