Keywords:
- 2D attacks
- Anti-spoofing
- biometric recognition
- Biometric Verification
- Biometrics
- C++
- Competition
- Counter-Measures
- Counter-Spoofing
- face spoofing
- Fusion
- Liveness Detection
- Local Binary Patterns
- machine learning
- Open Source
- pad eps epsc anti-spoofing fusion
- presentation attack
- python
- recognition
- Replay
- Replay-Attack
- Reproducible research
- security
- Spoofing
- Spoofing Attacks
- trustworthy
- verification
- vulnerability
Publications of Ivana Chingovska sorted by recency
Evaluation Methodologies for Biometric Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
Trustworthy Biometric Verification under Spoofing Attacks: Application to the Face Mode, , École Polytechnique Fédérale de Lausanne, 2015 |
[URL] |
Face Recognition Systems Under Spoofing Attacks, , , and , Idiap-RR-18-2020 |
|
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
Anti-Spoofing: Face Databases, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] [URL] |
Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|