Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daksha Yadav is active.

Publication


Featured researches published by Daksha Yadav.


IEEE Transactions on Information Forensics and Security | 2014

Unraveling the Effect of Textured Contact Lenses on Iris Recognition

Daksha Yadav; Naman Kohli; James S. Doyle; Richa Singh; Mayank Vatsa; Kevin W. Bowyer

The presence of a contact lens, particularly a textured cosmetic lens, poses a challenge to iris recognition as it obfuscates the natural iris patterns. The main contribution of this paper is to present an in-depth analysis of the effect of contact lenses on iris recognition. Two databases, namely, the IIIT-D Iris Contact Lens database and the ND-Contact Lens database, are prepared to analyze the variations caused due to contact lenses. We also present a novel lens detection algorithm that can be used to reduce the effect of contact lenses. The proposed approach outperforms other lens detection algorithms on the two databases and shows improved iris recognition performance.


international conference on biometrics | 2013

Revisiting iris recognition with color cosmetic contact lenses

Naman Kohli; Daksha Yadav; Mayank Vatsa; Richa Singh

Over the years, iris recognition has gained importance in the biometrics applications and is being used in several large scale nationwide projects. Though iris patterns are unique, they may be affected by external factors such as illumination, camera-eye angle, and sensor interoperability. The presence of contact lens, particularly color cosmetic lens, may also pose a challenge to iris biometrics as it obfuscates the iris patterns and changes the inter and intra-class distributions. This paper presents an in-depth analysis of the effect of contact lens on iris recognition performance. We also present the IIIT-D Contact Lens Iris database with over 6500 images pertaining to 101 subjects. For each subject, images are captured without lens, transparent (prescription) lens, and color cosmetic lens (textured) using two different iris sensors. The results computed using VeriEye suggest that color cosmetic lens significantly increases the false rejection at a fixed false acceptance rate. Also, the experiments on four existing lens detection algorithms suggest that incorporating lens detection helps in maintaining the iris recognition performance. However further research is required to build sophisticated lens detection algorithm that can improve iris recognition.


PLOS ONE | 2014

Recognizing Age-Separated Face Images: Humans and Machines

Daksha Yadav; Richa Singh; Mayank Vatsa; Afzel Noore

Humans utilize facial appearance, gender, expression, aging pattern, and other ancillary information to recognize individuals. It is interesting to observe how humans perceive facial age. Analyzing these properties can help in understanding the phenomenon of facial aging and incorporating the findings can help in designing effective algorithms. Such a study has two components - facial age estimation and age-separated face recognition. Age estimation involves predicting the age of an individual given his/her facial image. On the other hand, age-separated face recognition consists of recognizing an individual given his/her age-separated images. In this research, we investigate which facial cues are utilized by humans for estimating the age of people belonging to various age groups along with analyzing the effect of ones gender, age, and ethnicity on age estimation skills. We also analyze how various facial regions such as binocular and mouth regions influence age estimation and recognition capabilities. Finally, we propose an age-invariant face recognition algorithm that incorporates the knowledge learned from these observations. Key observations of our research are: (1) the age group of newborns and toddlers is easiest to estimate, (2) gender and ethnicity do not affect the judgment of age group estimation, (3) face as a global feature, is essential to achieve good performance in age-separated face recognition, and (4) the proposed algorithm yields improved recognition performance compared to existing algorithms and also outperforms a commercial system in the young image as probe scenario.


workshop on applications of computer vision | 2016

Effect of illicit drug abuse on face recognition

Daksha Yadav; Naman Kohli; Prateekshit Pandey; Richa Singh; Mayank Vatsa; Afzel Noore

Over the years, significant research has been undertaken to improve the performance of face recognition in the presence of covariates such as variations in pose, illumination, expressions, aging, and use of disguises. This paper highlights the effect of illicit drug abuse on facial features. An Illicit Drug Abuse Face (IDAF) database of 105 subjects has been created to study the performance on two commercial face recognition systems and popular face recognition algorithms. The experimental results show the decreased performance of current face recognition algorithms on drug abuse face images. This paper also proposes projective Dictionary learning based illicit Drug Abuse face Classification (DDAC) framework to effectively detect and separate faces affected by drug abuse from normal faces. This important pre-processing step stimulates researchers to develop a new class of face recognition algorithms specifically designed to improve the face recognition performance on faces affected by drug abuse. The highest classification accuracy of 88.81% is observed to detect such faces by the proposed DDAC framework on a combined database of illicit drug abuse and regular faces.


