Related publications (130)

Competition on Counter Measures to 2-D Facial Spoofing Attacks

Sébastien Marcel, André Anjos, Murali Mohan Chakka, Zhiwei Zhang

Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition ...
2011

My face through the looking-glass: The effect of mirror reversal on reflection size estimation

Olaf Blanke, Sebastian Dieguez Falcon, Jakob Scherer

People tend to grossly overestimate the size of their mirror-reflected face. Although this overestimation bias is robust, not much is known about its relationships to self-face perception. In two experiments, we investigated the overestimation bias as a fu ...
2011

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.