sourave hossain - Profile on Academia.edu (original) (raw)

sourave hossain

Beat Signer related author profile picture

Dr. Gulshan Shrivastava related author profile picture

Roman Yampolskiy related author profile picture

Masoud Mahundi related author profile picture

Journal of Computer Science IJCSIS related author profile picture

Balaji GN related author profile picture

Annappa B related author profile picture

Annappa B

National Institute of Technology Karnataka,Surathkal

Mohamed ILeeyas related author profile picture

Ferhat Bozkurt related author profile picture

Sherif El-kassas related author profile picture

Uploads

Papers by sourave hossain

Research paper thumbnail of Reproducibility report for "On Disentangling Spoof Trace forGeneric Face Anti-Spoofing

Reproducibility report for "On Disentangling Spoof Trace forGeneric Face Anti-Spoofing

Research paper thumbnail of A-DeepPixBis: Attentional Angular Margin for Face Anti-Spoofing

A-DeepPixBis: Attentional Angular Margin for Face Anti-Spoofing

2020 Digital Image Computing: Techniques and Applications (DICTA), 2020

Face Anti Spoofing (FAS) systems are used to identify malicious spoofing attempts targeting face ... more Face Anti Spoofing (FAS) systems are used to identify malicious spoofing attempts targeting face recognition systems using mediums such as video replay or printed papers. With increasing adoption of face recognition technology as a biometric authentication method, FAS techniques are gaining in importance. From a learning perspective, such systems pose a binary classification task. When implemented with Neural Network based solutions, it is common to use the binary cross entropy (BCE) function as the loss to optimize. In this study, we propose a variant of BCE that enforces a margin in angular space and incorporate it in training the DeepPixBis model [1]. In addition, we also present a method to incorporate such a loss for attentive pixel wise supervision applicable in a fully convolutional setting. Our proposed approach achieves competitive scores in both intra and inter-dataset testing on multiple benchmark datasets, consistently outperforming vanilla DeepPixBis. Interestingly, in ...

Research paper thumbnail of Bi-FPNFAS: Bi-Directional Feature Pyramid Network for Pixel-Wise Face Anti-Spoofing by Leveraging Fourier Spectra

Sensors

The emergence of biometric-based authentication using modern sensors on electronic devices has le... more The emergence of biometric-based authentication using modern sensors on electronic devices has led to an escalated use of face recognition technologies. While these technologies may seem intriguing, they are accompanied by numerous implicit drawbacks. In this paper, we look into the problem of face anti-spoofing (FAS) on a frame level in an attempt to ameliorate the risks of face-spoofed attacks in biometric authentication processes. We employed a bi-directional feature pyramid network (BiFPN) that is used for convolutional multi-scaled feature extraction on the EfficientDet detection architecture, which is novel to the task of FAS. We further use these convolutional multi-scaled features in order to perform deep pixel-wise supervision. For all of our experiments, we performed evaluations across all major datasets and attained competitive results for the majority of the cases. Additionally, we showed that introducing an auxiliary self-supervision branch tasked with reconstructing th...

Research paper thumbnail of Reproducibility report for "On Disentangling Spoof Trace forGeneric Face Anti-Spoofing

Reproducibility report for "On Disentangling Spoof Trace forGeneric Face Anti-Spoofing

Research paper thumbnail of A-DeepPixBis: Attentional Angular Margin for Face Anti-Spoofing

A-DeepPixBis: Attentional Angular Margin for Face Anti-Spoofing

2020 Digital Image Computing: Techniques and Applications (DICTA), 2020

Face Anti Spoofing (FAS) systems are used to identify malicious spoofing attempts targeting face ... more Face Anti Spoofing (FAS) systems are used to identify malicious spoofing attempts targeting face recognition systems using mediums such as video replay or printed papers. With increasing adoption of face recognition technology as a biometric authentication method, FAS techniques are gaining in importance. From a learning perspective, such systems pose a binary classification task. When implemented with Neural Network based solutions, it is common to use the binary cross entropy (BCE) function as the loss to optimize. In this study, we propose a variant of BCE that enforces a margin in angular space and incorporate it in training the DeepPixBis model [1]. In addition, we also present a method to incorporate such a loss for attentive pixel wise supervision applicable in a fully convolutional setting. Our proposed approach achieves competitive scores in both intra and inter-dataset testing on multiple benchmark datasets, consistently outperforming vanilla DeepPixBis. Interestingly, in ...

Research paper thumbnail of Bi-FPNFAS: Bi-Directional Feature Pyramid Network for Pixel-Wise Face Anti-Spoofing by Leveraging Fourier Spectra

Sensors

The emergence of biometric-based authentication using modern sensors on electronic devices has le... more The emergence of biometric-based authentication using modern sensors on electronic devices has led to an escalated use of face recognition technologies. While these technologies may seem intriguing, they are accompanied by numerous implicit drawbacks. In this paper, we look into the problem of face anti-spoofing (FAS) on a frame level in an attempt to ameliorate the risks of face-spoofed attacks in biometric authentication processes. We employed a bi-directional feature pyramid network (BiFPN) that is used for convolutional multi-scaled feature extraction on the EfficientDet detection architecture, which is novel to the task of FAS. We further use these convolutional multi-scaled features in order to perform deep pixel-wise supervision. For all of our experiments, we performed evaluations across all major datasets and attained competitive results for the majority of the cases. Additionally, we showed that introducing an auxiliary self-supervision branch tasked with reconstructing th...

Log In