Picture for Tarang Chugh

Tarang Chugh

Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach

Add code
Apr 06, 2020
Figure 1 for Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach
Figure 2 for Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach
Figure 3 for Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach
Figure 4 for Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach
Viaarxiv icon

Fingerprint Spoof Detection: Temporal Analysis of Image Sequence

Add code
Dec 17, 2019
Figure 1 for Fingerprint Spoof Detection: Temporal Analysis of Image Sequence
Figure 2 for Fingerprint Spoof Detection: Temporal Analysis of Image Sequence
Figure 3 for Fingerprint Spoof Detection: Temporal Analysis of Image Sequence
Figure 4 for Fingerprint Spoof Detection: Temporal Analysis of Image Sequence
Viaarxiv icon

Universal Material Translator: Towards Spoof Fingerprint Generalization

Add code
Dec 08, 2019
Figure 1 for Universal Material Translator: Towards Spoof Fingerprint Generalization
Figure 2 for Universal Material Translator: Towards Spoof Fingerprint Generalization
Figure 3 for Universal Material Translator: Towards Spoof Fingerprint Generalization
Figure 4 for Universal Material Translator: Towards Spoof Fingerprint Generalization
Viaarxiv icon

Fingerprint Spoof Generalization

Add code
Dec 05, 2019
Figure 1 for Fingerprint Spoof Generalization
Figure 2 for Fingerprint Spoof Generalization
Figure 3 for Fingerprint Spoof Generalization
Figure 4 for Fingerprint Spoof Generalization
Viaarxiv icon

OCT Fingerprints: Resilience to Presentation Attacks

Add code
Jul 31, 2019
Figure 1 for OCT Fingerprints: Resilience to Presentation Attacks
Figure 2 for OCT Fingerprints: Resilience to Presentation Attacks
Figure 3 for OCT Fingerprints: Resilience to Presentation Attacks
Figure 4 for OCT Fingerprints: Resilience to Presentation Attacks
Viaarxiv icon

Fingerprint Presentation Attack Detection: Generalization and Efficiency

Add code
Dec 30, 2018
Figure 1 for Fingerprint Presentation Attack Detection: Generalization and Efficiency
Figure 2 for Fingerprint Presentation Attack Detection: Generalization and Efficiency
Figure 3 for Fingerprint Presentation Attack Detection: Generalization and Efficiency
Figure 4 for Fingerprint Presentation Attack Detection: Generalization and Efficiency
Viaarxiv icon

Altered Fingerprints: Detection and Localization

Add code
Sep 18, 2018
Figure 1 for Altered Fingerprints: Detection and Localization
Figure 2 for Altered Fingerprints: Detection and Localization
Figure 3 for Altered Fingerprints: Detection and Localization
Figure 4 for Altered Fingerprints: Detection and Localization
Viaarxiv icon

Matching Fingerphotos to Slap Fingerprint Images

Add code
Apr 22, 2018
Figure 1 for Matching Fingerphotos to Slap Fingerprint Images
Figure 2 for Matching Fingerphotos to Slap Fingerprint Images
Figure 3 for Matching Fingerphotos to Slap Fingerprint Images
Figure 4 for Matching Fingerphotos to Slap Fingerprint Images
Viaarxiv icon

Fingerprint Spoof Buster

Add code
Dec 12, 2017
Figure 1 for Fingerprint Spoof Buster
Figure 2 for Fingerprint Spoof Buster
Figure 3 for Fingerprint Spoof Buster
Figure 4 for Fingerprint Spoof Buster
Viaarxiv icon