Running the competition results: "The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks".
Project description
This package provides the source code to run the experiments published in the paper The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks. It relies on some satellite packages from Bob to compute the evaluation.
Installation
The installation of this package relies on the BuildOut system. By default, the command line sequence:
$ ./python bootstrap.py $ ./bin/buildout
There are a few exceptions, which are not automatically downloaded:
Bob
To install Bob, please visit http://www.idiap.ch/software/bob and follow the installation instructions. Please verify that you have at least version 2.0 of Bob installed. If you have installed Bob in a non-standard directory, please open the buildout.cfg file from the base directory and set the prefixes directory accordingly.
Image Databases
The experiments are run on external image database. We do not provide the images from the database itselve. Hence, please contact the database owners to obtain a copy of the images. The database used in the competition can be downloaded here:
Spoofing-Attack Finger Vein Database [fvspoofingattack]: http://www.idiap.ch/dataset/fvspoofingattack
Please let all other configuration parameters unchanged as this might influence the competition analysis and, hence, the reproducibility of the results.
Getting help
In case anything goes wrong, please feel free to open a new ticket in our GitLab page, or send an email to pedro.tome@idiap.ch.
Recreating the results of the Paper
After successfully setting up the databases, you are now able to run the anti-spoofing finger vein evaluation as explained in the Paper.
Running the experiments
The competition results are run using the run_icb2015_competition.sh file.
Additionally, the individual scripts used can be found in bin/ directory. See ./bin/icb2015_baseline_countermeasure.py --help and ./bin/icb2015_evaluation_results.py --help for a complete list of options.
Run the competition results on the Spoofing-Attack Finger Vein database:
$ ./run_icb2015_competition.sh
Cite our paper
If you use the results in any of your contributions, please cite the following paper:
@inproceedings{Tome_ICB2015_AntiSpoofFVCompetition, author = {Tome, Pedro and Raghavendra, R. and Busch, Christoph and Tirunagari, Santosh and Poh, Norman and Shekar, B. H. and Gragnaniello, Diego and Sansone, Carlo and Verdoliva, Luisa and Marcel, S{\'{e}}bastien}, keywords = {Biometrics, Finger vein, Spoofing Attacks, Competition}, month = dec, title = {The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks}, booktitle = {International Conference on Biometrics (ICB)}, series = {}, volume = {}, year = {2015}, pages = {}, location = {Thailand}, url = {http://publications.idiap.ch/index.php/publications/show/} }
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file antispoofing.fvcompetition_icb2015-2.0.0.zip
.
File metadata
- Download URL: antispoofing.fvcompetition_icb2015-2.0.0.zip
- Upload date:
- Size: 30.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3b6a6d7ebbfd6b8635126e12d86cec8c2866631473c8f659a1188f7897e04fc1 |
|
MD5 | 486695e150695ba7062560264671c69e |
|
BLAKE2b-256 | c8fa1f12ee31d62d40bd8bd7000964373bab8c4d6173402a7ea3b7d5083fc6de |