Alert button
Picture for Jag Mohan Singh

Jag Mohan Singh

Alert button

VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection

Add code
Bookmark button
Alert button
Apr 19, 2024
Raghavendra Ramachandra, Narayan Vetrekar, Sushma Venkatesh, Savita Nageshker, Jag Mohan Singh, R. S. Gad

Viaarxiv icon

Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes

Add code
Bookmark button
Alert button
Sep 24, 2023
Raghavendra Ramachandra, Jag Mohan Singh, Sushma Venkatesh

Viaarxiv icon

Deep Composite Face Image Attacks: Generation, Vulnerability and Detection

Add code
Bookmark button
Alert button
Nov 20, 2022
Jag Mohan Singh, Raghavendra Ramachandra

Figure 1 for Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
Figure 2 for Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
Figure 3 for Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
Figure 4 for Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
Viaarxiv icon

Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance

Add code
Bookmark button
Alert button
Sep 30, 2022
Jag Mohan Singh, Raghavendra Ramachandra

Figure 1 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Figure 2 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Figure 3 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Figure 4 for Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance
Viaarxiv icon

3D Face Morphing Attacks: Generation, Vulnerability and Detection

Add code
Bookmark button
Alert button
Jan 10, 2022
Jag Mohan Singh, Raghavendra Ramachandra

Figure 1 for 3D Face Morphing Attacks: Generation, Vulnerability and Detection
Figure 2 for 3D Face Morphing Attacks: Generation, Vulnerability and Detection
Figure 3 for 3D Face Morphing Attacks: Generation, Vulnerability and Detection
Figure 4 for 3D Face Morphing Attacks: Generation, Vulnerability and Detection
Viaarxiv icon

Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking

Add code
Bookmark button
Alert button
Jun 16, 2020
Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond Veldhuis, Davide Maltoni, Christoph Busch

Figure 1 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Figure 2 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Figure 3 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Figure 4 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Viaarxiv icon

A Survey on Unknown Presentation Attack Detection for Fingerprint

Add code
Bookmark button
Alert button
May 17, 2020
Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra

Figure 1 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Figure 2 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Figure 3 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Figure 4 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Viaarxiv icon

Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition

Add code
Bookmark button
Alert button
Dec 03, 2019
Jag Mohan Singh, Sushma Venkatesh, Kiran B. Raja, Raghavendra Ramachandra, Christoph Busch

Figure 1 for Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition
Figure 2 for Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition
Figure 3 for Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition
Figure 4 for Detecting Finger-Vein Presentation Attacks Using 3D Shape & Diffuse Reflectance Decomposition
Viaarxiv icon

Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance

Add code
Bookmark button
Alert button
Dec 03, 2019
Jag Mohan Singh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch

Figure 1 for Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Figure 2 for Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Figure 3 for Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Figure 4 for Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Viaarxiv icon