2013 International Conference on Biometrics (ICB) 2013
DOI: 10.1109/icb.2013.6613026
|View full text |Cite
|
Sign up to set email alerts
|

The 2nd competition on counter measures to 2D face spoofing attacks

Abstract: Esta es la versión de autor de la comunicación de congreso publicada en: This is an author produced version of a paper published in: AbstractAs a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive in form of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
103
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(103 citation statements)
references
References 22 publications
0
103
0
Order By: Relevance
“…LBP texture descriptors have been successfully used for face-PAD [20]. Here we propose a new texture-based approach for face-PAD, using Gabor-jets.…”
Section: B Face-pad Using Gabor-jetsmentioning
confidence: 99%
“…LBP texture descriptors have been successfully used for face-PAD [20]. Here we propose a new texture-based approach for face-PAD, using Gabor-jets.…”
Section: B Face-pad Using Gabor-jetsmentioning
confidence: 99%
“…[14], [15], [16]. Spoofing attacks are, however, varying and unpredictable in nature and thus it is difficult to predict how countermeasures will generalise to spoofing attacks 'in the wild', where their true nature can never be known with certainty.…”
Section: Generalizationmentioning
confidence: 99%
“…The best results are achieved if the fused methods use complementary features which discern spoofing attacks from different aspects [29]. Such methods achieve the best performances up to date, even when confronted with a multitude of attack types [30].…”
Section: Related Workmentioning
confidence: 99%
“…It does not intend to compete with the best performing methods like in [30], which rely on complex combinations of anti-spoofing features. Instead, it aims to demonstrate how client-specific classification can be beneficial even when using simple features, upon which many of the best performing methods are built.…”
Section: Client-specific Approachesmentioning
confidence: 99%