Diffusion models have been successfully applied to many inverse problems, including MRI and CT reconstruction. Researchers typically re-purpose models originally designed for unconditional sampling without modificatio...
详细信息
Face recognition (FR) systems are vulnerable to morphing attacks, which refer to face images created by morphing the facial features of two different identities into one face image to create an image that can match bo...
详细信息
Our skin is the hefty organ that envelops and shields body. It prevents us from numerous fatal and non fatal diseases. It is observed that due to bacteria or other causes of infection, skin faces certain minor or life...
详细信息
Data-driven storytelling has grown significantly, becoming prevalent in various fields, including healthcare. In medical narratives, characters are crucial for engaging audiences, making complex medical information ac...
详细信息
With the continuous advancement of generative models, face morphing attacks have become a significant challenge for existing face verification systems due to their potential use in identity fraud and other malicious a...
详细信息
Face recognition (FR) systems are vulnerable to morphing attacks, which refer to face images created by morphing the facial features of two different identities into one face image to create an image that can match bo...
详细信息
ISBN:
(数字)9798331536626
ISBN:
(纸本)9798331536633
Face recognition (FR) systems are vulnerable to morphing attacks, which refer to face images created by morphing the facial features of two different identities into one face image to create an image that can match both identities, allowing serious security breaches. In this work, we apply a frequency-based explanation method from the area of explainable face recognition to shine a light on how FR models behave when processing a bona fide or attack pair from a frequency perspective. In extensive experiments, we used two different state-of-the-art FR models and six different morphing attacks to investigate possible differences in behavior. Our results show that FR models rely differently on different frequency bands when making decisions for bona fide pairs and morphing attacks. In the following step, we show that this behavioral difference can be used to detect morphing attacks in an unsupervised setup solely based on the observed frequency-importance differences in a generalizable manner.
This paper presents a novel approach for head tracking in augmented reality (AR) flight simulators using an adaptive fusion of Kalman and particle filters. This fusion dynamically balances the strengths of both algori...
详细信息
Diffusion model have been successfully applied to many inverse problems, including MRI and CT reconstruction. Researchers typically re-purpose models originally designed for unconditional sampling without modification...
详细信息
Bilateral filtering for point cloud denoising relies on the normal of the points. However, normals are not inherent attributes of point clouds but are estimated using algorithms such as principal component analysis (P...
详细信息
暂无评论