2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops 2013
DOI: 10.1109/cvprw.2013.22
|View full text |Cite
|
Sign up to set email alerts
|

Anti-spoofing in Action: Joint Operation with a Verification System

Abstract: Besides the recognition task, today's biometric systems need to cope with additional problem: spoofing attacks. Up to date, academic research considers spoofing as a binary classification problem: systems are trained to discriminate between real accesses and attacks. However, spoofing counter-measures are not designated to operate stand-alone, but as a part of a recognition system they will protect. In this paper, we study techniques for decisionlevel and score-level fusion to integrate a recognition and anti-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
59
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 59 publications
(60 citation statements)
references
References 23 publications
1
59
0
Order By: Relevance
“…Also the fusion of the knowledge provided by the skilled detector and the verification score will be improved, following the examples of previous works on anti-spoofing and verification systems fusion in [4,14], where different sequential-and classifier-based approaches, as well as decision-and scorelevel fusion of anti-spoofing and verification systems, for face and fingerprint, are explored. Other signature matchers and databases will be taken into account as well.…”
Section: Discussionmentioning
confidence: 99%
“…Also the fusion of the knowledge provided by the skilled detector and the verification score will be improved, following the examples of previous works on anti-spoofing and verification systems fusion in [4,14], where different sequential-and classifier-based approaches, as well as decision-and scorelevel fusion of anti-spoofing and verification systems, for face and fingerprint, are explored. Other signature matchers and databases will be taken into account as well.…”
Section: Discussionmentioning
confidence: 99%
“…False acceptance is the opposite case when an impostor is misclassified as a target. The evaluation of the ASV system is done in terms of both LICIT and SPOOF protocols [29]. The LICIT protocol, involving zero-effort impostors, is the typical evaluation protocol used in verification 2 http://sp-tk.sourceforge.net/ scenarios, whereas the SPOOF protocol contains only spoofed impostors and is used to evaluate system performance when spoofing attacks are present.…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…We use zero-effort FAR (ZFAR) as a metric for the LICIT protocol and spoofing FAR (SFAR) [29] for the SPOOF protocol. The only difference between them is that the former considers zero-effort impostors while the latter considers their spoofed versions.…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…Consequently, there are numerous studies [1,2] and open challenges [3,4] on anti-spoofing techniques assessing the spoofing detector's ability to distinguish between genuine and fake attempts for especially these two traits. Recently, the integration of anti-spoofing scores with recognition scores has received considerable attention [5][6][7]. The standard approach, as outlined in [5], has been to reject spoofed samples before comparing them against the gallery template.…”
Section: Introductionmentioning
confidence: 99%