default search action
Sushma Venkatesh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Ayush Agarwal, Raghavendra Ramachandra, Sushma Venkatesh, S. R. Mahadeva Prasanna:
Biometrics in extended reality: a review. Discov. Artif. Intell. 4(1): 81 (2024) - [c36]Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, Rajendra S. Gad:
VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection. FG 2024: 1-9 - [c35]Raghavendra Ramachandra, Sushma Venkatesh:
Fingervein Verification using Convolutional Multi-Head Attention Network. WACV 2024: 6163-6172 - [c34]Raghavendra Ramachandra, Sushma Venkatesh, Naser Damer, Narayan Vetrekar, Rajendra S. Gad:
Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study. WACV 2024: 6173-6181 - [i19]Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, Rajendra S. Gad:
VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection. CoRR abs/2404.12680 (2024) - [i18]Aravinda Reddy P. N, Raghavendra Ramachandra, Sushma Venkatesh, Krothapalli Sreenivasa Rao, Pabitra Mitra, Rakesh Krishna:
MorCode: Face Morphing Attack Generation using Generative Codebooks. CoRR abs/2410.07625 (2024) - 2023
- [c33]Jag Mohan Singh, Sushma Venkatesh, Raghavendra Ramachandra:
Robust Face Morphing Attack Detection Using Fusion of Multiple Features and Classification Techniques. FUSION 2023: 1-8 - [c32]Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh:
Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes. IJCB 2023: 1-9 - [c31]Raghavendra Ramachandra, Sushma Venkatesh, Gaurav Jaswal, Guoqiang Li:
Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins. IWBF 2023: 1-6 - [i17]Raghavendra Ramachandra, Sushma Venkatesh, Gaurav Jaswal, Guoqiang Li:
Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins. CoRR abs/2303.14004 (2023) - [i16]Raghavendra Ramachandra, Sushma Venkatesh, Naser Damer, Narayan Vetrekar, Rajendra S. Gad:
Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study. CoRR abs/2304.03510 (2023) - [i15]Raghavendra Ramachandra, Sushma Venkatesh, Guoqiang Li, Kiran B. Raja:
Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network. CoRR abs/2305.01294 (2023) - [i14]Jag Mohan Singh, Sushma Venkatesh, Raghavendra Ramachandra:
Robust Face Morphing Attack Detection Using Fusion of Multiple Features and Classification Techniques. CoRR abs/2305.03264 (2023) - [i13]Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh:
Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes. CoRR abs/2309.13704 (2023) - [i12]Raghavendra Ramachandra, Sushma Venkatesh:
Fingervein Verification using Convolutional Multi-Head Attention Network. CoRR abs/2310.16808 (2023) - [i11]Narayan Vetrekar, Raghavendra Ramachandra, Sushma Venkatesh, Jyoti D. Pawar, Rajendra S. Gad:
Does complimentary information from multispectral imaging improve face presentation attack detection? CoRR abs/2311.11566 (2023) - 2022
- [j6]Kiran B. Raja, Gourav Gupta, Sushma Venkatesh, Raghavendra Ramachandra, Christoph Busch:
Towards generalized morphing attack detection by learning residuals. Image Vis. Comput. 126: 104535 (2022) - [c30]Sushma Venkatesh:
Multi-spectral Finger based User Verification using Off-the-Shelf Deep Features. IST 2022: 1-6 - [i10]Sankini Rancha Godage, Frøy Løvåsdal, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch:
Analyzing Human Observer Ability in Morphing Attack Detection - Where Do We Stand? CoRR abs/2202.12426 (2022) - 2021
- [j5]Le Qin, Fei Peng, Sushma Venkatesh, Raghavendra Ramachandra, Min Long, Christoph Busch:
Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation. IEEE Trans. Biom. Behav. Identity Sci. 3(1): 72-88 (2021) - [j4]Haoyu Zhang, Sushma Venkatesh, Raghavendra Ramachandra, Kiran Bylappa Raja, Naser Damer, Christoph Busch:
MIPGAN - Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN. IEEE Trans. Biom. Behav. Identity Sci. 3(3): 365-383 (2021) - [j3]Kiran B. Raja, Matteo Ferrara, Annalisa Franco, Luuk J. Spreeuwers, Ilias Batskos, Florens de Wit, Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond N. J. Veldhuis, Davide Maltoni, Christoph Busch:
Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking. IEEE Trans. Inf. Forensics Secur. 16: 4336-4351 (2021) - [c29]Sushma Venkatesh, Raghavendra Ramachandra, Kiran B. Raja:
