Competition on counter measures to 2-D facial spoofing attacks
Data(s) |
24/11/2015
24/11/2015
2011
|
---|---|
Resumo |
<p>[EN]Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative stud- ies of di erent techniques using the same protocols and data. The motivation behind this competition is to com- pare the performance of di erent state-of-the-art algo- rithms on the same database using a unique evaluation method. Six di erent teams from universities around the world have participated in the contest.</p> |
Identificador |
http://hdl.handle.net/10553/15082 716479 <p>10.1109/IJCB.2011.6117509</p> |
Idioma(s) |
eng |
Direitos |
info:eu-repo/semantics/openAccess |
Fonte |
<p>Biometrics (IJCB), 2011 International Joint Conference on Biometrics Compendium, IEEE</p> |
Palavras-Chave | #120304 Inteligencia artificial |
Tipo |
info:eu-repo/semantics/conferenceObject |