Filters








176 Hits in 6.0 sec

ID Preserving Generative Adversarial Network for Partial Latent Fingerprint Reconstruction [article]

Ali Dabouei, Sobhan Soleymani, Hadi Kazemi, Seyed Mehdi Iranmanesh, Jeremy Dawson, Nasser M. Nasrabadi
2018 arXiv   pre-print
We propose a direct latent fingerprint reconstruction model based on conditional generative adversarial networks (cGANs).  ...  Second, a perceptual ID preservation approach is developed to force the generator to preserve the ID information during the reconstruction process.  ...  ACKNOWLEDGEMENT This work is based upon a work supported by the Center for Identification Technology Research and the National Science Foundation under Grant #1650474.  ... 
arXiv:1808.00035v1 fatcat:unvcdjgkvnezpgh6zmik22l25q

An investigation of latent fingerprinting techniques

Ritika Dhaneshwar, Mandeep Kaur, Manvjeet Kaur
2021 Egyptian Journal of Forensic Sciences  
Therefore, a systematic review is presented to study the existing methods for latent fingerprint acquisition, enhancement, reconstruction, and matching, along with various benchmark datasets available  ...  Background Latent fingerprints are the unintentional impressions that are left at crime scenes, which are considered to be highly significant in forensic analysis and authenticity verification.  ...  convolutional networks. gen, Crossmatch are used 2018 ID preserving generative adversarial IIIT-Delhi latent fingerprint database network is used for partial latent and IIIT-Delhi MOLF database fingerprint  ... 
doi:10.1186/s41935-021-00252-4 fatcat:7kely3t6jfhb7ieboxuxvu7imi

FDeblur-GAN: Fingerprint Deblurring using Generative Adversarial Network [article]

Amol S. Joshi, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi
2021 arXiv   pre-print
The second sub-network is a verifier that helps the generator to preserve the ID information during the generation process.  ...  We propose a fingerprint deblurring model FDeblur-GAN, based on the conditional Generative Adversarial Networks (cGANs) and multi-stage framework of the stack GAN.  ...  The study in [8] has developed a certain technique using orientation, frequency, and ridge maps along with a perceptual ID preserving approach which improved the reconstruction of partial latent fingerprints  ... 
arXiv:2106.11354v1 fatcat:wct7pqtj6najzeb7djeqmdhoxa

Fingerprint Template Invertibility: Minutiae vs. Deep Templates [article]

Kanishka P. Wijewardena, Steven A. Grosz, Kai Cao, Anil K. Jain
2022 arXiv   pre-print
, when the reconstructed images are matched using the same deep network, they achieve a TAR of 85.95% (68.10%) for type-I (type-II) attacks.  ...  The corresponding attack performance for reconstructed fingerprint images from deep templates using the same commercial matcher yields a TAR of less than 1% for both type-I and type-II attacks; however  ...  Engelsma for his valuable discussions and contributions to this work.  ... 
arXiv:2205.03809v1 fatcat:prqyatwiwba6dpun5axmpmb45q

Survey on Deep Multi-modal Data Analytics: Collaboration, Rivalry and Fusion [article]

Yang Wang
2020 arXiv   pre-print
Throughout this survey, we further indicate that the critical components for this field go to collaboration, adversarial competition and fusion over multi-modal spaces.  ...  Recently, deep neural networks have exhibited as a powerful architecture to well capture the nonlinear distribution of high-dimensional multimedia data, so naturally does for multi-modal data.  ...  [72] proposed a 3D fingerprint segmentation network and a multi-view generation network to obtain the deep representation to better match 3D fingerprint.  ... 
arXiv:2006.08159v1 fatcat:g4467zmutndglmy35n3eyfwxku

Security Vulnerabilities Against Fingerprint Biometric System [article]

Mahesh Joshi, Bodhisatwa Mazumdar, Somnath Dey
2018 arXiv   pre-print
Due to the high efficiency of fingerprint biometric system in verifying a legitimate user, numerous government and private organizations are using this system for security purpose.  ...  This paper provides an overview of the fingerprint biometric system and gives details about various current security aspects related to the system.  ...  The adversary uses the fingerprint traces to generate fake fingerprint using spoofing or constructing a mold by lifting latent fingerprint to mount the attack.  ... 
arXiv:1805.07116v1 fatcat:id7chc2hi5bszf3cszijf2bdp4

Ensembling with Deep Generative Views [article]

Lucy Chai, Jun-Yan Zhu, Eli Shechtman, Phillip Isola, Richard Zhang
2021 arXiv   pre-print
Using a pretrained generator, we first find the latent code corresponding to a given real input image.  ...  coupled with classifier sensitivities to artifacts in GAN-generated images.  ...  tional generative adversarial networks.  ... 
arXiv:2104.14551v1 fatcat:mhkfsgecxbcu5jbpa33rhme6e4

A Survey of Deep Facial Attribute Analysis [article]

Xin Zheng, Yanqing Guo, Huaibo Huang, Yi Li, Ran He
2019 arXiv   pre-print
Additionally, we introduce the underlying theories of this two-stage pipeline for both FAE and FAM.  ...  First, we summarize a general pipeline that deep facial attribute analysis follows, which comprises two stages: data preprocessing and model construction.  ...  Generative adversarial network A generative adversarial network (GAN) consists of two parts: the generator G and the discriminator D, where G attempts to synthesize data from a random vector z obeying  ... 
arXiv:1812.10265v3 fatcat:tezgo2angvfefbttuoodnss6t4

