Authors
Murali Mohan Chakka, Andre Anjos, Sebastien Marcel, Roberto Tronci, Daniele Muntoni, Gianluca Fadda, Maurizio Pili, Nicola Sirena, Gabriele Murgia, Marco Ristori, Fabio Roli, Junjie Yan, Dong Yi, Zhen Lei, Zhiwei Zhang, Stan Z Li, William Robson Schwartz, Anderson Rocha, Helio Pedrini, Javier Lorenzo-Navarro, Modesto Castrillón-Santana, Jukka Määttä, Abdenour Hadid, Matti Pietikäinen
Publication date
2011/10/11
Conference
2011 international joint conference on biometrics (IJCB)
Pages
1-6
Publisher
IEEE
Description
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition is to compare the performance of different state-of-the-art algorithms on the same database using a unique evaluation method. Six different teams from universities around the world have participated in the contest. Use of one or multiple techniques from motion, texture analysis and liveness detection appears to be the common trend in this competition. Most of the algorithms are able to clearly separate spoof attempts from real accesses. The results suggest the investigation of more complex attacks.
Total citations
2011201220132014201520162017201820192020202120222023202417182630202623241667163
Scholar articles
MM Chakka, A Anjos, S Marcel, R Tronci, D Muntoni… - 2011 international joint conference on biometrics (IJCB …, 2011