<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
	<record>
		<datafield tag="980" ind1=" " ind2=" ">
			<subfield code="a">ARTICLE</subfield>
		</datafield>
		<datafield tag="970" ind1=" " ind2=" ">
			<subfield code="a">Chingovska_IEEETIFS_2014/IDIAP</subfield>
		</datafield>
		<datafield tag="245" ind1=" " ind2=" ">
			<subfield code="a">Biometrics Evaluation Under Spoofing Attacks</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Chingovska, Ivana</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Anjos, André</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Marcel, Sébastien</subfield>
		</datafield>
		<datafield tag="856" ind1="4" ind2="0">
			<subfield code="i">EXTERNAL</subfield>
			<subfield code="u">http://publications.idiap.ch/attachments/papers/2014/Chingovska_IEEETIFS_2014.pdf</subfield>
			<subfield code="x">PUBLIC</subfield>
		</datafield>
		<datafield tag="856" ind1="4" ind2=" ">
			<subfield code="u">http://publications.idiap.ch/index.php/publications/showcite/Chingovska_Idiap-RR-12-2014</subfield>
			<subfield code="z">Related documents</subfield>
		</datafield>
		<datafield tag="773" ind1=" " ind2=" ">
			<subfield code="p">IEEE Transactions on Information Forensics and Security</subfield>
			<subfield code="v">9</subfield>
			<subfield code="n">12</subfield>
			<subfield code="c">2264-2276</subfield>
			<subfield code="x">1556-6013</subfield>
		</datafield>
		<datafield tag="260" ind1=" " ind2=" ">
			<subfield code="c">2014</subfield>
		</datafield>
		<datafield tag="024" ind1="7" ind2=" ">
			<subfield code="a">10.1109/Tifs.2014.2349158</subfield>
			<subfield code="2">doi</subfield>
		</datafield>
		<datafield tag="520" ind1=" " ind2=" ">
			<subfield code="a">Abstract—While more accurate and reliable than ever, the
trustworthiness of biometric verification systems is compromised
by the emergence of spoofing attacks. Responding to this threat,
numerous research publications address isolated spoofing detection,
resulting in efficient counter-measures for many biometric
modes. However, an important, but often overlooked issue
regards their engagement into a verification task and how to
measure their impact on the verification systems themselves.
A novel evaluation framework for verification systems under
spoofing attacks, called Expected Performance and Spoofability
(EPS) framework, is the major contribution of this paper. Its
purpose is to serve for an objective comparison of different verification
systems with regards to their verification performance
and vulnerability to spoofing, taking into account the system’s
application-dependent susceptibility to spoofing attacks and cost
of the errors. The convenience of the proposed open-source
framework is demonstrated for the face mode, by comparing
the security guarantee of four baseline face verification systems
before and after they are secured with anti-spoofing algorithms.</subfield>
		</datafield>
	</record>
	<record>
		<datafield tag="980" ind1=" " ind2=" ">
			<subfield code="a">REPORT</subfield>
		</datafield>
		<datafield tag="970" ind1=" " ind2=" ">
			<subfield code="a">Chingovska_Idiap-RR-12-2014/IDIAP</subfield>
		</datafield>
		<datafield tag="245" ind1=" " ind2=" ">
			<subfield code="a">Biometrics Evaluation under Spoofing Attacks</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Chingovska, Ivana</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Anjos, André</subfield>
		</datafield>
		<datafield tag="700" ind1=" " ind2=" ">
			<subfield code="a">Marcel, Sébastien</subfield>
		</datafield>
		<datafield tag="856" ind1="4" ind2="0">
			<subfield code="i">EXTERNAL</subfield>
			<subfield code="u">http://publications.idiap.ch/attachments/reports/2013/Chingovska_Idiap-RR-12-2014.pdf</subfield>
			<subfield code="x">PUBLIC</subfield>
		</datafield>
		<datafield tag="088" ind1=" " ind2=" ">
			<subfield code="a">Idiap-RR-12-2014</subfield>
		</datafield>
		<datafield tag="260" ind1=" " ind2=" ">
			<subfield code="c">2014</subfield>
			<subfield code="b">Idiap</subfield>
		</datafield>
		<datafield tag="771" ind1="2" ind2=" ">
			<subfield code="d">August 2014</subfield>
		</datafield>
		<datafield tag="500" ind1=" " ind2=" ">
			<subfield code="a">IEEE Transactions of Information Forensics and Security: in minor revision</subfield>
		</datafield>
	</record>
</collection>