Picture for Jag Mohan Singh

Jag Mohan Singh

3D Face Morphing Attack Generation using Non-Rigid Registration

Add code
Apr 24, 2024
Viaarxiv icon

VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection

Add code
Apr 19, 2024
Viaarxiv icon

Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes

Add code
Sep 24, 2023
Viaarxiv icon

Deep Composite Face Image Attacks: Generation, Vulnerability and Detection

Add code
Nov 20, 2022
Viaarxiv icon

Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance

Add code
Sep 30, 2022
Figure 1 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Figure 2 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Figure 3 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Figure 4 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Viaarxiv icon

3D Face Morphing Attacks: Generation, Vulnerability and Detection

Add code
Jan 10, 2022
Figure 1 for 3D Face Morphing Attacks: Generation, Vulnerability and Detection
Figure 2 for 3D Face Morphing Attacks: Generation, Vulnerability and Detection
Figure 3 for 3D Face Morphing Attacks: Generation, Vulnerability and Detection
Figure 4 for 3D Face Morphing Attacks: Generation, Vulnerability and Detection
Viaarxiv icon

Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking

Add code
Jun 16, 2020
Figure 1 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Figure 2 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Figure 3 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Figure 4 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Viaarxiv icon

A Survey on Unknown Presentation Attack Detection for Fingerprint

Add code
May 17, 2020
Figure 1 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Figure 2 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Figure 3 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Figure 4 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Viaarxiv icon

Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition

Add code
Dec 03, 2019
Figure 1 for Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition
Figure 2 for Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition
Figure 3 for Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition
Figure 4 for Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition
Viaarxiv icon

Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance

Add code
Dec 03, 2019
Figure 1 for Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Figure 2 for Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Figure 3 for Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Figure 4 for Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Viaarxiv icon