Publications of TABULA RASA sorted by journal and type
Publications of type Idiap-RR
2014
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
2013
Session Variability Modelling for Face Authentication, , , , and , Idiap-RR-17-2013 |
|
Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , Idiap-RR-42-2013 |
|
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , Idiap-RR-27-2013 |
|
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
2012
Bi-Modal Authentication in Mobile Environments Using Session Variability Modelling, , , , and , Idiap-RR-18-2012 |
|
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , Idiap-RR-13-2012 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|
2011
Continuous Speech Recognition using Boosted Binary Features, , and , Idiap-RR-35-2011 |
|
Inter-session Variability Modelling and Joint Factor Analysis for Face Authentication, , , and , Idiap-RR-28-2011 |
|
Publications of type Idiap-Com
2013
Notes on Probabilistic Linear Discriminant Analysis, and , Idiap-Com-03-2013 |
|
2012
ScoreToolKit Documentation, and , Idiap-Com-02-2012 |
|
IEEE Signal Processing Magazine
Biometrics systems under spoofing attack: an evaluation methodology and lessons learned, , , and , in: IEEE Signal Processing Magazine, 2015 |
|
EURASIP Journal on Image and Video Processing
Face liveness detection using dynamic texture, , , , , , and , in: EURASIP Journal on Image and Video Processing, 2, 2014 |
[DOI] [URL] |
IEEE Transactions on Information Forensics and Security
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Spoofing Face Recognition with 3D Masks, and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY:1084-1097, 2014 |
[DOI] |
IEEE Transactions on Pattern Analysis and Machine Intelligence
A Scalable Formulation of Probabilistic Linear Discriminant Analysis: Applied to Face Recognition, , , and , in: IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(7):1788-1794, 2013 |
[DOI] [URL] |
IET Biometrics
Session variability modelling for face authentication, , , , and , in: IET Biometrics, 2(3):117-129, 2013 |
[DOI] |
Institution of Engineering and Technology Journal on Biometrics
Motion-Based Counter-Measures to Photo Attacks in Face Recognition, , and , in: Institution of Engineering and Technology Journal on Biometrics, 2013 |
[URL] |
Face Recognition Systems Under Spoofing Attacks (2016)
Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
Encyclopedia of Biometrics (2014)
Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
Anti-Spoofing: Face Databases, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] [URL] |
Handbook of Biometric Antispoofing (2014)
Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
Handbook of Biometric Anti-Spoofing (2014)
Face Anti-spoofing: Visual Approach, , , , and , in: Handbook of Biometric Anti-Spoofing, pages 65-82, Springer-Verlag, 2014 |
[DOI] |
The 8th IAPR International Conference on Biometrics (ICB) (2015)
On the Vulnerability of Palm Vein Recognition to Spoofing Attacks, and , in: The 8th IAPR International Conference on Biometrics (ICB), pages 319 - 325, 2015 |
[DOI] [URL] |
The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks, , , , , , , , , and , in: The 8th IAPR International Conference on Biometrics (ICB), pages 513 - 518, 2015 |
[DOI] [URL] |
Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics (2013)
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
International Conference on Biometrics (2013)
Can face anti-spoofing countermeasures work in a real world scenario?, , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
Complementary Countermeasures for Detecting Scenic Face Spoofing Attacks, , , , and , in: International Conference on Biometrics, Madrid, Spain, 2013 |
[URL] |
International Conference of the Biometrics Special Interes Group (2013)
Spoofing Attacks To 2D Face Recognition Systems With 3D Masks, and , in: International Conference of the Biometrics Special Interes Group, Darmstadt, Germany, 2013 |
|
Biometrics: Theory, Applications and Systems (2013)
Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect, and , in: Biometrics: Theory, Applications and Systems, Washington DC, USA, 2013 |
|
International Conference of Biometrics 2013 (2013)
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
Proceedings of the 21st International Conference on Pattern Recognition (2012)
Bi-Modal Authentication in Mobile Environments Using Session Variability Modelling, , , , and , in: Proceedings of the 21st International Conference on Pattern Recognition, 2012 |
|
IEEE ICME Workshop on Hot Topics in Mobile Multimedia (2012)
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , in: IEEE ICME Workshop on Hot Topics in Mobile Multimedia, 2012 |
|
International Workshop on Computer Vision With Local Binary Pattern Variants - ACCV (2012)
LBP-TOP based countermeasure against face spoofing attacks, , , and , in: International Workshop on Computer Vision With Local Binary Pattern Variants - ACCV, pages 12, 2012 |
|
Proceedings of the 11th International Conference of the Biometrics Special Interes Group (2012)
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
|
Proceedings of the ACM Multimedia Conference (2012)
Bob: a free signal processing and machine learning toolbox for researchers, , , , , and , in: Proceedings of the ACM Multimedia Conference, 2012 |
[URL] |
Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA (2011)
Competition on Counter Measures to 2-D Facial Spoofing Attacks, , , , , , , , , , , , , , , , , , , , , , , and , in: Proceedings of IAPR IEEE International Joint Conference on Biometrics (IJCB), Washington DC, USA, 2011 |
|
International Joint Conference on Biometrics 2011 (2011)
Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline, and , in: International Joint Conference on Biometrics 2011, 2011 |
[URL] |
Publications of type Phdthesis
2011
Boosting Localized Features for Speaker and Speech Recognition, , Ecole Polytechnique Federale de Lausanne (EPFL), 2011 |
|