Learn More
The presence of a contact lens, particularly a textured cosmetic lens, poses a challenge to iris recognition as it obfuscates the natural iris patterns. The main contribution of this paper is to present an in-depth analysis of the effect of contact lenses on iris recognition. Two databases, namely, the IIIT-D Iris Contact Lens database and the ND-Contact(More)
Establishing kinship using images can be utilized as context information in different applications including face recognition. However, the process of automatically detecting kinship in facial images is a challenging and relatively less explored task. The reason for this includes limited availability of datasets as well as the inherent variations amongst(More)
A 22-year-old man presented to a rural hospital in Australia with right-sided pleuritic chest pain, right shoulder pain and dyspnoea. The patient had been receiving chronic asthma therapy without improvement. CT of the chest was performed after an abnormal X-ray, incidentally revealing one of the largest documented right-sided diaphragmatic hernias, with(More)
Kinship verification has a number of applications such as organizing large collections of images and recognizing resemblances among humans. In this paper, first, a human study is conducted to understand the capabilities of human mind and to identify the discriminatory areas of a face that facilitate kinshipcues. The visual stimuli presented to the(More)
Over the years, significant research has been undertaken to improve the performance of face recognition in the presence of covariates such as variations in pose, illumination, expressions, aging, and use of disguises. This paper highlights the effect of illicit drug abuse on facial features. An Illicit Drug Abuse Face (IDAF) database of 105 subjects has(More)
Human iris is considered a reliable and accurate modality for biometric recognition due to its unique texture information. However, similar to other biometric modalities, iris recognition systems are also vulnerable to presentation attacks (commonly called spoofing) that attempt to conceal or impersonate identity. Examples of typical iris spoofing attacks(More)
This paper focuses on decoding the process of face verification in the human brain using fMRI responses. 2400 fMRI responses are collected from different participants while they perform face verification on genuine and imposter stimuli face pairs. The first part of the paper analyzes the responses covering both cognitive and fMRI neuro-imaging results. With(More)