Protocol II

Protocol III

Protocol IV

Paper reference:

Z. Boulkenafet et al., "A competition on generalized software-based face presentation attack detection in mobile scenarios", IEEE International Joint Conference on Biometrics (IJCB), 2017, pp. 688-696, doi: 10.1109/BTAS.2017.8272758.

PDF

@INPROCEEDINGS{IJCBcompetition2017,

author={Boulkenafet, Z. and Komulainen, J. and Akhtar, Z. and Benlamoudi, A. and Samai, D. and Bekhouche, S. E. and Ouafi, A. and Dornaika, F. and Taleb-Ahmed, A. and Qin, L. and Peng, F. and Zhang, L.B. and Long, M. and Bhilare, S. and Kanhangad, V. and Costa-Pazo, A. and Vazquez-Fernandez, E. and Perez-Cabo, D. and Moreira-Perez, J. J. and Gonzalez-Jimenez, D. and Mohammadi, A. and Bhattacharjee, S. and Marcel, S. and Volkova, S. and Tang, Y. and Abe, N. and Li, L. and Feng, X. and Xia, Z. and Jiang, X. and Liu, S. and Shao, R. and Yuen, P. C. and Almeida, W. R. and Andalo, F. and Padilha, R. and Bertocco, G. and Dias, W. and Wainer, J. and Torres, R. and Rocha, A. and Angeloni, M. A. and Folego, G. and Godoy, A. and Hadid, A.},

booktitle={2017 IEEE International Joint Conference on Biometrics (IJCB)},

title={A competition on generalized software-based face presentation attack detection in mobile scenarios},

year={2017},

pages={688-696},

doi={10.1109/BTAS.2017.8272758}}