%Aigaion2 BibTeX export from Idiap Publications %Saturday 21 December 2024 07:09:03 PM @ARTICLE{Chingovska_IEEETIFS_2014, author = {Chingovska, Ivana and Anjos, Andr{\'{e}} and Marcel, S{\'{e}}bastien}, projects = {Idiap, TABULA RASA, BEAT}, month = dec, title = {Biometrics Evaluation Under Spoofing Attacks}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {9}, number = {12}, year = {2014}, pages = {2264-2276}, issn = {1556-6013}, doi = {10.1109/Tifs.2014.2349158}, crossref = {Chingovska_Idiap-RR-12-2014}, abstract = {Abstract—While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes. However, an important, but often overlooked issue regards their engagement into a verification task and how to measure their impact on the verification systems themselves. A novel evaluation framework for verification systems under spoofing attacks, called Expected Performance and Spoofability (EPS) framework, is the major contribution of this paper. Its purpose is to serve for an objective comparison of different verification systems with regards to their verification performance and vulnerability to spoofing, taking into account the system’s application-dependent susceptibility to spoofing attacks and cost of the errors. The convenience of the proposed open-source framework is demonstrated for the face mode, by comparing the security guarantee of four baseline face verification systems before and after they are secured with anti-spoofing algorithms.}, pdf = {https://publications.idiap.ch/attachments/papers/2014/Chingovska_IEEETIFS_2014.pdf} } crossreferenced publications: @TECHREPORT{Chingovska_Idiap-RR-12-2014, author = {Chingovska, Ivana and Anjos, Andr{\'{e}} and Marcel, S{\'{e}}bastien}, projects = {Idiap, TABULA RASA, BEAT}, month = {8}, title = {Biometrics Evaluation under Spoofing Attacks}, type = {Idiap-RR}, number = {Idiap-RR-12-2014}, year = {2014}, institution = {Idiap}, note = {IEEE Transactions of Information Forensics and Security: in minor revision}, pdf = {https://publications.idiap.ch/attachments/reports/2013/Chingovska_Idiap-RR-12-2014.pdf} }