scispace - formally typeset
Search or ask a question
Author

Naman Kohli

Bio: Naman Kohli is an academic researcher from West Virginia University. The author has contributed to research in topics: Iris recognition & Facial recognition system. The author has an hindex of 14, co-authored 29 publications receiving 733 citations. Previous affiliations of Naman Kohli include Indraprastha Institute of Information Technology & Ford Motor Company.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper presents a novel lens detection algorithm that can be used to reduce the effect of contact lenses and outperforms other lens detection algorithms on the two databases and shows improved iris recognition performance.
Abstract: The presence of a contact lens, particularly a textured cosmetic lens, poses a challenge to iris recognition as it obfuscates the natural iris patterns. The main contribution of this paper is to present an in-depth analysis of the effect of contact lenses on iris recognition. Two databases, namely, the IIIT-D Iris Contact Lens database and the ND-Contact Lens database, are prepared to analyze the variations caused due to contact lenses. We also present a novel lens detection algorithm that can be used to reduce the effect of contact lenses. The proposed approach outperforms other lens detection algorithms on the two databases and shows improved iris recognition performance.

149 citations

Proceedings ArticleDOI
01 Jul 2017
TL;DR: A unique multispectral video face database for face presentation attack using latex and paper masks and it is observed that the thermal imaging spectrum is most effective in detecting face presentation attacks.
Abstract: Face recognition systems are susceptible to presentation attacks such as printed photo attacks, replay attacks, and 3D mask attacks. These attacks, primarily studied in visible spectrum, aim to obfuscate or impersonate a person's identity. This paper presents a unique multispectral video face database for face presentation attack using latex and paper masks. The proposed Multispectral Latex Mask based Video Face Presentation Attack (MLFP) database contains 1350 videos in visible, near infrared, and thermal spectrums. Since the database consists of videos of subjects without any mask as well as wearing ten different masks, the effect of identity concealment is analyzed in each spectrum using face recognition algorithms. We also present the performance of existing presentation attack detection algorithms on the proposed MLFP database. It is observed that the thermal imaging spectrum is most effective in detecting face presentation attacks.

104 citations

Proceedings ArticleDOI
04 Jun 2013
TL;DR: An in-depth analysis of the effect of contact lens on iris recognition performance is presented and the results computed using VeriEye suggest that color cosmetic lens significantly increases the false rejection at a fixed false acceptance rate.
Abstract: Over the years, iris recognition has gained importance in the biometrics applications and is being used in several large scale nationwide projects. Though iris patterns are unique, they may be affected by external factors such as illumination, camera-eye angle, and sensor interoperability. The presence of contact lens, particularly color cosmetic lens, may also pose a challenge to iris biometrics as it obfuscates the iris patterns and changes the inter and intra-class distributions. This paper presents an in-depth analysis of the effect of contact lens on iris recognition performance. We also present the IIIT-D Contact Lens Iris database with over 6500 images pertaining to 101 subjects. For each subject, images are captured without lens, transparent (prescription) lens, and color cosmetic lens (textured) using two different iris sensors. The results computed using VeriEye suggest that color cosmetic lens significantly increases the false rejection at a fixed false acceptance rate. Also, the experiments on four existing lens detection algorithms suggest that incorporating lens detection helps in maintaining the iris recognition performance. However further research is required to build sophisticated lens detection algorithm that can improve iris recognition.

96 citations

Proceedings ArticleDOI
TL;DR: Results of the third LivDet-Iris 2017 show that even with advances, printed iris attacks as well as patterned contacts lenses are still difficult for software-based systems to detect.
Abstract: Presentation attacks such as using a contact lens with a printed pattern or printouts of an iris can be utilized to bypass a biometric security system The first international iris liveness competition was launched in 2013 in order to assess the performance of presentation attack detection (PAD) algorithms, with a second competition in 2015 This paper presents results of the third competition, LivDet-Iris 2017 Three software-based approaches to Presentation Attack Detection were submitted Four datasets of live and spoof images were tested with an additional cross-sensor test New datasets and novel situations of data have resulted in this competition being of a higher difficulty than previous competitions Anonymous received the best results with a rate of rejected live samples of 336% and rate of accepted spoof samples of 1471% The results show that even with advances, printed iris attacks as well as patterned contacts lenses are still difficult for software-based systems to detect Printed iris images were easier to be differentiated from live images in comparison to patterned contact lenses as was also seen in previous competitions

