{
"info": {
"author": "Pedro Tome",
"author_email": "pedro.tome@idiap.ch",
"bugtrack_url": null,
"classifiers": [
"Development Status :: 4 - Beta",
"Environment :: Console",
"Framework :: Bob",
"Framework :: Buildout",
"Intended Audience :: Science/Research",
"License :: OSI Approved :: GNU General Public License v3 (GPLv3)",
"Natural Language :: English",
"Programming Language :: Python :: 2.7",
"Topic :: Scientific/Engineering"
],
"description": "=======================================================================\nThe 1st Competition on Counter Measures to Finger Vein Spoofing Attacks\n=======================================================================\n\nThis package provides the source code to run the experiments published in the paper `The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks `_.\nIt relies on some satellite packages from Bob_ to compute the evaluation. \n\n.. note::\n Currently, this package only works in Unix-like environments and under MacOS.\n Due to limitations of the Bob_ library, MS Windows operating systems are not supported.\n We are working on a port of Bob_ for MS Windows, but it might take a while.\n In the meanwhile you could use our VirtualBox_ images that can be downloaded `here `_.\n\n\nInstallation\n============\nThe installation of this package relies on the `BuildOut `_ system. By default, the command line sequence::\n\n $ ./python bootstrap.py\n $ ./bin/buildout\n\nThere are a few exceptions, which are not automatically downloaded:\n\nBob\n---\nTo install Bob_, please visit http://www.idiap.ch/software/bob and follow the installation instructions.\nPlease verify that you have at least version 2.0 of Bob installed.\nIf you have installed Bob in a non-standard directory, please open the buildout.cfg file from the base directory and set the ``prefixes`` directory accordingly.\n\n.. note::\n The experiments that we report in the Paper_ were generated with Bob_ version 2.0.\n If you use different versions of either of these packages, the results might differ slightly.\n For example, we are aware that, due to some initialization differences, the results using Bob 1.2.0 and 1.2.1 are not identical, but similar.\n\n\nImage Databases\n---------------\nThe experiments are run on external image database.\nWe do not provide the images from the database itselve.\nHence, please contact the database owners to obtain a copy of the images.\nThe database used in the competition can be downloaded here:\n\n- Spoofing-Attack Finger Vein Database [``fvspoofingattack``]: http://www.idiap.ch/dataset/fvspoofingattack\n\n.. note::\n After downloading the databases, you will need to tell our software, where it can find them by changing the **run_icb2015_competition.sh** file.\n In particular, please update the ``PATHDATABASE`` to indicate the directory of the dataset: PATHDATABASE=\"YOUR_PATH/FVspoofingAttack\".\n\n\nPlease let all other configuration parameters unchanged as this might influence the competition analysis and, hence, the reproducibility of the results.\n\nGetting help\n------------\nIn case anything goes wrong, please feel free to open a new ticket in our GitLab_ page, or send an email to pedro.tome@idiap.ch.\n\n\nRecreating the results of the Paper_\n====================================\n\nAfter successfully setting up the databases, you are now able to run the anti-spoofing finger vein evaluation as explained in the Paper_.\n\nRunning the experiments\n-----------------------\nThe competition results are run using the **run_icb2015_competition.sh** file.\n\nAdditionally, the individual scripts used can be found in ``bin/`` directory.\nSee ``./bin/icb2015_baseline_countermeasure.py --help`` and ``./bin/icb2015_evaluation_results.py --help`` for a complete list of options.\n\n1. Run the competition results on the Spoofing-Attack Finger Vein database::\n\n $ ./run_icb2015_competition.sh\n\n.. note::\n All output directories of the scripts will be automatically generated if they do not exist yet.\n The submissions folder contains the score files submitted to the competition.\n\n\nCite our paper\n--------------\n\nIf you use the results in any of your contributions, please cite the following paper::\n\n @inproceedings{Tome_ICB2015_AntiSpoofFVCompetition,\n author = {Tome, Pedro and Raghavendra, R. and Busch, Christoph and Tirunagari, Santosh and Poh, Norman and Shekar, B. H. and Gragnaniello, Diego and Sansone, Carlo and Verdoliva, Luisa and Marcel, S{\\'{e}}bastien},\n keywords = {Biometrics, Finger vein, Spoofing Attacks, Competition},\n month = dec,\n title = {The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks},\n booktitle = {International Conference on Biometrics (ICB)},\n series = {},\n volume = {},\n year = {2015},\n pages = {},\n location = {Thailand},\n url = {http://publications.idiap.ch/index.php/publications/show/}\n }\n\n\n\n.. _paper: http://publications.idiap.ch/index.php/publications/show/\n.. _idiap: http://www.idiap.ch\n.. _bob: http://www.idiap.ch/software/bob\n.. _bioidiap at github: http://www.github.com/bioidiap\n.. _gitlab: https://pypi.python.org/pypi/antispoofing.fvcompetition_icb2015\n.. _virtualbox: http://www.virtualbox.org",
"description_content_type": null,
"docs_url": null,
"download_url": "UNKNOWN",
"downloads": {
"last_day": -1,
"last_month": -1,
"last_week": -1
},
"home_page": "https://github.com/bioidiap/antispoofing.fvcompetition_icb2015.git",
"keywords": null,
"license": "LICENSE.txt",
"maintainer": null,
"maintainer_email": null,
"name": "antispoofing.fvcompetition_icb2015",
"package_url": "https://pypi.org/project/antispoofing.fvcompetition_icb2015/",
"platform": "UNKNOWN",
"project_url": "https://pypi.org/project/antispoofing.fvcompetition_icb2015/",
"project_urls": {
"Download": "UNKNOWN",
"Homepage": "https://github.com/bioidiap/antispoofing.fvcompetition_icb2015.git"
},
"release_url": "https://pypi.org/project/antispoofing.fvcompetition_icb2015/2.0.0/",
"requires_dist": null,
"requires_python": null,
"summary": "Running the competition results: \"The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks\".",
"version": "2.0.0"
},
"last_serial": 2355234,
"releases": {
"2.0.0": [
{
"comment_text": "",
"digests": {
"md5": "486695e150695ba7062560264671c69e",
"sha256": "3b6a6d7ebbfd6b8635126e12d86cec8c2866631473c8f659a1188f7897e04fc1"
},
"downloads": -1,
"filename": "antispoofing.fvcompetition_icb2015-2.0.0.zip",
"has_sig": false,
"md5_digest": "486695e150695ba7062560264671c69e",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 30857,
"upload_time": "2015-03-09T16:17:39",
"url": "https://files.pythonhosted.org/packages/c8/fa/1f12ee31d62d40bd8bd7000964373bab8c4d6173402a7ea3b7d5083fc6de/antispoofing.fvcompetition_icb2015-2.0.0.zip"
}
]
},
"urls": [
{
"comment_text": "",
"digests": {
"md5": "486695e150695ba7062560264671c69e",
"sha256": "3b6a6d7ebbfd6b8635126e12d86cec8c2866631473c8f659a1188f7897e04fc1"
},
"downloads": -1,
"filename": "antispoofing.fvcompetition_icb2015-2.0.0.zip",
"has_sig": false,
"md5_digest": "486695e150695ba7062560264671c69e",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 30857,
"upload_time": "2015-03-09T16:17:39",
"url": "https://files.pythonhosted.org/packages/c8/fa/1f12ee31d62d40bd8bd7000964373bab8c4d6173402a7ea3b7d5083fc6de/antispoofing.fvcompetition_icb2015-2.0.0.zip"
}
]
}