Competition on Counter Measures to 2-D Facial Spoofing Attacks

TRONCI, ROBERTO;ROLI, FABIO;
2011-01-01

Abstract

Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition is to compare the performance of different state-of-the-art algorithms on the same database using a unique evaluation method. Six different teams from universities around the world have participated in the contest. Use of one or multiple techniques from motion, texture analysis and liveness detection appears to be the common trend in this competition. Most of the algorithms are able to clearly separate spoof attempts from real accesses. The results suggest the investigation of more complex attacks.
2011
Proceedings on International Joint Conference on Biometrics (IJCB 2011)
978-1-4577-1358-3
IEEE Computer Society Press
1
6
6
http://dx.doi.org/10.1109/IJCB.2011.6117509
International Joint Conference on Biometrics (IJCB 2011)
Esperti anonimi
2011
Washington DC, USA
internazionale
4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno
Murali Mohan, Chakka; André, Anjos; Sebastien, Marcel; Tronci, Roberto; Daniele, Muntoni; Gianluca, Fadda; Maurizio, Pili; Nicola Sirena :Gabriele, Mu ...espandi
273
23
4.1 Contributo in Atti di convegno
none
info:eu-repo/semantics/conferenceObject
Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Questionnaire and social

Share on:
Impostazioni cookie