Counter-Measures to Photo Attacks in Face Recognition: a public database and a baseline
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
As Vidler suggests, the Third Typology’s radical proposition was to identify the nature of architectural elements as neither scientific nor technical but essentially architectural. For Martí Arís, this ‘essence’ of architecture is rooted in form-making, th ...
Concepts of type and typology are not specific to architecture. Rather they represent an interdisciplinary approach to ordering knowledge and gaining insight. In the field of architecture, the study of types and typology offers a didactic perspective that ...
In the first chapter of this thesis, the macrocyclization of a new type of bifunctional substrates, omega-isocyanoaldehyde derivatives, is described. Ten different omega-isocyanoaldehydes in terms of different ring sizes and functional groups were prepared ...
Rances in the north of Vaud suffered last year from the effects of large soil movement. Rances became the new playground where MeduSoil technology was tested as a remediation for this type of events. This is a decisive new step, after the technology has be ...
Tetra-n-butylammonium (TBA) (eta(6)-biphenyl)diphenyfferrate was formed unexpectedly in the reaction of (TBA)(2)[Fe4S4Cl4] with an excess of phenyllithium. This complex belongs to a novel type of organoferrate. ...
Rances in the north of Vaud suffered last year from the effects of large soil movement. Rances became the new playground where MeduSoil technology was tested as a remediation for this type of events. This is a decisive new step, after the technology has be ...
The research examines the entanglement of urban rationalities and industrial biopolitics in constructing company towns' identities and spatialities, providing different housing typologies for its workers. An epitome of spatial production under industrial p ...
The vulnerability of face recognition systems to presentation attacks has limited their application in security-critical scenarios. Automatic methods of detecting such malicious attempts are essential for the safe use of facial recognition technology. Alth ...
In this chapter we give an overview of spoofing attacks and spoofing counter-measures for face recognition systems, in particular in a verification sce- nario. We focus on 2D and 3D attacks to Visible Spectrum systems (VIS), as well as Near Infrared (NIR) ...
While the performance of face recognition systems has improved significantly in the last decade, they are proved to be highly vulnerable to presentation attacks (spoofing). Most of the research in the field of face presentation attack detection (PAD), was ...