CONF Chingovska_ICB2013_2013/IDIAP The 2nd competition on counter measures to 2D face spoofing attacks Chingovska, Ivana Yang, Jinwei Lei, Zhen Yi, Dong Z.Li, Stan Kähm, Olga Damer, Naser Glaser, Christian Kuijper, Arjan Nouak, Alexander Komulainen, Jukka de Freitas Pereira, Tiago Gupta, Shubham Bansal, Shubham Khandelwal, Shubham Rai, Ayush Krishna, Tarun Goyal, Dushyant Waris, Muhammad-Adeel Zhang, Honglei Ahmad, Iftikhar Kiranyaz, Serkan Gabbouj, Moncef Tronci, Roberto Pili, Maurizio Sirena, Nicola Roli, Fabio Galbally, Javier Fierrez, Julian Pinto, Allan Pedrini, Helio Schwartz, William Robson Rocha, Anderson Anjos, André Marcel, Sébastien Anti-spoofing Competition Counter-Measures face spoofing presentation attack EXTERNAL https://publications.idiap.ch/attachments/papers/2013/Chingovska_ICB2013_2013.pdf PUBLIC https://publications.idiap.ch/index.php/publications/showcite/Chingovska_Idiap-RR-18-2013 Related documents International Conference of Biometrics 2013 Madrid, Spain 2013 As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive in form of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create counter measures effectively detecting a variety of attacks. The submitted propositions are evaluated on the Replay-Attack database and the achieved results are presented in this paper. REPORT Chingovska_Idiap-RR-18-2013/IDIAP The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks Chingovska, Ivana Anjos, André Marcel, Sébastien 2D attacks Competition Counter-Measures Replay-Attack Spoofing EXTERNAL https://publications.idiap.ch/attachments/reports/2013/Chingovska_Idiap-RR-18-2013.pdf PUBLIC Idiap-RR-18-2013 2013 Idiap May 2013 As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive in form of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create counter measures effectively detecting a variety of attacks. The submitted propositions are evaluated on the Replay-Attack database and the achieved results are presented in this paper.