7 research outputs found

    The 2nd competition on counter measures to 2D face spoofing attacks

    Get PDF
    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. I. Chingovska, J. Yang, Z. Lei, D. Yi, S. Z. Li, O. Kahm, C. Glaser, N. Damer, A. Kuijper, A. Nouak, J. Komulainen, T. Pereira, S. Gupta, S. Khandelwal, S. Bansal, A. Rai, T. Krishna, D. Goyal, M.-A. Waris, H. Zhang, I. Ahmad, S. Kiranyaz, M. Gabbouj, R. Tronci, M. Pili, N. Sirena, F. Roli, J. Galbally, J. Fiérrez, A. Pinto, H. Pedrini, W. S. Schwartz, A. Rocha, A. Anjos, S. Marcel, "The 2nd competition on counter measures to 2D face spoofing attacks" in International Conference on Biometrics (ICB), Madrid (Spain), 2013, 1-6As a crucial security problem, anti-spoofing in biometrics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive inform of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge researchers to create counter measures effectively detecting a variety of attacks. The submitted propositions are evaluated on the Replay-Attack database and the achieved results are presented in this paper.The authors would like to thank the Swiss Innovation Agency (CTI Project Replay) and the FP7 European TABULA RASA Project4 (257289) for their financial support

    Competition on Counter Measures to 2-D Facial Spoofing Attacks

    Get PDF
    Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition is to compare the performance of different state-of-the-art algorithms on the same database using a unique evaluation method. Six different teams from universities around the world have participated in the contest. Use of one or multiple techniques from motion, texture analysis and liveness detection appears to be the common trend in this competition. Most of the algorithms are able to clearly separate spoof attempts from real accesses. The results suggest the investigation of more complex attacks

    Competition on Counter Measures to 2-D Facial Spoofing Attacks

    No full text
    Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition is to compare the performance of different state-of-the-art algorithms on the same database using a unique evaluation method. Six different teams from universities around the world have participated in the contest. Use of one or multiple techniques from motion, texture analysis and liveness detection appears to be the common trend in this competition. Most of the algorithms are able to clearly separate spoof attempts from real accesses. The results suggest the investigation of more complex attacks

    Subversion of CtBP1-controlled macropinocytosis by human adenovirus serotype 3

    No full text
    Endocytosis supports cell communication, growth, and pathogen infection. The species B human adenovirus serotype 3 (Ad3) is associated with epidemic conjunctivitis, and fatal respiratory and systemic disease. Here we show that Ad3 uses dynamin-independent endocytosis for rapid infectious entry into epithelial and haematopoietic cells. Unlike Ad5, which uses dynamin-dependent endocytosis, Ad3 endocytosis spatially and temporally coincided with enhanced fluid-phase uptake. It was sensitive to macropinocytosis inhibitors targeting F-actin, protein kinase C, the sodium–proton exchanger, and Rac1 but not Cdc42. Infectious Ad3 macropinocytosis required viral activation of p21-activated kinase 1 (PAK1) and the C-terminal binding protein 1 of E1A (CtBP1), recruited to macropinosomes. These macropinosomes also contained the Ad3 receptors CD46 and αv integrins. CtBP1 is a phosphorylation target of PAK1, and is bifunctionally involved in membrane traffic and transcriptional repression of cell cycle, cancer, and innate immunity pathways. Phosphorylation-defective S147A-CtBP1 blocked Ad3 but not Ad5 infection, providing a direct link between PAK1 and CtBP1. The data show that viruses induce macropinocytosis for infectious entry, a pathway used in antigen presentation and cell migration
    corecore