2019 International Conference on Biometrics (ICB) 2019
DOI: 10.1109/icb45273.2019.8987320
|View full text |Cite
|
Sign up to set email alerts
|

Universal Material Translator: Towards Spoof Fingerprint Generalization

Abstract: Spoof detectors are classifiers that are trained to distinguish spoof fingerprints from bonafide ones. However, state of the art spoof detectors do not generalize well on unseen spoof materials. This study proposes a style transfer based augmentation wrapper that can be used on any existing spoof detector and can dynamically improve the robustness of the spoof detection system on spoof materials for which we have very low data. Our method is an approach for synthesizing new spoof images from a few spoof exampl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(26 citation statements)
references
References 36 publications
0
26
0
Order By: Relevance
“…Gajawada perspective in [16]. They propose a so-called deep learning based "Universal Material Translator" (UMT).…”
Section: B Anomaly Detection-based Techniquesmentioning
confidence: 99%
See 3 more Smart Citations
“…Gajawada perspective in [16]. They propose a so-called deep learning based "Universal Material Translator" (UMT).…”
Section: B Anomaly Detection-based Techniquesmentioning
confidence: 99%
“…However, it should be noted that this method does require some samples (i.e., five) of the analysed unknown PAI species. Finally, by assuming that unknown PAIs species share texture (style) information with known PAIs, Chugh and Jain [17] extended the work in [16] by combining texture styles of pre-defined PAI species to generate new synthetic unknown PAIs. Those synthetic data could, in turn, be employed as training to enhance the generalisation capability of any end-to-end PAD approach.…”
Section: B Anomaly Detection-based Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…Kute et al used the Bregman divergence regularization method to reduce the distribution gap between domains; the researchers used Fisher linear discriminant analysis (FLDA) subspace learning algorithm to find a subspace through a projection matrix between fully heterogeneous data and then used the subspace to perform recognition using a support vector machine and K-nearest neighbor classifier [ 12 ]. Gajawada et al performed domain adaptation between spoof attack databases to perform augmentation to improve the generality of a fingerprint spoof attack detector [ 13 ]. Here, a synthetic spoof attack patch was created using a universal material translator wrapper.…”
Section: Related Workmentioning
confidence: 99%