2021 IEEE Winter Conference on Applications of Computer Vision (WACV) 2021
DOI: 10.1109/wacv48630.2021.00246
|View full text |Cite
|
Sign up to set email alerts
|

CIT-GAN: Cyclic Image Translation Generative Adversarial Network With Application in Iris Presentation Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…Generative methods have been used by some approaches, either to use the trained discriminator for iris PAD, or to generate synthetic samples and augment under-represented classes. In this direction, Yadav and Ross [193] proposed CIT-GAN (Cyclic Image Translation Generative Adversarial Network) for multi-domain style transfer to generate synthetic samples of several PAIs (cosmetic contact lenses, printed eyes, artificial eyes and kindle-display attack). To do so, image translation is driven by a Styling Network that learns style characteristics of each given domain.…”
Section: Adversarial Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…Generative methods have been used by some approaches, either to use the trained discriminator for iris PAD, or to generate synthetic samples and augment under-represented classes. In this direction, Yadav and Ross [193] proposed CIT-GAN (Cyclic Image Translation Generative Adversarial Network) for multi-domain style transfer to generate synthetic samples of several PAIs (cosmetic contact lenses, printed eyes, artificial eyes and kindle-display attack). To do so, image translation is driven by a Styling Network that learns style characteristics of each given domain.…”
Section: Adversarial Networkmentioning
confidence: 99%
“…Part of the problem lies into the limited size of existing databases, which is an issue for data-hungry DL approaches. Some solutions, as studied by some of the methods above, are data augmentation by geometric or illumination modifications [47], or creating additional synthetic data via generative methods [193]. Human-aided DL training is another promising avenue.…”
Section: Open Research Questions In Iris Padmentioning
confidence: 99%
See 1 more Smart Citation
“…to capture features which differentiate bonafide acquisitions from PAs [101][102][103][104][105][106][107][108][109][110][111][112]. In contrast, software based solutions extract anatomical, physiological, textural, challenge response, or deep network based features to classify an input sample as live (bonafide) or presentation attack (spoof) [35,36,96,[98][99][100][113][114][115][116][117][118][119][120][121][122]. The culmination of these approaches can be seen in the high performances of the various algorithms submitted as part of the IARPA ODIN program 11 and also the public fingerprint and face liveness competitions (Table 2) [95,97].…”
Section: Presentation Attacksmentioning
confidence: 99%
“…Then the same group of researchers studied how to use those networks to detect more challenging attacks in [61]. Since those initial works based in deep learning, over the past few years, many works have continued to work in that direction, proposing novel PAD methods based on on deep architectures including attention learning [11,21], adversarial learning [69,70], and several approaches based on popular convolutional features [20].…”
Section: Software-based Approachesmentioning
confidence: 99%