A Survey of Deep Facial Attribute Analysis

Xin Zheng, Yanqing Guo, Huaibo Huang, Yi Li, Ran He
2020 International Journal of Computer Vision  
Additionally, we introduce the underlying theories of this two-stage pipeline for both FAE and FAM.  ...  First, we summarize a general pipeline that deep facial attribute analysis follows, which comprises two stages: data preprocessing and model construction.  ...  Generative Adversarial Network A generative adversarial network (GAN) consists of two parts: the generator G and the discriminator D, where G attempts to synthesize data from a random vector z obeying  ... 
doi:10.1007/s11263-020-01308-z fatcat:xmlukvd5qbenzkzjacefhcnope

Biometrics Recognition Using Deep Learning: A Survey [article]

Shervin Minaee, Amirali Abdolrashidi, Hang Su, Mohammed Bennamoun, David Zhang
2021 arXiv   pre-print
In this work, we provide a comprehensive survey of more than 120 promising works on biometric recognition (including face, fingerprint, iris, palmprint, ear, voice, signature, and gait recognition), which  ...  For each biometric, we first introduce the available datasets that are widely used in the literature and their characteristics.  ...  Nalini Ratha for reviewing this work, and providing very helpful comments and suggestions.  ... 
arXiv:1912.00271v3 fatcat:nobon7vrrrdnxe4pr3q2anl63y

A Review of Generative Adversarial Networks in Cancer Imaging: New Applications, New Solutions [article]

Richard Osuala, Kaisar Kushibar, Lidia Garrucho, Akis Linardos, Zuzanna Szafranowska, Stefan Klein, Ben Glocker, Oliver Diaz, Karim Lekadir
2021 arXiv   pre-print
The recent advancements in Generative Adversarial Networks (GANs) in computer vision as well as in medical imaging may provide a basis for enhanced capabilities in cancer detection and analysis.  ...  We analyse and discuss 163 papers that apply adversarial training techniques in the context of cancer imaging and elaborate their methodologies, advantages and limitations.  ...  A potential solution to avoid training data reconstruction is highlighted by Xie et al [206] , who propose the Differentially Private Generative Adversarial Network (DPGAN).  ... 
arXiv:2107.09543v1 fatcat:jz76zqklpvh67gmwnsdqzgq5he

DeepFrag: A Deep Convolutional Neural Network for Fragment-based Lead Optimization [article]

Harrison Green, David R Koes, Jacob D Durrant
2021 bioRxiv   pre-print
We here describe a deep convolutional neural network that predicts appropriate fragments given the structure of a receptor/ligand complex.  ...  Several authors have repurposed generative architectures used in computer vision for use in drug design (e.g., generative adversarial networks, GANs; variational autoencoders, VAEs).  ...  In the field of computer vision, generative models such as recurrent neural networks (RNNs) and generative adversarial networks (GANs) have had great success in performing tasks such as realistic image  ... 
doi:10.1101/2021.01.07.425790 fatcat:zqipo5zybbcqdhs2h3nq3kdovm

A survey of face recognition techniques under occlusion [article]

Dan Zeng, Raymond Veldhuis, Luuk Spreeuwers
2020 arXiv   pre-print
The limited capacity to recognize faces under occlusions is a long-standing problem that presents a unique challenge for face recognition systems and even for humans.  ...  Furthermore, we analyze the motivations, innovations, pros and cons, and the performance of representative approaches for comparison.  ...  In paper [35] , ID-GAN (identity-diversity generative adversarial network) combines a CNN-based recognizer and GAN-based recognition to inpaint realism and identitypreserving faces.  ... 
arXiv:2006.11366v1 fatcat:pttwdep5zbellldwricxfzgzki

A survey of face recognition techniques under occlusion

Dan Zeng, Raymond Veldhuis, Luuk Spreeuwers
2021 IET Biometrics  
Nevertheless, occluded face recognition is imperative to exploit the full potential of face recognition for real-world applications.  ...  Furthermore, the motivations, innovations, pros and cons, and the performance of representative approaches for comparison are analyzed.  ...  In reference [184] , ID-GAN (identity-diversity generative adversarial network) combines a CNN-based recogniser and GAN-based recognition to inpaint realism and identity-preserving faces.  ... 
doi:10.1049/bme2.12029 fatcat:bkks2gmblfabhgte4snl4x54eu

Privacy–Enhancing Face Biometrics: A Comprehensive Survey

Blaz Meden, Peter Rot, Philipp Terhorst, Naser Damer, Arjan Kuijper, Walter J. Scheirer, Arun Ross, Peter Peer, Vitomir Struc
2021 IEEE Transactions on Information Forensics and Security  
For example, the ability to automatically extract age, gender, race, and health cues from biometric data has heightened concerns about privacy leakage.  ...  These efforts have resulted in a multitude of privacy-enhancing techniques that aim at addressing privacy risks originating from biometric systems and providing technological solutions for legislative  ...  For more information, see https://creativecommons.org/licenses/by/4.0/ This article has been accepted for publication in a future issue of this journal, but has not been fully edited.  ... 
doi:10.1109/tifs.2021.3096024 fatcat:z5kvij6g7vgx3b24narxdyp2py
« Previous Showing results 1 — 15 out of 176 results