Skip to main content

Running the competition results: "The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks".

Project description

This package provides the source code to run the experiments published in the paper The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks. It relies on some satellite packages from Bob to compute the evaluation.

Installation

The installation of this package relies on the BuildOut system. By default, the command line sequence:

$ ./python bootstrap.py
$ ./bin/buildout

There are a few exceptions, which are not automatically downloaded:

Bob

To install Bob, please visit http://www.idiap.ch/software/bob and follow the installation instructions. Please verify that you have at least version 2.0 of Bob installed. If you have installed Bob in a non-standard directory, please open the buildout.cfg file from the base directory and set the prefixes directory accordingly.

Image Databases

The experiments are run on external image database. We do not provide the images from the database itselve. Hence, please contact the database owners to obtain a copy of the images. The database used in the competition can be downloaded here:

Please let all other configuration parameters unchanged as this might influence the competition analysis and, hence, the reproducibility of the results.

Getting help

In case anything goes wrong, please feel free to open a new ticket in our GitLab page, or send an email to pedro.tome@idiap.ch.

Recreating the results of the Paper

After successfully setting up the databases, you are now able to run the anti-spoofing finger vein evaluation as explained in the Paper.

Running the experiments

The competition results are run using the run_icb2015_competition.sh file.

Additionally, the individual scripts used can be found in bin/ directory. See ./bin/icb2015_baseline_countermeasure.py --help and ./bin/icb2015_evaluation_results.py --help for a complete list of options.

  1. Run the competition results on the Spoofing-Attack Finger Vein database:

    $ ./run_icb2015_competition.sh

Cite our paper

If you use the results in any of your contributions, please cite the following paper:

@inproceedings{Tome_ICB2015_AntiSpoofFVCompetition,
       author = {Tome, Pedro and Raghavendra, R. and Busch, Christoph and Tirunagari, Santosh and Poh, Norman and Shekar, B. H. and Gragnaniello, Diego and Sansone, Carlo and Verdoliva, Luisa and Marcel, S{\'{e}}bastien},
     keywords = {Biometrics, Finger vein, Spoofing Attacks, Competition},
        month = dec,
        title = {The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks},
    booktitle = {International Conference on Biometrics (ICB)},
       series = {},
       volume = {},
         year = {2015},
        pages = {},
     location = {Thailand},
          url = {http://publications.idiap.ch/index.php/publications/show/}
}

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

antispoofing.fvcompetition_icb2015-2.0.0.zip (30.9 kB view details)

Uploaded Source

File details

Details for the file antispoofing.fvcompetition_icb2015-2.0.0.zip.

File metadata

File hashes

Hashes for antispoofing.fvcompetition_icb2015-2.0.0.zip
Algorithm Hash digest
SHA256 3b6a6d7ebbfd6b8635126e12d86cec8c2866631473c8f659a1188f7897e04fc1
MD5 486695e150695ba7062560264671c69e
BLAKE2b-256 c8fa1f12ee31d62d40bd8bd7000964373bab8c4d6173402a7ea3b7d5083fc6de

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page