%Aigaion2 BibTeX export from Idiap Publications
%Wednesday 20 November 2024 12:33:50 AM

@INPROCEEDINGS{Chingovska_IEEEBIOSIG2012_2012,
         author = {Chingovska, Ivana and Anjos, Andr{\'{e}} and Marcel, S{\'{e}}bastien},
       projects = {Idiap, TABULA RASA},
          month = sep,
          title = {On the Effectiveness of Local Binary Patterns in Face Anti-spoofing},
      booktitle = {Proceedings of the 11th International Conference of the Biometrics Special Interes Group},
           year = {2012},
       crossref = {Chingovska_Idiap-RR-19-2012},
       abstract = {Spoofing attacks are one of the security traits that
biometric recognition systems are proven to be vulnerable to.
When spoofed, a biometric recognition system is bypassed by
presenting a copy of the biometric evidence of a valid user. Among
all biometric modalities, spoofing a face recognition system is
particularly easy to perform: all that is needed is a simple
photograph of the user.
In this paper, we address the problem of detecting face spoofing
attacks. In particular, we inspect the potential of texture features
based on Local Binary Patterns (LBP) and their variations on
three types of attacks: printed photographs, and photos and
videos displayed on electronic screens of different sizes. For
this purpose, we introduce REPLAY-ATTACK, a novel publicly
available face spoofing database which contains all the mentioned
types of attacks. We conclude that LBP, with 15\% Half Total
Error Rate, show moderate discriminability when confronted
with a wide set of attack types.},
            pdf = {https://publications.idiap.ch/attachments/papers/2012/Chingovska_IEEEBIOSIG2012_2012.pdf}
}



crossreferenced publications: 
@TECHREPORT{Chingovska_Idiap-RR-19-2012,
         author = {Chingovska, Ivana and Anjos, Andr{\'{e}} and Marcel, S{\'{e}}bastien},
       keywords = {Biometrics, Counter-Measures, Local Binary Patterns, Spoofing Attacks},
       projects = {TABULA RASA},
          month = {7},
          title = {On the Effectiveness of Local Binary Patterns in Face Anti-spoofing},
           type = {Idiap-RR},
        journal = {IEEE BIOSIG 2012},
         number = {Idiap-RR-19-2012},
           year = {2012},
    institution = {Idiap},
       abstract = {Spoofing attacks are one of the security traits that biometric recognition systems are proven to be vulnerable to. When spoofed, a biometric recognition system is bypassed by presenting a copy of the biometric evidence of a valid user. Among all biometric modalities, spoofing a face recognition system is particularly easy to perform: all that is needed is a simple photograph of the user.

In this paper, we address the problem of detecting face spoofing attacks. In particular, we inspect the potential of texture features based on Local Binary Patterns (LBP) and their variations on three types of attacks: printed photographs, and photos and videos displayed on electronic screens of different sizes. For this purpose, we introduce REPLAY-ATTACK, a novel publicly available face spoofing database which contains all the mentioned types of attacks. We conclude that LBP, with  ~15\% Half Total Error Rate, show moderate discriminability when confronted with a wide set of attack types.},
            pdf = {https://publications.idiap.ch/attachments/reports/2012/Chingovska_Idiap-RR-19-2012.pdf}
}