%Aigaion2 BibTeX export from Idiap Publications
%Tuesday 03 December 2024 06:22:15 PM

@INPROCEEDINGS{Nikisins_ICB2018_2018,
         author = {Nikisins, Olegs and Mohammadi, Amir and Anjos, Andr{\'{e}} and Marcel, S{\'{e}}bastien},
       projects = {ODIN/BATL, SWAN},
          month = feb,
          title = {On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-Spoofing},
      booktitle = {The 11th IAPR International Conference on Biometrics (ICB 2018)},
           year = {2018},
       abstract = {While face recognition systems got a significant boost in terms of recognition performance in recent years, they are known to be vulnerable to presentation attacks. Up to date, most of the research in the field of face anti-spoofing or presentation attack detection was considered as a two-class classification task: features of bona-fide samples versus features coming from spoofing attempts. The main focus has been on boosting the anti-spoofing performance for databases with identical types of attacks across both training and evaluation subsets. However, in realistic applications the types of attacks are likely to be unknown, potentially occupying a broad space in the feature domain. Therefore, a failure to generalize on unseen types of attacks is one of the main potential challenges in existing anti-spoofing approaches. First, to demonstrate the generalization issues of two-class anti-spoofing systems we establish new evaluation protocols for existing publicly available databases. Second, to unite the data collection efforts of various institutions we introduce a challenging Aggregated database composed of 3 publicly available datasets: Replay-Attack, Replay-Mobile and MSU MFSD, reporting the performance on it. Third, considering existing limitations we propose a number of systems approaching a task of presentation attack detection as an anomaly detection, or a one-class classification problem, using only bona-fide features in the training stage. Using less training data, hence requiring less effort in the data collection, the introduced approach demonstrates a better generalization properties against previously unseen types of attacks on the proposed Aggregated database.},
            pdf = {https://publications.idiap.ch/attachments/papers/2018/Nikisins_ICB2018_2018.pdf}
}