{"id":"https://openalex.org/W2343954979","doi":"https://doi.org/10.5075/epfl-thesis-6879","title":"Trustworthy Biometric Verification under Spoofing Attacks : Application to the Face Mode","display_name":"Trustworthy Biometric Verification under Spoofing Attacks : Application to the Face Mode","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2343954979","doi":"https://doi.org/10.5075/epfl-thesis-6879","mag":"2343954979"},"language":"en","primary_location":{"id":"pmh:oai:infoscience.tind.io:218191","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/218191","pdf_url":"https://infoscience.epfl.ch/record/218191/files/EPFL_TH6879.pdf","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doctoral thesis"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://infoscience.epfl.ch/record/218191/files/EPFL_TH6879.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024584102","display_name":"Ivana Chingovska","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Chingovska, Ivana","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5024584102"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.9325923919677734},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7579345703125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6328792572021484},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6121113300323486},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.575350821018219},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.46162110567092896},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.4383862316608429},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42868927121162415},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.327717661857605},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.15709754824638367}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.9325923919677734},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7579345703125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6328792572021484},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6121113300323486},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.575350821018219},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.46162110567092896},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.4383862316608429},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42868927121162415},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.327717661857605},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.15709754824638367},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:infoscience.tind.io:218191","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/218191","pdf_url":"https://infoscience.epfl.ch/record/218191/files/EPFL_TH6879.pdf","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doctoral thesis"},{"id":"doi:10.5075/epfl-thesis-6879","is_oa":true,"landing_page_url":"https://doi.org/10.5075/epfl-thesis-6879","pdf_url":null,"source":{"id":"https://openalex.org/S4306400488","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"},{"id":"mag:2343954979","is_oa":false,"landing_page_url":"https://infoscience.epfl.ch/record/218191","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"pmh:oai:infoscience.tind.io:218191","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/218191","pdf_url":"https://infoscience.epfl.ch/record/218191/files/EPFL_TH6879.pdf","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doctoral thesis"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2343954979.pdf","grobid_xml":"https://content.openalex.org/works/W2343954979.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1516649441","https://openalex.org/W2128377844","https://openalex.org/W3104084024","https://openalex.org/W3188067816","https://openalex.org/W2118671571","https://openalex.org/W3101824741","https://openalex.org/W2566864484","https://openalex.org/W2522614246","https://openalex.org/W2095252718","https://openalex.org/W2979332484","https://openalex.org/W2048480868","https://openalex.org/W2751622742","https://openalex.org/W2096655583","https://openalex.org/W2775541393","https://openalex.org/W2022598110","https://openalex.org/W1524377853","https://openalex.org/W2590565790","https://openalex.org/W2973162790","https://openalex.org/W3135411534","https://openalex.org/W204886590"],"abstract_inverted_index":{"The":[0,110,139,202,228,281,335,358,492,502],"need":[1],"for":[2,9,54,290,304,361,510,526,542],"automation":[3],"of":[4,13,19,56,70,77,112,142,150,195,200,247,317,331,351,365,394,445,449,488,508,547,569],"the":[5,23,57,64,75,78,91,129,136,148,196,232,239,244,248,277,291,295,299,312,315,318,322,332,343,362,377,392,395,413,426,434,443,447,481,489,499,511,544,550,561],"identity":[6,245],"recognition":[7],"process":[8],"a":[10,40,121,153,163,169,218,260,265,329,373,469],"vast":[11],"number":[12],"applications":[14],"resulted":[15],"in":[16,22,47,90,152,238,349,401,455],"great":[17