CONF
Chakka_IJCB2011_2011/IDIAP
Competition on Counter Measures to 2-D Facial Spoofing Attacks
Chakka, Murali Mohan
Anjos, André
Marcel, Sébastien
Tronci, Roberto
Muntoni, Daniele
Fadda, Gianluca
Pili, Maurizio
Sirena, Nicola
Murgia, Gabriele
Ristori, Marco
Roli, Fabio
Yan, Junjie
Yi, Dong
Lei, Zhen
Zhang, Zhiwei
Z.Li, Stan
Schwartz, William Robson
Rocha, Anderson
Pedrini, Helio
Lorenzo-Navarro, Javier
Castrillón-Santana, Modesto
Maatta, Jukka
Hadid, Abdenour
Pietikainen, Matti
2-D Face
Anti-spoofing
Competition
Counter-Measures
Face Recognition
Replay Attacks
Spoofing Attacks
EXTERNAL
https://publications.idiap.ch/attachments/papers/2011/Chakka_IJCB2011_2011.pdf
PUBLIC
Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA
2011
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition is to compare the performance of different state-of-the-art algorithms on the same database using a unique evaluation method. Six different teams from universities around the world have participated in the contest. Use of one
or multiple techniques from motion, texture analysis and liveness detection appears to be the common trend in this competition. Most of the algorithms are able to clearly separate spoof attempts from real accesses. The results suggest the investigation of more complex attacks.