scispace - formally typeset
Search or ask a question
Author

Vishesh Mistry

Other affiliations: Michigan State University
Bio: Vishesh Mistry is an academic researcher from Indian Institute of Technology, Jodhpur. The author has contributed to research in topics: Lens (optics) & Fingerprint (computing). The author has an hindex of 3, co-authored 5 publications receiving 24 citations. Previous affiliations of Vishesh Mistry include Michigan State University.

Papers
More filters
Proceedings ArticleDOI
TL;DR: The GAN incorporates an identity loss which guides the generator to synthesize fingerprints corresponding to more distinct identities, and the characteristics of the synthesized fingerprints are shown to be more similar to real fingerprints than existing meth- ods.
Abstract: Evaluation of large-scale fingerprint search algorithms has been limited due to lack of publicly available datasets. To address this problem, we utilize a Generative Adversarial Network (GAN) to synthesize a fingerprint dataset consisting of 100 million fingerprint images. In contrast to existing fingerprint synthesis algorithms, we incorporate an identity loss which guides the generator to synthesize fingerprints corresponding to more distinct identities. The characteristics of our synthesized fingerprints are shown to be more similar to real fingerprints than existing meth- ods via eight different metrics (minutiae count - block and template, minutiae direction - block and template, minutiae convex hull area, minutiae spatial distribution, block minutiae quality distribution, and NFIQ 2.0 scores). Additionally, the synthetic fingerprints based on our approach are shown to be more distinct than synthetic fingerprints based on published methods through search results and imposter distribution statistics. Finally, we report for the first time in open literature, search accuracy against a gallery of 1 00 million fingerprints (NIST SD4 Rank-1 accuracy of 89.7%).

24 citations

Proceedings ArticleDOI
01 Jan 2018
TL;DR: A novel approach for detecting contact lens using a Generalized Hierarchically tuned Contact Lens detection Network (GHCLNet), inspired by ResNet-50 model, which outperforms the available state-of-the-art lens detection algorithms.
Abstract: Iris serves as one of the best biometrie modality owing to its complex, unique and stable structure. However, it can still be spoofed using fabricated eyeballs and contact lens. Accurate identification of contact lens is must for reliable performance of any biometric authentication system based on this modality. In this paper, we present a novel approach for detecting contact lens using a Generalized Hierarchically tuned Contact Lens detection Network (GHCLNet). We have proposed hierarchical architecture for three class oculus classification namely: no lens, soft lens and cosmetic lens. Our network architecture is inspired by ResNet-50 model. This network works on raw input iris images without any pre-processing and segmentation requirement and this is one of its prodigious strength. We have performed extensive experimentation on two publicly available data-sets namely: 1)IIIT-D 2)ND and on IIT-K data-set (not publicly available) to ensure the generalizability of our network. The proposed architecture results are quite promising and outperforms the available state-of-the-art lens detection algorithms.

13 citations

Proceedings ArticleDOI
01 Sep 2019
TL;DR: An extensive experimental study is presented for tasks like furniture localization in a floor plan, caption and description generation, on the proposed dataset showing the utility of BRIDGE.
Abstract: In this paper, a large scale public dataset containing floor plan images and their annotations is presented. BRIDGE (Building plan Repository for Image Description Generation, and Evaluation) dataset contains more than 13000 images of the floor plan and annotations collected from various websites, as well as publicly available floor plan images in the research domain. The images in BRIDGE also has annotations for symbols, region graphs, and paragraph descriptions. The BRIDGE dataset will be useful for symbol spotting, caption and description generation, scene graph synthesis, retrieval and many other tasks involving building plan parsing. In this paper, we also present an extensive experimental study for tasks like furniture localization in a floor plan, caption and description generation, on the proposed dataset showing the utility of BRIDGE.

11 citations

Posted Content
TL;DR: In this paper, a Generalized Hierarchically tuned Contact Lens detection Network (GHCLNet) is proposed for iris image classification, which is inspired by ResNet-50 model.
Abstract: Iris serves as one of the best biometric modality owing to its complex, unique and stable structure. However, it can still be spoofed using fabricated eyeballs and contact lens. Accurate identification of contact lens is must for reliable performance of any biometric authentication system based on this modality. In this paper, we present a novel approach for detecting contact lens using a Generalized Hierarchically tuned Contact Lens detection Network (GHCLNet) . We have proposed hierarchical architecture for three class oculus classification namely: no lens, soft lens and cosmetic lens. Our network architecture is inspired by ResNet-50 model. This network works on raw input iris images without any pre-processing and segmentation requirement and this is one of its prodigious strength. We have performed extensive experimentation on two publicly available data-sets namely: 1)IIIT-D 2)ND and on IIT-K data-set (not publicly available) to ensure the generalizability of our network. The proposed architecture results are quite promising and outperforms the available state-of-the-art lens detection algorithms.

