Publications of TABULA RASA sorted by title
A
| A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(7):1788-1794, 2013 |
[DOI] [URL] |
| Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
| Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
| Anti-Spoofing: Face Databases, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] [URL] |
B
| Bi-Modal Authentication in Mobile Environments Using Session Variability Modelling, , , , and , Idiap-RR-18-2012 |
|
| Bi-Modal Authentication in Mobile Environments Using Session Variability Modelling, , , , and , in: Proceedings of the 21st International Conference on Pattern Recognition, 2012 |
|
| Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , Idiap-RR-13-2012 |
|
| Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , in: IEEE ICME Workshop on Hot Topics in Mobile Multimedia, 2012 |
|
| Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
| Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
| Biometrics systems under spoofing attack: an evaluation methodology and lessons learned, , , and , in: IEEE Signal Processing Magazine, 2015 |
|
| Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , in: Proceedings of the ACM Multimedia Conference, 2012 |
[URL] |
| Boosting Localized Features for Speaker and Speech Recognition, , Ecole Polytechnique Federale de Lausanne (EPFL), 2011 |
|
C
| Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
| Competition on Counter Measures to 2-D Facial Spoofing Attacks, , , , , , , , , , , , , , , , , , , , , , , and , in: Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011 |
|
| Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
| Continuous Speech Recognition using Boosted Binary Features, , and , Idiap-RR-35-2011 |
|
| Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline, and , in: International Joint Conference on Biometrics 2011, 2011 |
[URL] |
E
| Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
F
| Face Anti-spoofing: Visual Approach, , , , and , in: Handbook of Biometric Anti-Spoofing, pages 65-82, Springer-Verlag, 2014 |
[DOI] |
| Face liveness detection using dynamic texture, , , , , , and , in: EURASIP Journal on Image and Video Processing, 2, 2014 |
[DOI] [URL] |
| Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
I
| Inter-session Variability Modelling and Joint Factor Analysis for Face Authentication, , , and , Idiap-RR-28-2011 |
|
L
| LBP-TOP based countermeasure against face spoofing attacks, , , and , in: International Workshop on Computer Vision With Local Binary Pattern Variants - ACCV, pages 12, 2012 |
|
M
| Motion-Based Counter-Measures to Photo Attacks in Face Recognition, , and , in: Institution of Engineering and Technology Journal on Biometrics, 2013 |
[URL] |
N
| Notes on Probabilistic Linear Discriminant Analysis, and , Idiap-Com-03-2013 |
|
O
| On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|
| On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
|
| On the Vulnerability of Palm Vein Recognition to Spoofing Attacks, and , in: The 8th IAPR International Conference on Biometrics (ICB), pages 319 - 325, 2015 |
[DOI] [URL] |
S
| ScoreToolKit Documentation, and , Idiap-Com-02-2012 |
|
| Session Variability Modelling for Face Authentication, , , , and , Idiap-RR-17-2013 |
|
| Session variability modelling for face authentication, , , , and , in: IET Biometrics, 2(3):117-129, 2013 |
[DOI] |
| Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , Idiap-RR-42-2013 |
|
| Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , in: International Conference of the Biometrics Special Interes Group, Darmstadt, Germany, 2013 |
|
| Spoofing Face Recognition with 3D Masks, and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY:1084-1097, 2014 |
[DOI] |
| Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , Idiap-RR-27-2013 |
|
| Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , in: Biometrics: Theory, Applications and Systems, Washington DC, USA, 2013 |
|
T
| The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks, , , , , , , , , and , in: The 8th IAPR International Conference on Biometrics (ICB), pages 513 - 518, 2015 |
[DOI] [URL] |
| The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
| The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|