Search Results for author: Tarang Chugh

Found 9 papers, 0 papers with code

Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach

no code implementations6 Apr 2020 Steven A. Grosz, Tarang Chugh, Anil K. Jain

The vulnerability of automated fingerprint recognition systems to presentation attacks (PA), i. e., spoof or altered fingers, has been a growing concern, warranting the development of accurate and efficient presentation attack detection (PAD) methods.

Representation Learning Style Transfer

Fingerprint Spoof Detection: Temporal Analysis of Image Sequence

no code implementations17 Dec 2019 Tarang Chugh, Anil K. Jain

We utilize the dynamics involved in the imaging of a fingerprint on a touch-based fingerprint reader, such as perspiration, changes in skin color (blanching), and skin distortion, to differentiate real fingers from spoof (fake) fingers.

Universal Material Translator: Towards Spoof Fingerprint Generalization

no code implementations8 Dec 2019 Rohit Gajawada, Additya Popli, Tarang Chugh, Anoop Namboodiri, Anil K. Jain

Spoof detectors are classifiers that are trained to distinguish spoof fingerprints from bonafide ones.

Style Transfer

Fingerprint Spoof Generalization

no code implementations5 Dec 2019 Tarang Chugh, Anil K. Jain

The proposed approach is shown to improve the generalization performance of a state-of-the-art spoof detector, namely Fingerprint Spoof Buster, from TDR of 75. 24% to 91. 78% @ FDR = 0. 2%.

Style Transfer

OCT Fingerprints: Resilience to Presentation Attacks

no code implementations31 Jul 2019 Tarang Chugh, Anil K. Jain

Optical coherent tomography (OCT) fingerprint technology provides rich depth information, including internal fingerprint (papillary junction) and sweat (eccrine) glands, in addition to imaging any fake layers (presentation attacks) placed over finger skin.

Fingerprint Presentation Attack Detection: Generalization and Efficiency

no code implementations30 Dec 2018 Tarang Chugh, Anil K. Jain

We study the problem of fingerprint presentation attack detection (PAD) under unknown PA materials not seen during PAD training.

Clustering

Altered Fingerprints: Detection and Localization

no code implementations2 May 2018 Elham Tabassi, Tarang Chugh, Debayan Deb, Anil K. Jain

Fingerprint alteration, also referred to as obfuscation presentation attack, is to intentionally tamper or damage the real friction ridge patterns to avoid identification by an AFIS.

Friction Generative Adversarial Network

Matching Fingerphotos to Slap Fingerprint Images

no code implementations22 Apr 2018 Debayan Deb, Tarang Chugh, Joshua Engelsma, Kai Cao, Neeta Nain, Jake Kendall, Anil K. Jain

We address the problem of comparing fingerphotos, fingerprint images from a commodity smartphone camera, with the corresponding legacy slap contact-based fingerprint images.

TAR

Fingerprint Spoof Buster

no code implementations12 Dec 2017 Tarang Chugh, Kai Cao, Anil K. Jain

Experimental results on three public-domain LivDet datasets (2011, 2013, and 2015) show that the proposed approach provides state-of-the-art accuracies in fingerprint spoof detection for intra-sensor, cross-material, cross-sensor, as well as cross-dataset testing scenarios.

Cannot find the paper you are looking for? You can Submit a new open access paper.