4 citations

Posted Content
TL;DR: In this paper, the identity loss is incorporated to guide the generator to synthesize fingerprints corresponding to more distinct identities and the characteristics of the synthesized fingerprints are shown to be more similar to real fingerprints than real fingerprints.
Abstract: Evaluation of large-scale fingerprint search algorithms has been limited due to lack of publicly available datasets. To address this problem, we utilize a Generative Adversarial Network (GAN) to synthesize a fingerprint dataset consisting of 100 million fingerprint images. In contrast to existing fingerprint synthesis algorithms, we incorporate an identity loss which guides the generator to synthesize fingerprints corresponding to more distinct identities. The characteristics of our synthesized fingerprints are shown to be more similar to real fingerprints than existing methods via eight different metrics (minutiae count - block and template, minutiae direction - block and template, minutiae convex hull area, minutiae spatial distribution, block minutiae quality distribution, and NFIQ 2.0 scores). Additionally, the synthetic fingerprints based on our approach are shown to be more distinct than synthetic fingerprints based on published methods through search results and imposter distribution statistics. Finally, we report for the first time in open literature, search accuracy against a gallery of 100 million fingerprint images (NIST SD4 Rank-1 accuracy of 89.7%).

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper, different categories of presentation attack are described and placed in an application-relevant framework, and the state-of-the-art in detecting each category of attack is summarized.
Abstract: Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on this topic. Different categories of presentation attack are described and placed in an application-relevant framework, and the state of the art in detecting each category of attack is summarized. One conclusion from this is that presentation attack detection for iris recognition is not yet a solved problem. Datasets available for research are described, research directions for the near- and medium-term future are outlined, and a short list of recommended readings is suggested.

83 citations

Journal ArticleDOI
TL;DR: A novel Densely Connected Contact Lens Detection Network (DCLNet) has been proposed, which is a deep convolutional network with dense connections among layers, which improves the Correct Classification Rate (CCR) up to 4% as compared to the state of the arts.

38 citations

Posted Content
TL;DR: Different categories of presentation attack are described and placed in an application-relevant framework, and the state of the art in detecting each category of attack is summarized.
Abstract: Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on this topic. Different categories of presentation attack are described and placed in an application-relevant framework, and the state of the art in detecting each category of attack is summarized. One conclusion from this is that presentation attack detection for iris recognition is not yet a solved problem. Datasets available for research are described, research directions for the near- and medium-term future are outlined, and a short list of recommended readings are suggested.

24 citations

ReportDOI
13 Jul 2021
TL;DR: NIST Fingerprint ImageQuality (nfiq 2) is open source software that links image quality of optical and ink 500 pixel per inch fingerprints to operational recognition performance.
Abstract: NIST Fingerprint ImageQuality (nfiq 2) is open source software that links image quality of optical and ink 500 pixel per inch fingerprints to operational recognition performance. This allows quality values to be tightly defined and then numerically calibrated, which in turn allows for the standardization needed to support a worldwide deployment of fingerprint sensors with universally interpretable image qualities. nfiq 2 quality features are formally standardized as part of ISO/IEC 29794-4 and serve as the reference implementation of the standard.

20 citations

Posted Content
TL;DR: Numerical results show that, for the first time, accurate and fast image search within the encrypted domain is feasible at scale (296 seconds; 46x speedup over state-of-the-art for face search against a background of 1 million).
Abstract: We present a method to search for a probe (or query) image representation against a large gallery in the encrypted domain. We require that the probe and gallery images be represented in terms of a fixed-length representation, which is typical for representations obtained from learned networks. Our encryption scheme is agnostic to how the fixed-length representation is obtained and can, therefore, be applied to any fixed-length representation in any application domain. Our method, dubbed HERS (Homomorphically Encrypted Representation Search), operates by (i) compressing the representation towards its estimated intrinsic dimensionality, (ii) encrypting the compressed representation using the proposed fully homomorphic encryption scheme, and (iii) searching against a gallery of encrypted representations directly in the encrypted domain, without decrypting them, and with minimal loss of accuracy. Numerical results on large galleries of face, fingerprint, and object datasets such as ImageNet show that, for the first time, accurate and fast image search within the encrypted domain is feasible at scale (296 seconds; 46x speedup over state-of-the-art for face search against a background of 1 million).

20 citations