Face Morphing of Newborns Can Be Threatening Too : Preliminary Study on Vulnerability and Detection. IJCB 2021: 1-8 - [c28]Naser Damer, Kiran B. Raja, Marius Süßmilch, Sushma Venkatesh, Fadi Boutros, Meiling Fang, Florian Kirchbuchner, Raghavendra Ramachandra, Arjan Kuijper:
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation. ISVC (1) 2021: 251-264 - [i9]Naser Damer, Kiran B. Raja, Marius Süßmilch, Sushma Venkatesh, Fadi Boutros, Meiling Fang, Florian Kirchbuchner, Raghavendra Ramachandra, Arjan Kuijper:
ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation. CoRR abs/2108.09130 (2021) - 2020
- [c27]Sushma Venkatesh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch:
Single Image Face Morphing Attack Detection Using Ensemble of Features. FUSION 2020: 1-6 - [c26]Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch:
On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection. IJCB 2020: 1-10 - [c25]Raghavendra Ramachandra, Sushma Venkatesh, Kiran B. Raja, Christoph Busch:
Handwritten Signature and Text based User Verification using Smartwatch. ICPR 2020: 5099-5106 - [c24]Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran B. Raja, Naser Damer, Christoph Busch:
Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection. IWBF 2020: 1-6 - [c23]Sushma Venkatesh, Raghavendra Ramachandra, Kiran B. Raja, Luuk J. Spreeuwers, Raymond N. J. Veldhuis, Christoph Busch:
Detecting Morphed Face Attacks Using Residual Noise from Deep Multi-scale Context Aggregation Network. WACV 2020: 269-278 - [i8]Kiran B. Raja, Ramachandra Raghavendra, Sushma Venkatesh, Christoph Busch:
Morton Filters for Superior Template Protection for Iris Recognition. CoRR abs/2001.05290 (2020) - [i7]Kiran B. Raja, Matteo Ferrara, Annalisa Franco, Luuk J. Spreeuwers, Ilias Batskos, Florens de Wit, Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond N. J. Veldhuis, Davide Maltoni, Christoph Busch:
Morphing Attack Detection - Database, Evaluation Platform and Benchmarking. CoRR abs/2006.06458 (2020) - [i6]Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch:
On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection. CoRR abs/2007.02684 (2020) - [i5]Sushma Venkatesh, Haoyu Zhang, Raghavendra Ramachandra, Kiran B. Raja, Naser Damer, Christoph Busch:
Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection. CoRR abs/2007.03621 (2020) - [i4]Haoyu Zhang, Sushma Venkatesh, Raghavendra Ramachandra, Kiran B. Raja, Naser Damer, Christoph Busch:
MIPGAN - Generating Robust and High Quality Morph Attacks Using Identity Prior Driven GAN. CoRR abs/2009.01729 (2020) - [i3]Sushma Venkatesh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch:
Face Morphing Attack Generation & Detection: A Comprehensive Survey. CoRR abs/2011.02045 (2020)
2010 – 2019
- 2019
- [c22]Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Christoph Busch:
Face Presentation Attack Detection Using Multi-classifier Fusion of Off-the-Shelf Deep Features. CVIP (2) 2019: 49-61 - [c21]Sushma Venkatesh, Raghavendra Ramachandra, Patrick Bours:
Video Based Deception Detection Using Deep Recurrent Convolutional Neural Network. CVIP (2) 2019: 163-169 - [c20]Sushma Venkatesh, Raghavendra Ramachandra, Kiran B. Raja, Luuk J. Spreeuwers, Raymond N. J. Veldhuis, Christoph Busch:
Morphed Face Detection Based on Deep Color Residual Noise. IPTA 2019: 1-6 - [c19]Raghavendra Ramachandra, Sushma Venkatesh, Kiran B. Raja, Christoph Busch:
Towards making Morphing Attack Detection robust using hybrid Scale-Space Colour Texture Features. ISBA 2019: 1-8 - [c18]Raghavendra Ramachandra, Sushma Venkatesh, Kiran B. Raja, Sushil Bhattacharjee, Pankaj Wasnik, Sébastien Marcel, Christoph Busch:
Custom silicone Face Masks: Vulnerability of Commercial Face Recognition Systems & Presentation Attack Detection. IWBF 2019: 1-6 - [c17]Sushma Venkatesh, Ramachandra Raghavendra, Patrick Bours:
Robust Algorithm for Multimodal Deception Detection. MIPR 2019: 534-537 - [c16]Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch:
Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition. SITIS 2019: 8-14 - [c15]Narayan Vetrekar, Raghavendra Ramachandra, Kiran B. Raja, Sushma Venkatesh, Rajendra S. Gad, Christoph Busch:
Visible to Band Gender Classification: An Extensive Experimental Evaluation Based on Multi-spectral Imaging. SITIS 2019: 120-127 - [c14]Sushma Venkatesh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch:
A New Multi-spectral Iris Acquisition Sensor for Biometric Verification and Presentation Attack Detection. WACV Workshops 2019: 47-54 - [p1]Kiran B. Raja, Ramachandra Raghavendra, Sushma Venkatesh, Marta Gomez-Barrero, Christian Rathgeb, Christoph Busch:
A Study of Hand-Crafted and Naturally Learned Features for Fingerprint Presentation Attack Detection. Handbook of Biometric Anti-Spoofing, 2nd Ed. 2019: 33-48 - [i2]Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch:
Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition. CoRR abs/1912.01408 (2019) - [i1]Raghavendra Ramachandra, Martin Stokkenes, Amir Mohammadi, Sushma Venkatesh, Kiran B. Raja, Pankaj Wasnik, Eric Poiret, Sébastien Marcel, Christoph Busch:
Smartphone Multi-modal Biometric Authentication: Database and Evaluation. CoRR abs/1912.02487 (2019) - 2018
- [j2]Ramachandra Raghavendra, Kiran B. Raja, Sushma Venkatesh, Christoph Busch:
Improved ear verification after surgery - An approach based on collaborative representation of locally competitive features. Pattern Recognit. 83: 416-429 (2018) - [c13]Raghavendra Ramachandra, Sushma Venkatesh, Kiran B. Raja, Christoph Busch:
Detecting Face Morphing Attacks with Collaborative Representation of Steerable Features. CVIP (1) 2018: 255-265 - [c12]Ramachandra Raghavendra, Sushma Venkatesh, Kiran B. Raja, Pankaj Shivdayal Wasnik, Martin Stokkenes, Christoph Busch:
Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection. FUSION 2018: 2107-2112 - [c11]Ramachandra Raghavendra, Kiran B. Raja, Sushma Venkatesh, Sneha Hegde, Shreedhar D. Dandappanavar, Christoph Busch:
Verifying the Newborns without Infection Risks Using Contactless Palmprints. ICB 2018: 209-216 - [c10]Ramachandra Raghavendra, Sushma Venkatesh, Kiran B. Raja, Christoph Busch:
A low-cost Multi-Fingervein Verification System. IST 2018: 1-6 - [c9]Ramachandra Raghavendra, Sushma Venkatesh, Kiran B. Raja, Christoph Busch:
Transgender face recognition with off-the-shelf pre-trained CNNs: A comprehensive study. IWBF 2018: 1-5 - 2017
- [j1]Kiran B. Raja, Ramachandra Raghavendra, Sushma Venkatesh, Christoph Busch:
Multi-patch deep sparse histograms for iris recognition in visible spectrum using collaborative subspace for robust verification. Pattern Recognit. Lett. 91: 27-36 (2017) - [c8]Ramachandra Raghavendra, Kiran B. Raja, Sushma Venkatesh, Christoph Busch:
Face Presentation Attack Detection by Exploring Spectral Signatures. CVPR Workshops 2017: 672-679 - [c7]Ramachandra Raghavendra, Kiran B. Raja, Sushma Venkatesh, Christoph Busch:
Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images. CVPR Workshops 2017: 1822-1830 - [c6]Ramachandra Raghavendra, Kiran B. Raja, Sushma Venkatesh, Christoph Busch:
Extended multispectral face presentation attack detection: An approach based on fusing information from individual spectral bands. FUSION 2017: 1-6 - [c5]Ramachandra Raghavendra, Kiran B. Raja, Sushma Venkatesh, Christoph Busch:
Face morphing versus face averaging: Vulnerability and detection. IJCB 2017: 555-563 - [c4]Ramachandra Raghavendra, Kiran B. Raja, Sushma Venkatesh, Faouzi Alaya Cheikh, Christoph Busch:
On the vulnerability of extended Multispectral face recognition systems towards presentation attacks. ISBA 2017: 1-8 - [c3]Ramachandra Raghavendra, Sushma Venkatesh, Kiran B. Raja, Christoph Busch:
Transferable deep convolutional neural network features for fingervein presentation attack detection. IWBF 2017: 1-5 - [c2]Ramachandra Raghavendra, Kiran B. Raja, Sushma Venkatesh, Christoph Busch:
Collaborative Representation of Statistically Independent Filters' Response: An Application to Face Recognition Under Illicit Drug Abuse Alterations. SCIA (2) 2017: 448-458 - 2016
- [c1]Ramachandra Raghavendra, Sushma Venkatesh, Kiran B. Raja, Faouzi Alaya Cheikh, Christoph Busch:
Mutual Information Based Multispectral Image Fusion for Improved Face Recognition. SITIS 2016: 62-68
Coauthor Index
aka: Raghavendra Ramachandra
aka: Kiran Bylappa Raja
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 01:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint