Please use this identifier to cite or link to this item: http://hdl.handle.net/10553/15082
DC FieldValueLanguage
dc.contributor.authorMohan Chakka, Muralien_US
dc.contributor.authorAnjos, Andréen_US
dc.contributor.authorMarcel, Sébastienen_US
dc.contributor.authorTronci, Robertoen_US
dc.contributor.authorMuntoni, Danieleen_US
dc.contributor.authorFadda, Gianlucaen_US
dc.contributor.authorPili, Maurizioen_US
dc.contributor.authorSirena, Nicolaen_US
dc.contributor.authorMurgia, Gabrieleen_US
dc.contributor.authorRistori, Marcoen_US
dc.contributor.authorRoli, Fabioen_US
dc.contributor.authorYan, Junjieen_US
dc.contributor.authorYi, Dongen_US
dc.contributor.authorLei, Zhenen_US
dc.contributor.authorZhang, Zhiweien_US
dc.contributor.authorLi, Stan Z.en_US
dc.contributor.authorSchwartz, William Robsonen_US
dc.contributor.authorRocha, Andersonen_US
dc.contributor.authorPedrini, Helioen_US
dc.contributor.authorLorenzo-Navarro, Javieren_US
dc.contributor.authorCastrillón-Santana, Modestoen_US
dc.contributor.authorMäättä, Jukkaen_US
dc.contributor.authorHadid, Abdenouren_US
dc.contributor.authorPietikäinen, Mattien_US
dc.date.accessioned2015-11-24T15:09:33Z-
dc.date.accessioned2018-06-15T09:21:25Z-
dc.date.available2015-11-24T15:09:33Z-
dc.date.available2018-06-15T09:21:25Z-
dc.date.issued2011en_US
dc.identifier.isbn9781457713583en_US
dc.identifier.urihttp://hdl.handle.net/10553/15082-
dc.description.abstractSpoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative stud- ies of di erent techniques using the same protocols and data. The motivation behind this competition is to com- pare the performance of di erent state-of-the-art algo- rithms on the same database using a unique evaluation method. Six di erent teams from universities around the world have participated in the contest.es
dc.languageengen_US
dc.source2011 International Joint Conference on Biometrics, IJCB 2011 [ISBN 9781457713583]en_US
dc.subject120304 Inteligencia artificiales
dc.titleCompetition on counter measures to 2-D facial spoofing attacksen_US
dc.typeinfo:eu-repo/semantics/conferenceObjecten_US
dc.typeConferenceObjectes
dc.relation.conference2011 International Joint Conference on Biometrics, IJCB 2011
dc.identifier.doi10.1109/IJCB.2011.6117509
dc.identifier.scopus84862953522-
dc.contributor.authorscopusid55264420900-
dc.contributor.authorscopusid6506491800-
dc.contributor.authorscopusid6603136018-
dc.contributor.authorscopusid14017094000-
dc.contributor.authorscopusid26030613600-
dc.contributor.authorscopusid54911437000-
dc.contributor.authorscopusid54912287000-
dc.contributor.authorscopusid35090396800-
dc.contributor.authorscopusid54912556600-
dc.contributor.authorscopusid54914385900-
dc.contributor.authorscopusid57194734588-
dc.contributor.authorscopusid55265567300-
dc.contributor.authorscopusid23135479100-
dc.contributor.authorscopusid24280193100
dc.contributor.authorscopusid57202066920-
dc.contributor.authorscopusid55648280900-
dc.contributor.authorscopusid34870116100-
dc.contributor.authorscopusid7201885423-
dc.contributor.authorscopusid16643616700-
dc.contributor.authorscopusid6506736837-
dc.contributor.authorscopusid15042453800-
dc.contributor.authorscopusid22333278500-
dc.contributor.authorscopusid54913926800-
dc.contributor.authorscopusid55925650500-
dc.contributor.authorscopusid7006291661-
dc.identifier.absysnet716479-
dc.investigacionIngeniería y Arquitecturaes
dc.rights.accessrightsinfo:eu-repo/semantics/openAccesses
dc.type2Actas de congresosen_US
dc.date.coverdateDiciembre 2011
dc.identifier.conferenceidevents121425
dc.identifier.ulpgces
item.grantfulltextopen-
item.fulltextCon texto completo-
crisitem.author.deptGIR SIANI: Inteligencia Artificial, Robótica y Oceanografía Computacional-
crisitem.author.deptIU Sistemas Inteligentes y Aplicaciones Numéricas-
crisitem.author.deptDepartamento de Informática y Sistemas-
crisitem.author.deptGIR SIANI: Inteligencia Artificial, Robótica y Oceanografía Computacional-
crisitem.author.deptIU Sistemas Inteligentes y Aplicaciones Numéricas-
crisitem.author.deptDepartamento de Informática y Sistemas-
crisitem.author.orcid0000-0002-2834-2067-
crisitem.author.orcid0000-0002-8673-2725-
crisitem.author.parentorgIU Sistemas Inteligentes y Aplicaciones Numéricas-
crisitem.author.parentorgIU Sistemas Inteligentes y Aplicaciones Numéricas-
crisitem.author.fullNameLorenzo Navarro, José Javier-
crisitem.author.fullNameCastrillón Santana, Modesto Fernando-
crisitem.event.eventsstartdate11-10-2011-
crisitem.event.eventsenddate13-10-2011-
Appears in Collections:Actas de congresos
Thumbnail
Postprint
Adobe PDF (282,56 kB)
Show simple item record

SCOPUSTM   
Citations

115
checked on Jun 26, 2022

Page view(s)

44
checked on Jun 18, 2022

Download(s)

160
checked on Jun 18, 2022

Google ScholarTM

Check

Altmetric


Share



Export metadata



This item is licensed under a Creative Commons License Creative Commons