IEEE Access | 2015

Multiple Projective Dictionary Learning to Detect Plastic Surgery for Face Verification

Naman Kohli; Daksha Yadav; Afzel Noore

Researchers have shown that the changes in face features due to plastic surgery can be modeled as a covariate that reduces the ability of algorithms to recognize a persons identity. Traditional dictionary learning methods learn a sparse representation using I0 and I1 norms that are computationally expensive. This paper presents a multiple projective dictionary learning (MPDL) framework that does not require the computation of I0 and I1 norms. We propose a novel solution to discriminate plastic surgery faces from regular faces by learning representations of local and global plastic surgery faces using multiple projective dictionaries and by using compact binary face descriptors. Experimental results on the plastic surgery database show that the proposed MPDL framework is able to detect plastic surgery faces with a high accuracy of 97.96%. To verify the identity of a person, the detected plastic surgery faces are divided into local regions of interest (ROIs) that are likely to be altered by a particular plastic surgery. The cosine distance between the compact binary face descriptors is computed for each ROI in the detected plastic surgery faces. In addition, we compute the human visual system feature similarity score based on phase congruency and gradient magnitude between the same ROIs. The cosine distance scores and the feature similarity scores are combined to learn a support vector machine model to verify if the faces belong to the same person. We integrate our proposed MPDL framework for face verification with two commercial systems to demonstrate an improvement in verification performance on a combined database of plastic surgery and regular face images.


international conference on biometrics theory applications and systems | 2016

Detecting medley of iris spoofing attacks using DESIST

Naman Kohli; Daksha Yadav; Mayank Vatsa; Richa Singh; Afzel Noore

Human iris is considered a reliable and accurate modality for biometric recognition due to its unique texture information. However, similar to other biometric modalities, iris recognition systems are also vulnerable to presentation attacks (commonly called spoofing) that attempt to conceal or impersonate identity. Examples of typical iris spoofing attacks are printed iris images, textured contact lenses, and synthetic creation of iris images. It is critical to note that majority of the algorithms proposed in the literature are trained to handle a specific type of spoofing attack. These algorithms usually perform very well on that particular attack. However, in real-world applications, an attacker may perform different spoofing attacks. In such a case, the problem becomes more challenging due to inherent variations in different attacks. In this paper, we focus on a medley of iris spoofing attacks and present a unified framework for detecting such attacks. We propose a novel structural and textural feature based iris spoofing detection framework (DESIST). Multi-order dense Zernike moments are calculated across the iris image which encode variations in structure of the iris image. Local Binary Pattern with Variance (LBPV) is utilized for representing textural changes in a spoofed iris image. The highest classification accuracy of 82.20% is observed by the proposed framework for detecting normal and spoofed iris images on a combined iris spoofing database.


computer vision and pattern recognition | 2017

Face Presentation Attack with Latex Masks in Multispectral Videos

Akshay Agarwal; Daksha Yadav; Naman Kohli; Richa Singh; Mayank Vatsa; Afzel Noore

Face recognition systems are susceptible to presentation attacks such as printed photo attacks, replay attacks, and 3D mask attacks. These attacks, primarily studied in visible spectrum, aim to obfuscate or impersonate a persons identity. This paper presents a unique multispectral video face database for face presentation attack using latex and paper masks. The proposed Multispectral Latex Mask based Video Face Presentation Attack (MLFP) database contains 1350 videos in visible, near infrared, and thermal spectrums. Since the database consists of videos of subjects without any mask as well as wearing ten different masks, the effect of identity concealment is analyzed in each spectrum using face recognition algorithms. We also present the performance of existing presentation attack detection algorithms on the proposed MLFP database. It is observed that the thermal imaging spectrum is most effective in detecting face presentation attacks.


international symposium on neural networks | 2017

Region-specific fMRI dictionary for decoding face verification in humans

Daksha Yadav; Naman Kohli; Shruti Nagpal; Maneet Singh; Prateekshit Pandey; Mayank Vatsa; Richa Singh; Afzel Noore; Gokulraj Prabhakaran; Harsh Mahajan

This paper focuses on decoding the process of face verification in the human brain using fMRI responses. 2400 fMRI responses are collected from different participants while they perform face verification on genuine and imposter stimuli face pairs. The first part of the paper analyzes the responses covering both cognitive and fMRI neuro-imaging results. With an average verification accuracy of 64.79% by human participants, the results of the cognitive analysis depict that the performance of female participants is significantly higher than the male participants with respect to imposter pairs. The results of the neuro-imaging analysis identifies regions of the brain such as the left fusiform gyrus, caudate nucleus, and superior frontal gyrus that are activated when participants perform face verification tasks. The second part of the paper proposes a novel two-level fMRI dictionary learning approach to predict if the stimuli observed is genuine or imposter using the brain activation data for selected regions. A comparative analysis with existing machine learning techniques illustrates that the proposed approach yields at least 4.5% higher classification accuracy than other algorithms. It is envisioned that the result of this study is the first step in designing brain-inspired automatic face verification algorithms.


computer vision and pattern recognition | 2013

Bacteria Foraging Fusion for Face Recognition across Age Progression

Daksha Yadav; Mayank Vatsa; Richa Singh; Massimo Tistarelli


International Journal of Central Banking | 2017

Unconstrained visible spectrum iris with textured contact lens variations: Database and benchmarking

Daksha Yadav; Naman Kohli; Mayank Vatsa; Richa Singh; Afzel Noore

Collaboration


Dive into the Daksha Yadav's collaboration.

Top Co-Authors

Avatar

Naman Kohli

West Virginia University

View shared research outputs
Top Co-Authors

Avatar

Richa Singh

West Virginia University

View shared research outputs
Top Co-Authors

Avatar

Afzel Noore

West Virginia University

View shared research outputs
Top Co-Authors

Avatar

Mayank Vatsa

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Richa Singh

West Virginia University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Akshay Agarwal

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Maneet Singh

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shruti Nagpal

Indraprastha Institute of Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge