User guide

This package depends on Replay-Attack database and all the scripts and methods are using the Replay-Attack API which is based on Bob. The database needs to be downloaded and installed prior to usage. This database has a specific database structure which needs to be preserved when generating features and scores as inputs and outputs. This is how communication between scripts is preserved.

This User Guide consists of three parts:

  1. Part 1: we are going to show how to generate anti-spoofing features and face verification features, which are used later by the other methods.
  2. Part 2: we are going to show how to generate client-indepdendent and client-specific face anti-spoofing scores.
  3. Part 3: we are going to show how to generate fusion scores for face verification and anti-spoofing systems.
  4. Part 4: we are going to show the use of EPS framework for evaluation of biometric verification systms under spoofing attacks
[1]Contact ivana.chingovska@idiap.ch

Previous topic

Welcome to bob.thesis.ichingo2015’s documentation!

Next topic

Part 1: Generate anti-spoofing and face verification features

This Page