Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
The vulnerability of face recognition systems to presentation attacks has limited their application in security-critical scenarios. Automatic methods of detecting such malicious attempts are essential for the safe use of facial recognition technology. Alth ...
Presentation attacks using 3D masks pose a serious threat to face recognition systems. Automatic detection of these attacks is challenging due to hyper-realistic nature of masks. In this work, we consider presentations acquired in near infrared (NIR) imagi ...
Presentation attacks using 3D masks pose a serious threat to face recognition systems. Automatic detection of these attacks is challenging due to hyper-realistic nature of masks. In this work, we consider presentations acquired in near infrared (NIR) imagi ...
In a typical face recognition pipeline, the task ofthe face detector is to localize the face region. However, the facedetector localizes regions that look like a face, irrespective of theliveliness of the face, which makes the entire system susceptible to ...
In this chapter we give an overview of spoofing attacks and spoofing counter-measures for face recognition systems, in particular in a verification sce- nario. We focus on 2D and 3D attacks to Visible Spectrum systems (VIS), as well as Near Infrared (NIR) ...
Robustness of extracted embeddings in cross-database scenarios is one of the main challenges in text-independent speaker verification (SV) systems. In this paper, we investigate this robustness via performing structural cross-database experiments with or w ...
The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool for access control in various applications, from immigration-control to remote banking. Widespread adopti
on of face biometrics, however, depends on the how ...
Morphing attacks is a threat to biometric systems where the biometric reference in an identity document can be altered. This form of attack presents an important issue in applications relying on identity documents such as border security or access control. ...
Idiap has made a submission to the conversational telephony speech (CTS) challenge of the NIST SRE 2019. The submission consists of six speaker verification (SV) systems: four extended TDNN (E-TDNN) and two TDNN x-vector systems. Employment of various trai ...
In this chapter, the usage of Remote Photoplethysmography (rPPG\index{Remote Photoplethysmography (rPPG)}) as a mean for
face presentation attack detection is investigated. Remote
photoplethysmography consists in retrieving the heart-rate of a subject from ...