Kiran Raja
Cited by
Cited by
Transferable deep-cnn features for detecting digital and print-scanned morphed face images
K Raja, S Venkatesh, RB Christoph Busch
Proceedings of the IEEE conference on computer vision and pattern …, 2017
Presentation attack detection for face recognition using light field camera
R Raghavendra, KB Raja, C Busch
IEEE Transactions on Image Processing 24 (3), 1060-1075, 2015
Smartphone based visible iris recognition using deep sparse filtering
KB Raja, R Raghavendra, VK Vemuri, C Busch
Pattern Recognition Letters 57, 33-42, 2015
Face presentation attack detection across spectrum using time-frequency descriptors of maximal response in laplacian scale-space
R Raghavendra, KB Raja, S Marcel, C Busch
2016 Sixth International Conference on Image Processing Theory, Tools and …, 2016
Detecting morphed face images
R Raghavendra, KB Raja, C Busch
2016 IEEE 8th International Conference on Biometrics Theory, Applications …, 2016
On the vulnerability of face recognition systems towards morphed face attacks
U Scherhag, R Raghavendra, KB Raja, M Gomez-Barrero, C Rathgeb, ...
2017 5th international workshop on biometrics and forensics (IWBF), 1-6, 2017
Fake face detection methods: Can they be generalized?
A Khodabakhsh, R Ramachandra, K Raja, P Wasnik, C Busch
2018 international conference of the biometrics special interest group …, 2018
Face morphing versus face averaging: Vulnerability and detection
R Raghavendra, KB Raja, S Venkatesh, C Busch
2017 IEEE International Joint Conference on Biometrics (IJCB), 555-563, 2017
Face morphing attack generation and detection: A comprehensive survey
S Venkatesh, R Ramachandra, K Raja, C Busch
IEEE transactions on technology and society 2 (3), 128-145, 2021
Multi-modal authentication system for smartphones using face, iris and periocular
KB Raja, R Raghavendra, M Stokkenes, C Busch
2015 International Conference on Biometrics (ICB), 143-150, 2015
Mipgan—generating strong and high quality morphing attacks using identity prior driven gan
H Zhang, S Venkatesh, R Ramachandra, K Raja, N Damer, C Busch
IEEE Transactions on Biometrics, Behavior, and Identity Science 3 (3), 365-383, 2021
Can GAN generated morphs threaten face recognition systems equally as landmark based morphs?-vulnerability and detection
S Venkatesh, H Zhang, R Ramachandra, K Raja, N Damer, C Busch
2020 8th International Workshop on Biometrics and Forensics (IWBF), 1-6, 2020
Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
K Raja, M Ferrara, A Franco, L Spreeuwers, I Batskos, ...
IEEE Transactions on Information Forensics and Security 16 (2020), 4336 - 4351, 2020
Contlensnet: Robust iris contact lens detection using deep convolutional neural networks
R Raghavendra, KB Raja, C Busch
2017 IEEE Winter Conference on Applications of Computer Vision (WACV), 1160-1167, 2017
Video presentation attack detection in visible spectrum iris recognition using magnified phase information
KB Raja, R Raghavendra, C Busch
IEEE Transactions on Information Forensics and Security 10 (10), 2048-2056, 2015
A low-cost multimodal biometric sensor to capture finger vein and fingerprint
R Raghavendra, KB Raja, J Surbiryala, C Busch
IEEE International joint conference on biometrics, 1-7, 2014
MFR 2021: Masked face recognition competition
F Boutros, N Damer, JN Kolf, K Raja, F Kirchbuchner, R Ramachandra, ...
2021 IEEE International joint conference on biometrics (IJCB), 1-10, 2021
Towards making morphing attack detection robust using hybrid scale-space colour texture features
R Ramachandra, S Venkatesh, K Raja, C Busch
2019 IEEE 5th International Conference on Identity, Security, and Behavior …, 2019
Cross-eyed-cross-spectral iris/periocular recognition database and competition
A Sequeira, L Chen, P Wild, J Ferryman, F Alonso-Fernandez, KB Raja, ...
2016 International Conference of the Biometrics Special Interest Group …, 2016
Combining Iris and Periocular Recognition using Light Field Camera
R Raghavendra, KB Raja, B Yang, C Busch
2nd IAPR Asian Conference on Pattern Recognition (ACPR2013), 2013
The system can't perform the operation now. Try again later.
Articles 1–20