],"advancement":[18],"biometric":[20,164,180,352,431,450,512,527],"systems":[21,32,52,198,226,354,454,529],"recent":[24],"years.":[25],"Yet,":[26],"many":[27,48],"studies":[28,289,337,399,424],"indicate":[29],"that":[30,42,99,221],"these":[31],"suffer":[33],"from":[34],"vulnerabilities":[35],"to":[36,63,67,85,102,146,174,235,271,276,301,341,376,390,407,421,429,457,486],"spoofing":[37,60,79,86,108,114,133,356,487,519,531],"(presentation)":[38],"attacks:":[39],"weakness":[41],"may":[43],"compromise":[44],"their":[45],"usage":[46],"cases.":[49],"Face":[50],"verification":[51,165,181,223,308,353,451,482,528],"account":[53],"one":[55,258,263],"most":[58,117],"attractive":[59],"targets,":[61],"due":[62],"easy":[65],"access":[66],"face":[68,292,307,396],"images":[69],"users,":[71],"as":[72,74,120,241,243,272,274,369,372,404,406],"well":[73,242,405],"simplicity":[76],"attack":[80],"manufacturing":[81],"process.":[82,501],"Many":[83],"counter-measures":[84],"have":[87],"been":[88],"proposed":[89,282,414,427],"literature.":[92],"They":[93],"are":[94,100,214,284,338],"based":[95],"on":[96,159,179,286],"different":[97],"cues":[98],"used":[101,234,340,389,420],"distinguish":[103],"between":[104],"real":[105,126,514],"accesses":[106,127],"and":[107,132,182,189,224,262,346,381,411,452,474,484,518,536,549],"attacks.":[109,357,520],"task":[111],"detecting":[113],"attacks":[115,134],"is":[116,145,172,199,206,367,496],"often":[118],"considered":[119],"binary":[122],"classification":[123],"problem,":[124],"with":[125,156,162,216,259,264,498,554],"being":[128,135],"positive":[130],"class":[131],"negative":[137],"class.":[138],"main":[140],"objective":[141],"this":[143,185,211,402,557],"thesis":[144,186],"put":[147],"problem":[149],"anti-spoofing":[151,225,256,453],"wider":[154],"context,":[155,170],"an":[157,176,459,464,523],"accent":[158],"its":[160,347],"cooperation":[161],"system.":[166],"In":[167,184],"such":[168],"it":[171,417],"important":[173],"adopt":[175,468],"integrated":[177,503],"perspective":[178,504],"anti-spoofing.":[183],"we":[187,213,269,441,475,559],"identify":[188],"address":[190,442],"three":[191,506,545],"points":[192],"where":[193],"integration":[194,204,300,436,494],"two":[197,255],"interest.":[201],"first":[203],"point":[205,495],"situated":[207,438],"at":[208,250,439],"input-level.":[209],"At":[210,310,325,433],"point,":[212,437],"concerned":[215],"providing":[217],"unified":[219,229],"information":[220,230],"both":[222],"use.":[227],"includes":[231],"samples":[233],"enroll":[236],"clients":[237],"system,":[240],"claims":[246],"client":[249],"query":[251],"time.":[252],"We":[253,467,521],"design":[254,422],"schemes,":[257],"generative":[261],"discriminative":[266],"approach,":[267],"which":[268,540,565],"refer":[270],"client-specific,":[273],"opposed":[275],"traditional":[278],"client-independent":[279,323],"ones.":[280,324],"methods":[283,366,428],"applied":[285],"several":[287,477],"case":[288,336,398,423],"mode.":[293],"Overall,":[294],"experimental":[296],"results":[297,313,393],"prove":[298],"be":[302,388,419],"beneficial":[303],"creating":[305],"trustworthy":[306],"systems.":[309,491,570],"input-level,":[311],"show":[314],"advantage":[316],"client-specific":[319],"approaches":[320],"over":[321],"output-level,":[326,440],"they":[327],"present":[328],"comparison":[330,568],"fusion":[333,472,478],"methods.":[334,415],"furthermore":[339],"demonstrate":[342],"EPS":[344,562],"framework":[345],"potential":[348],"evaluation":[350,500,524],"under":[355,530],"source":[359],"code":[360],"full":[363],"set":[364],"available":[368],"free":[370,378],"software,":[371],"satellite":[374],"package":[375],"signal":[379],"processing":[380],"machine":[382],"learning":[383],"toolbox":[384],"Bob.":[385],"It":[386],"can":[387,418],"reproduce":[391],"mode":[397],"presented":[400],"thesis,":[403],"perform":[408],"additional":[409],"analysis":[410],"improve":[412],"Furthermore,":[416],"applying":[425],"other":[430],"modes.":[432],"second":[435],"issue":[444],"combining":[446],"output":[448],"order":[456],"achieve":[458],"optimal":[460],"combined":[461],"decision":[462],"about":[463],"input":[465,548],"sample.":[466],"multiple":[470],"expert":[471],"approach":[473],"investigate":[476],"methods,":[479],"comparing":[480],"performance":[483],"robustness":[485],"fused":[490],"third":[493],"associated":[497,553],"implies":[505],"types":[507,546],"inputs":[509],"system:":[513],"accesses,":[515],"zero-effort":[516],"impostors":[517],"propose":[522,560],"methodology":[525],"attacks,":[532],"called":[533],"Expected":[534],"Performance":[535],"Spoofability":[537],"(EPS)":[538],"framework,":[539,558],"accounts":[541],"all":[543],"error":[551],"rates":[552],"them.":[555],"Within":[556],"Curve":[563],"(EPSC),":[564],"enables":[566],"unbiased":[567]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2016-06-24T00:00:00"}
