%Aigaion2 BibTeX export from Idiap Publications %Thursday 21 November 2024 11:37:23 AM @INCOLLECTION{Chingovska_SPRINGER_2019, author = {Chingovska, Ivana and Mohammadi, Amir and Anjos, Andr{\'{e}} and Marcel, S{\'{e}}bastien}, editor = {Marcel, S{\'{e}}bastien and Nixon, Mark and Fierrez, Julian and Evans, Nicholas}, projects = {SWAN}, title = {Evaluation Methodologies for Biometric Presentation Attack Detection}, booktitle = {Handbook of Biometric Anti-Spoofing}, edition = {2nd}, chapter = {20}, year = {2019}, publisher = {Springer International Publishing}, isbn = {978-3-319-92627-8}, url = {https://www.springer.com/us/book/9783319926261}, doi = {10.1007/978-3-319-92627-8}, abstract = {Presentation attack detection (PAD, also known as anti-spoofing) systems, regardless of the technique, biometric mode or degree of independence of external equipment, are most commonly treated as binary classification systems. The two classes that they differentiate are bona-fide and presentation attack samples. From this perspective, their evaluation is equivalent to the established evaluation standards for the binary classification systems. However, PAD systems are designed to operate in conjunction with recognition systems and as such can affect their performance. From the point of view of a recognition system, the presentation attacks are a separate class that they need to be detected and rejected. As the problem of presentation attack detection grows to this pseudo-ternary status, the evaluation methodologies for the recognition systems need to be revised and updated. Consequentially, the database requirements for presentation attack databases become more specific. The focus of this chapter is the task of biometric verification and its scope is three-fold: firstly, it gives the definition of the presentation attack detection problem from the two perspectives. Secondly, it states the database requirements for a fair and unbiased evaluation. Finally, it gives an overview of the existing evaluation techniques for presentation attacks detection systems and verification systems under presentation attacks.}, pdf = {https://publications.idiap.ch/attachments/papers/2018/Chingovska_SPRINGER_2019.pdf} }