Evaluation tools for verification systems under spoofing attacks: examples in face verification
Project description
This package provides methods for evaluation of biometric verification systems under spoofing attacks. The evaluation is based on the Expected Performance and Spoofability Curve (EPSC). Using this package, you can compute thresholds based on EPSC, compute various error rates and plot various curves related to EPSC.
- Besides providing methods for plotting EPSC within your own scripts, this package brings several scripts that you can use to evaluate your own verification system (fused with an anti-spoofing system or not) from several perspectives. For example, you can:
evaluate the threshold of a classification system on the development set
apply the threshold on an evaluation or any other set to compute different error rates
plot score distributions
plot different performance curves (DET, EPC and EPSC)
Furthermore, you can generate hypothetical data and use them to exemplify the above mentioned functionalities.
If you use this package and/or its results, please cite the following publication:
Our original paper on biometric evaluation (title, pdf and bibtex to be announced soon):
@ARTICLE{Chingovska_IEEETIFS_2014, author = {Chingovska, Ivana and Anjos, Andr{\'{e}} and Marcel, S{\'{e}}bastien}, title = {Biometrics Evaluation Under Spoofing Attacks}, journal = {IEEE Transactions on Information Forensics and Security}, year = {2014}, }
Bob as the core framework used to run the experiments:
@inproceedings{Anjos_ACMMM_2012, author = {A. Anjos AND L. El Shafey AND R. Wallace AND M. G\"unther AND C. McCool AND S. Marcel}, title = {Bob: a free signal processing and machine learning toolbox for researchers}, year = {2012}, month = oct, booktitle = {20th ACM Conference on Multimedia Systems (ACMMM), Nara, Japan}, publisher = {ACM Press}, }
If you wish to report problems or improvements concerning this code, please contact the authors of the above mentioned papers.
Installation
This package is a satellite package of Bob You will need a copy of it to run the algoritms. Please download Bob from its webpage.
There are 2 options you can follow to get this package installed and operational on your computer: you can use automatic installers like pip (or easy_install) or manually download, unpack and use zc.buildout to create a virtual work environment just for this package.
Using an automatic installer
Using pip is the easiest (shell commands are marked with a $ signal):
$ pip install antispoofing.evaluation
You can also do the same with easy_install:
$ easy_install antispoofing.evaluation
This will download and install this package plus any other required dependencies. It will also verify if the version of Bob you have installed is compatible.
This scheme works well with virtual environments by virtualenv or if you have root access to your machine. Otherwise, we recommend you use the next option.
Using zc.buildout
Download the latest version of this package from PyPI and unpack it in your working area. The installation of the toolkit itself uses buildout. You don’t need to understand its inner workings to use this package. Here is a recipe to get you started:
$ python bootstrap.py $ ./bin/buildout
These 2 commands should download and install all non-installed dependencies and get you a fully operational test and development environment.
Using the package
After downloading, go to the console and type:
$ python bootstrap.py $ ./bin/buildout $ ./bin/sphinx-build docs sphinx
Now, the full documentation of the package, including a User Guide, will be availabe in sphinx/index.html.
Problems
In case of problems, please contact ivana.chingovska@idiap.ch
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file antispoofing.evaluation-1.0.1.zip
.
File metadata
- Download URL: antispoofing.evaluation-1.0.1.zip
- Upload date:
- Size: 56.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | be7f5b7c18eca87a46918568ee8dbe8e46d589b2989ef627ab9660e6fb7a18be |
|
MD5 | 37fcd39fbb0f7a3a16588e4a4728dd1f |
|
BLAKE2b-256 | a3c716ee3ea3e0e9d345eaf3b25f719c7f773942a59e5a01578be4b97ffd1baa |