Anti-Spoofing in Action: Joint Operation with a Verification System

Abstract

Besides the recognition task, today's biometric systems need to cope with additional problem: spoofing attacks. Up to date, academic research considers spoofing as a binary classification problem: systems are trained to discriminate between real accesses and attacks. However, spoofing counter-measures are not designated to operate stand-alone, but as a part of a recognition system they will protect. In this paper, we study techniques for decision-level and score-level fusion to integrate a recognition and anti-spoofing systems, using an open-source framework that handles the ternary classification problem (clients, impostors and attacks) transparently. By doing so, we are able to report the impact of different spoofing counter-measures, fusion techniques and thresholding on the overall performance of the final recognition system. For a specific use-case covering face verification, experiments show to what extent simple fusion improves the trustworthiness of the system when exposed to spoofing attacks.

Cite

Text

Chingovska et al. "Anti-Spoofing in Action: Joint Operation with a Verification System." IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2013. doi:10.1109/CVPRW.2013.22

Markdown

[Chingovska et al. "Anti-Spoofing in Action: Joint Operation with a Verification System." IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2013.](https://mlanthology.org/cvprw/2013/chingovska2013cvprw-antispoofing/) doi:10.1109/CVPRW.2013.22

BibTeX

@inproceedings{chingovska2013cvprw-antispoofing,
  title     = {{Anti-Spoofing in Action: Joint Operation with a Verification System}},
  author    = {Chingovska, Ivana and Anjos, André and Marcel, Sébastien},
  booktitle = {IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops},
  year      = {2013},
  pages     = {98-104},
  doi       = {10.1109/CVPRW.2013.22},
  url       = {https://mlanthology.org/cvprw/2013/chingovska2013cvprw-antispoofing/}
}