no code implementations • 6 Apr 2020 • Steven A. Grosz, Tarang Chugh, Anil K. Jain
The vulnerability of automated fingerprint recognition systems to presentation attacks (PA), i. e., spoof or altered fingers, has been a growing concern, warranting the development of accurate and efficient presentation attack detection (PAD) methods.
no code implementations • 17 Dec 2019 • Tarang Chugh, Anil K. Jain
We utilize the dynamics involved in the imaging of a fingerprint on a touch-based fingerprint reader, such as perspiration, changes in skin color (blanching), and skin distortion, to differentiate real fingers from spoof (fake) fingers.
no code implementations • 8 Dec 2019 • Rohit Gajawada, Additya Popli, Tarang Chugh, Anoop Namboodiri, Anil K. Jain
Spoof detectors are classifiers that are trained to distinguish spoof fingerprints from bonafide ones.
no code implementations • 5 Dec 2019 • Tarang Chugh, Anil K. Jain
The proposed approach is shown to improve the generalization performance of a state-of-the-art spoof detector, namely Fingerprint Spoof Buster, from TDR of 75. 24% to 91. 78% @ FDR = 0. 2%.
no code implementations • 31 Jul 2019 • Tarang Chugh, Anil K. Jain
Optical coherent tomography (OCT) fingerprint technology provides rich depth information, including internal fingerprint (papillary junction) and sweat (eccrine) glands, in addition to imaging any fake layers (presentation attacks) placed over finger skin.
no code implementations • 30 Dec 2018 • Tarang Chugh, Anil K. Jain
We study the problem of fingerprint presentation attack detection (PAD) under unknown PA materials not seen during PAD training.
no code implementations • 2 May 2018 • Elham Tabassi, Tarang Chugh, Debayan Deb, Anil K. Jain
Fingerprint alteration, also referred to as obfuscation presentation attack, is to intentionally tamper or damage the real friction ridge patterns to avoid identification by an AFIS.
no code implementations • 22 Apr 2018 • Debayan Deb, Tarang Chugh, Joshua Engelsma, Kai Cao, Neeta Nain, Jake Kendall, Anil K. Jain
We address the problem of comparing fingerphotos, fingerprint images from a commodity smartphone camera, with the corresponding legacy slap contact-based fingerprint images.
no code implementations • 12 Dec 2017 • Tarang Chugh, Kai Cao, Anil K. Jain
Experimental results on three public-domain LivDet datasets (2011, 2013, and 2015) show that the proposed approach provides state-of-the-art accuracies in fingerprint spoof detection for intra-sensor, cross-material, cross-sensor, as well as cross-dataset testing scenarios.