CONF
Chingovska_ICB2013_2013/IDIAP
The 2nd competition on counter measures to 2D face spoofing attacks
Chingovska, Ivana
Yang, Jinwei
Lei, Zhen
Yi, Dong
Z.Li, Stan
Kähm, Olga
Damer, Naser
Glaser, Christian
Kuijper, Arjan
Nouak, Alexander
Komulainen, Jukka
de Freitas Pereira, Tiago
Gupta, Shubham
Bansal, Shubham
Khandelwal, Shubham
Rai, Ayush
Krishna, Tarun
Goyal, Dushyant
Waris, Muhammad-Adeel
Zhang, Honglei
Ahmad, Iftikhar
Kiranyaz, Serkan
Gabbouj, Moncef
Tronci, Roberto
Pili, Maurizio
Sirena, Nicola
Roli, Fabio
Galbally, Javier
Fierrez, Julian
Pinto, Allan
Pedrini, Helio
Schwartz, William Robson
Rocha, Anderson
Anjos, André
Marcel, Sébastien
Anti-spoofing
Competition
Counter-Measures
face spoofing
presentation attack
EXTERNAL
https://publications.idiap.ch/attachments/papers/2013/Chingovska_ICB2013_2013.pdf
PUBLIC
https://publications.idiap.ch/index.php/publications/showcite/Chingovska_Idiap-RR-18-2013
Related documents
International Conference of Biometrics 2013
Madrid, Spain
2013
As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive in form of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create counter measures effectively detecting a variety of attacks. The submitted propositions are evaluated on the Replay-Attack database and the achieved results are presented in this paper.
REPORT
Chingovska_Idiap-RR-18-2013/IDIAP
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks
Chingovska, Ivana
Anjos, André
Marcel, Sébastien
2D attacks
Competition
Counter-Measures
Replay-Attack
Spoofing
EXTERNAL
https://publications.idiap.ch/attachments/reports/2013/Chingovska_Idiap-RR-18-2013.pdf
PUBLIC
Idiap-RR-18-2013
2013
Idiap
May 2013
As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive in form of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create counter measures effectively detecting a variety of attacks. The submitted propositions are evaluated on the Replay-Attack database and the achieved results are presented in this paper.