Competition on counter measures to 2-D facial spoofing attacks


Autoria(s): Mohan Chakka, Murali; Anjos, André; Marcel, Sébastien; Tronci, Roberto; Muntoni, Daniele; Fadda, Gianluca; Pili, Maurizio; Sirena, Nicola; Murgia, Gabriele; Ristori, Marco; Roli, Fabio; Yan, Junjie; Yi, Dong; Lei, Zhen; Zhang, Zhiwei; Li, Stan Z.; Schwartz, William Robson; Rocha, Anderson; Pedrini, Helio; Lorenzo Navarro, José Javier; Castrillón-Santana, Modesto; Määttä, Jukka; Hadid, Abdenour; Pietikäinen, Matti
Data(s)

24/11/2015

24/11/2015

2011

Resumo

<p>[EN]Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative stud- ies of di erent techniques using the same protocols and data. The motivation behind this competition is to com- pare the performance of di erent state-of-the-art algo- rithms on the same database using a unique evaluation method. Six di erent teams from universities around the world have participated in the contest.</p>

Identificador

http://hdl.handle.net/10553/15082

716479

<p>10.1109/IJCB.2011.6117509</p>

Idioma(s)

eng

Direitos

info:eu-repo/semantics/openAccess

Fonte

<p>Biometrics (IJCB), 2011 International Joint Conference on Biometrics Compendium, IEEE</p>

Palavras-Chave #120304 Inteligencia artificial
Tipo

info:eu-repo/semantics/conferenceObject