%Aigaion2 BibTeX export from Idiap Publications %Thursday 09 January 2025 05:38:10 AM @INCOLLECTION{Chingovska_SPRINGER-2_2014, author = {Chingovska, Ivana and Anjos, Andr{\'{e}} and Marcel, S{\'{e}}bastien}, editor = {Z.Li, Stan and Jain, Anil}, projects = {TABULA RASA}, title = {Anti-spoofing: Evaluation Methodologies}, booktitle = {Encyclopedia of Biometrics}, edition = {2nd edition}, year = {2014}, publisher = {Springer US}, isbn = {978-3-642-27733-7}, doi = {10.1007/978-3-642-27733-7}, abstract = {Following the definition of the task of the anti-spoofing systems to discriminate between real accesses and spoofing attacks, anti-spoofing can be regarded as a binary classification problem. The spoofing databases and the evaluation methodologies for anti-spoofing systems most often comply to the standards for binary classification problems. However, the anti-spoofing systems are not destined to work stand-alone, and their main purpose is to protect a verification system from spoofing attacks. In the process of combining the decision of an anti-spoofing and a recognition system, effects on the recognition performance can be expected. Therefore, it is important to analyze the problem of anti-spoofing under the umbrella of biometric recognition systems. This brings certain requirements in the database design, as well as adapted concepts for evaluation of biometric recognition systems under spoofing attacks.} }