Publications of TABULA RASA sorted by first author
A
Motion-Based Counter-Measures to Photo Attacks in Face Recognition, , and , in: Institution of Engineering and Technology Journal on Biometrics, 2013 |
[URL] |
Anti-Spoofing: Face Databases, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] [URL] |
Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , in: Proceedings of the ACM Multimedia Conference, 2012 |
[URL] |
Face Anti-spoofing: Visual Approach, , , , and , in: Handbook of Biometric Anti-Spoofing, pages 65-82, Springer-Verlag, 2014 |
[DOI] |
ScoreToolKit Documentation, and , Idiap-Com-02-2012 |
|
Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline, and , in: International Joint Conference on Biometrics 2011, 2011 |
[URL] |
C
Competition on Counter Measures to 2-D Facial Spoofing Attacks, , , , , , , , , , , , , , , , , , , , , , , and , in: Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011 |
|
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
|
Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
D
Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
LBP-TOP based countermeasure against face spoofing attacks, , , and , in: International Workshop on Computer Vision With Local Binary Pattern Variants - ACCV, pages 12, 2012 |
|
Face liveness detection using dynamic texture, , , , , , and , in: EURASIP Journal on Image and Video Processing, 2, 2014 |
[DOI] [URL] |
E
A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(7):1788-1794, 2013 |
[DOI] [URL] |
Spoofing Face Recognition with 3D Masks, and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY:1084-1097, 2014 |
[DOI] |
Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , Idiap-RR-42-2013 |
|
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , Idiap-RR-27-2013 |
|
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , in: Biometrics: Theory, Applications and Systems, Washington DC, USA, 2013 |
|
Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , in: International Conference of the Biometrics Special Interes Group, Darmstadt, Germany, 2013 |
|
H
Biometrics systems under spoofing attack: an evaluation methodology and lessons learned, , , and , in: IEEE Signal Processing Magazine, 2015 |
|
K
Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
M
Notes on Probabilistic Linear Discriminant Analysis, and , Idiap-Com-03-2013 |
|
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , Idiap-RR-13-2012 |
|
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , in: IEEE ICME Workshop on Hot Topics in Mobile Multimedia, 2012 |
|
Session Variability Modelling for Face Authentication, , , , and , Idiap-RR-17-2013 |
|
Session variability modelling for face authentication, , , , and , in: IET Biometrics, 2(3):117-129, 2013 |
[DOI] |
Bi-Modal Authentication in Mobile Environments Using Session Variability Modelling, , , , and , Idiap-RR-18-2012 |
|
Bi-Modal Authentication in Mobile Environments Using Session Variability Modelling, , , , and , in: Proceedings of the 21st International Conference on Pattern Recognition, 2012 |
|
R
Boosting Localized Features for Speaker and Speech Recognition, , Ecole Polytechnique Federale de Lausanne (EPFL), 2011 |
|
Continuous Speech Recognition using Boosted Binary Features, , and , Idiap-RR-35-2011 |
|
T
On the Vulnerability of Palm Vein Recognition to Spoofing Attacks, and , in: The 8th IAPR International Conference on Biometrics (ICB), pages 319 - 325, 2015 |
[DOI] [URL] |
The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks, , , , , , , , , and , in: The 8th IAPR International Conference on Biometrics (ICB), pages 513 - 518, 2015 |
[DOI] [URL] |
W
Inter-session Variability Modelling and Joint Factor Analysis for Face Authentication, , , and , Idiap-RR-28-2011 |
|