scispace - formally typeset
Search or ask a question
Author

Nalini K. Ratha

Bio: Nalini K. Ratha is an academic researcher from IBM. The author has contributed to research in topics: Biometrics & Fingerprint recognition. The author has an hindex of 50, co-authored 216 publications receiving 12290 citations. Previous affiliations of Nalini K. Ratha include Michigan State University & University at Buffalo.


Papers
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: This chapter categorize, illustrate, and analyze different domain adaptation based machine learning algorithms for visual understanding that cater to specific scenarios where the classifiers are updated for inclusivity and generalizability.
Abstract: Advances in visual understanding in the last two decades have been aided by exemplary progress in machine learning and deep learning methods. One of the principal issues of modern classifiers is generalization toward unseen testing data which may have a distribution different to that of the training set. Further, classifiers need to be adapted to scenarios where training data is made available online. Domain adaptation based machine learning algorithms cater to these specific scenarios where the classifiers are updated for inclusivity and generalizability. Such methods need to encompass the covariate shift so that the trained model gives appreciable performance on the testing data. In this chapter, we categorize, illustrate, and analyze different domain adaptation based machine learning algorithms for visual understanding.

8 citations

Journal ArticleDOI
TL;DR: DAMAD as mentioned in this paper is a generalized perturbation detection algorithm which is agnostic to model architecture, training data set, and loss function used during training, which is based on the fusion of autoencoder embedding and statistical texture features extracted from convolutional neural networks.
Abstract: Adversarial perturbations have demonstrated the vulnerabilities of deep learning algorithms to adversarial attacks. Existing adversary detection algorithms attempt to detect the singularities; however, they are in general, loss-function, database, or model dependent. To mitigate this limitation, we propose DAMAD--a generalized perturbation detection algorithm which is agnostic to model architecture, training data set, and loss function used during training. The proposed adversarial perturbation detection algorithm is based on the fusion of autoencoder embedding and statistical texture features extracted from convolutional neural networks. The performance of DAMAD is evaluated on the challenging scenarios of cross-database, cross-attack, and cross-architecture training and testing along with traditional evaluation of testing on the same database with known attack and model. Comparison with state-of-the-art perturbation detection algorithms showcase the effectiveness of the proposed algorithm on six databases: ImageNet, CIFAR-10, Multi-PIE, MEDS, point and shoot challenge (PaSC), and MNIST. Performance evaluation with nearly a quarter of a million adversarial and original images and comparison with recent algorithms show the effectiveness of the proposed algorithm.

8 citations

Patent
28 Aug 2015
TL;DR: In this paper, an inherent supervision summarization device is used to collect group-level supervision and instance level supervision within a same chunklet based on a user input of face images for a person.
Abstract: A face clustering system for video face clustering in a video sequence, the system including an inherent supervision summarization device configured to collect group-level supervision and instance level supervision within a same chunklet based on a user input of face images for a person, a discriminative projection learning device configured to embed group constraints of the group-level supervision into a transformed space, and configured to generate an embedding space from the original image feature space, and a clustering device, in the embedding space, configured to execute pair-wise based clustering to cluster the video images into different clusters with the instance level supervision collected by the inherent supervision summarization device.

7 citations

Patent
17 Apr 2016
TL;DR: In this article, an anonymized biometric representation of a target individual is used in a computer based security system and a detailed input biometric signal associated with the target individual was obtained.
Abstract: An anonymized biometric representation of a target individual is used in a computer based security system. A detailed input biometric signal associated with a target individual is obtained. A weakened biometric representation of the detailed biometric signal is constructed such that the weakened biometric representation is designed to identify a plurality of individuals including the target individual. The target individual is enrolled in a data store associated with the computer based security system wherein the weakened biometric representation is included in a record for the target individual. In another aspect of the invention, a detailed input biometric signal from a screening candidate individual is obtained. The detailed biometric signal of the screening candidate is matched against the weakened biometric representation included in the record for the target individual.

7 citations

Patent
10 Dec 2015
TL;DR: In this paper, the authors proposed a method of analyzing an image of a user to determine whether the image is authentic, where a first image of the user's face is received with a camera.
Abstract: An embodiment of the invention provides a method of analyzing an image of a user to determine whether the image is authentic, where a first image of a user's face is received with a camera. Four or more two-dimensional feature points can be located that do not lie on the same two-dimensional plane. Additional images of the user's face can be received; and, the at least four two-dimensional feature points can be located on each additional image with the image processor. The image processor can identify displacements between the two-dimensional feature points on the additional image and the two-dimensional feature points on the first image for each additional image. A processor can determine whether the displacements conform to a three-dimensional surface model. The processor can determine whether to authenticate the user based on the determination of whether the displacements conform to the three-dimensional surface model.

7 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: An overview of pattern clustering methods from a statistical pattern recognition perspective is presented, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners.
Abstract: Clustering is the unsupervised classification of patterns (observations, data items, or feature vectors) into groups (clusters). The clustering problem has been addressed in many contexts and by researchers in many disciplines; this reflects its broad appeal and usefulness as one of the steps in exploratory data analysis. However, clustering is a difficult problem combinatorially, and differences in assumptions and contexts in different communities has made the transfer of useful generic concepts and methodologies slow to occur. This paper presents an overview of pattern clustering methods from a statistical pattern recognition perspective, with a goal of providing useful advice and references to fundamental concepts accessible to the broad community of clustering practitioners. We present a taxonomy of clustering techniques, and identify cross-cutting themes and recent advances. We also describe some important applications of clustering algorithms such as image segmentation, object recognition, and information retrieval.

14,054 citations

Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

Journal ArticleDOI
TL;DR: A fast fingerprint enhancement algorithm is presented, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency.
Abstract: In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and the verification accuracy.

2,212 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Reference EntryDOI
15 Oct 2004

2,118 citations