logo Idiap Research Institute        
 [BibTeX] [Marc21]
Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline
Type of publication: Conference paper
Citation: Anjos_IJCB_2011
Publication status: Published
Booktitle: International Joint Conference on Biometrics 2011
Year: 2011
Month: October
URL: http://pypi.python.org/pypi/an...
Abstract: A common technique to by-pass 2-D face recognition systems is to use photographs of spoofed identities. Unfortunately, research in counter-measures to this type of attack have not kept-up - even if such threats have been known for nearly a decade, there seems to exist no consensus on best practices, techniques or protocols for developing and testing spoofing-detectors for face recognition. We attribute the reason for this delay, partly, to the unavailability of public databases and protocols to study solutions and compare results. To this purpose we introduce the publicly available PRINT-ATTACK database and exemplify how to use its companion protocol with a motion-based algorithm that detects correlations between the person's head movements and the scene context. The results are to be used as basis for comparison to other counter-measure techniques. The PRINT-ATTACK database contains 200 videos of real-accesses and 200 videos of spoof attempts using printed photographs of 50 different identities.
Keywords: Attack, Counter-Measures, Counter-Spoofing, Disguise, Dishonest Acts, Face Recognition, Forgery, Liveness Detection, Replay, Spoofing, Trick
Authors Anjos, André
Marcel, Sébastien
Added by: [UNK]
Total mark: 0
  • Anjos_IJCB_2011.pdf
       (IJCB'11 Camera Ready version)