92 citations

Journal ArticleDOI
TL;DR: In this paper, a hierarchical kinship verification via representation learning (KVRL) framework is utilized to learn the representation of different face regions in an unsupervised manner, and a compact representation of facial images of kin is extracted as an output from the learned model and a multi-layer neural network is employed to verify the kin accurately.
Abstract: Kinship verification has a number of applications such as organizing large collections of images and recognizing resemblances among humans. In this paper, first, a human study is conducted to understand the capabilities of human mind and to identify the discriminatory areas of a face that facilitate kinship-cues. The visual stimuli presented to the participants determine their ability to recognize kin relationship using the whole face as well as specific facial regions. The effect of participant gender and age and kin-relation pair of the stimulus is analyzed using quantitative measures such as accuracy, discriminability index $d'$ , and perceptual information entropy. Utilizing the information obtained from the human study, a hierarchical kinship verification via representation learning (KVRL) framework is utilized to learn the representation of different face regions in an unsupervised manner. We propose a novel approach for feature representation termed as filtered contractive deep belief networks ( fc DBN). The proposed feature representation encodes relational information present in images using filters and contractive regularization penalty. A compact representation of facial images of kin is extracted as an output from the learned model and a multi-layer neural network is utilized to verify the kin accurately. A new WVU kinship database is created, which consists of multiple images per subject to facilitate kinship verification. The results show that the proposed deep learning framework (KVRL- fc DBN) yields the state-of-the-art kinship verification accuracy on the WVU kinship database and on four existing benchmark data sets. Furthermore, kinship information is used as a soft biometric modality to boost the performance of face verification via product of likelihood ratio and support vector machine based approaches. Using the proposed KVRL- fc DBN framework, an improvement of over 20% is observed in the performance of face verification.

81 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comprehensive review of the recent developments on deep face recognition can be found in this paper, covering broad topics on algorithm designs, databases, protocols, and application scenes, as well as the technical challenges and several promising directions.

353 citations

Journal ArticleDOI
TL;DR: This work assumes a very limited knowledge about biometric spoofing at the sensor to derive outstanding spoofing detection systems for iris, face, and fingerprint modalities based on two deep learning approaches based on convolutional networks.
Abstract: Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, and global security. However, these systems might be deceived (or spoofed) and, despite the recent advances in spoofing detection, current solutions often rely on domain knowledge, specific biometric reading systems, and attack types. We assume a very limited knowledge about biometric spoofing at the sensor to derive outstanding spoofing detection systems for iris, face, and fingerprint modalities based on two deep learning approaches. The first approach consists of learning suitable convolutional network architectures for each domain, whereas the second approach focuses on learning the weights of the network via back propagation. We consider nine biometric spoofing benchmarks—each one containing real and fake samples of a given biometric modality and attack type—and learn deep representations for each benchmark by combining and contrasting the two learning approaches. This strategy not only provides better comprehension of how these approaches interplay, but also creates systems that exceed the best known results in eight out of the nine benchmarks. The results strongly indicate that spoofing detection systems based on convolutional networks can be robust to attacks already known and possibly adapted, with little effort, to image-based attacks that are yet to come.

353 citations

Journal ArticleDOI
TL;DR: In this paper, the authors proposed two deep learning approaches for spoofing detection of iris, face, and fingerprint modalities based on a very limited knowledge about biometric spoofing at the sensor.
Abstract: Biometrics systems have significantly improved person identification and authentication, playing an important role in personal, national, and global security. However, these systems might be deceived (or "spoofed") and, despite the recent advances in spoofing detection, current solutions often rely on domain knowledge, specific biometric reading systems, and attack types. We assume a very limited knowledge about biometric spoofing at the sensor to derive outstanding spoofing detection systems for iris, face, and fingerprint modalities based on two deep learning approaches. The first approach consists of learning suitable convolutional network architectures for each domain, while the second approach focuses on learning the weights of the network via back-propagation. We consider nine biometric spoofing benchmarks --- each one containing real and fake samples of a given biometric modality and attack type --- and learn deep representations for each benchmark by combining and contrasting the two learning approaches. This strategy not only provides better comprehension of how these approaches interplay, but also creates systems that exceed the best known results in eight out of the nine benchmarks. The results strongly indicate that spoofing detection systems based on convolutional networks can be robust to attacks already known and possibly adapted, with little effort, to image-based attacks that are yet to come.

325 citations

Journal ArticleDOI
TL;DR: A discriminative deep multi-metric learning method to jointly learn multiple neural networks, under which the correlation of different features of each sample is maximized, and the distance of each positive pair is reduced and that of each negative pair is enlarged.
Abstract: This paper presents a new discriminative deep metric learning (DDML) method for face and kinship verification in wild conditions. While metric learning has achieved reasonably good performance in face and kinship verification, most existing metric learning methods aim to learn a single Mahalanobis distance metric to maximize the inter-class variations and minimize the intra-class variations, which cannot capture the nonlinear manifold where face images usually lie on. To address this, we propose a DDML method to train a deep neural network to learn a set of hierarchical nonlinear transformations to project face pairs into the same latent feature space, under which the distance of each positive pair is reduced and that of each negative pair is enlarged. To better use the commonality of multiple feature descriptors to make all the features more robust for face and kinship verification, we develop a discriminative deep multi-metric learning method to jointly learn multiple neural networks, under which the correlation of different features of each sample is maximized, and the distance of each positive pair is reduced and that of each negative pair is enlarged. Extensive experimental results show that our proposed methods achieve the acceptable results in both face and kinship verification.

264 citations