• DocumentCode
    2847652
  • Title

    Competition on counter measures to 2-D facial spoofing attacks

  • Author

    Chakka, Murali Mohan ; Anjos, André ; Marcel, Sebastien ; Tronci, Roberto ; Muntoni, Daniele ; Fadda, Gianluca ; Pili, Maurizio ; Sirena, Nicola ; Murgia, Gabriele ; Ristori, Marco ; Roli, Fabio ; Yan, Junjie ; Yi, Dong ; Lei, Zhen ; Zhang, Zhiwei ; Li, S

  • fYear
    2011
  • fDate
    11-13 Oct. 2011
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition is to compare the performance of different state-of-the-art algorithms on the same database using a unique evaluation method. Six different teams from universities around the world have participated in the contest. Use of one or multiple techniques from motion, texture analysis and liveness detection appears to be the common trend in this competition. Most of the algorithms are able to clearly separate spoof attempts from real accesses. The results suggest the investigation of more complex attacks.
  • Keywords
    face recognition; image motion analysis; image texture; object detection; security of data; 2D face recognition systems; 2D facial spoofing attacks; counter measures; liveness detection; spoofing identities; texture analysis; Erbium; Protocols; Strontium; Videos;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Biometrics (IJCB), 2011 International Joint Conference on
  • Conference_Location
    Washington, DC
  • Print_ISBN
    978-1-4577-1358-3
  • Electronic_ISBN
    978-1-4577-1357-6
  • Type

    conf

  • DOI
    10.1109/IJCB.2011.6117509
  • Filename
    6117509