{ "info": { "author": "Amir Mohammadi", "author_email": "amir.mohammadi@idiap.ch", "bugtrack_url": null, "classifiers": [ "Development Status :: 3 - Alpha", "Framework :: Bob", "Intended Audience :: Developers", "License :: OSI Approved :: GNU General Public License v3 (GPLv3)", "Natural Language :: English", "Programming Language :: Python", "Topic :: Scientific/Engineering :: Artificial Intelligence" ], "description": ".. vim: set fileencoding=utf-8 :\n\n======================================================================\n Evaluation Methodologies for Biometric Presentation Attack Detection\n======================================================================\n\nThis package is part of the signal-processing and machine learning toolbox\nBob_. It is a software package to reproduce \"Evaluation Methodologies for\nBiometric Presentation Attack Detection\" chapter of \"Handbook of Biometric\nAnti- Spoofing: Presentation Attack Detection 2nd Edition\"::\n\n @INCOLLECTION{Chingovska_SPRINGER_2019,\n author = {Chingovska, Ivana and Mohammadi, Amir and Anjos, Andr{\\'{e}} and Marcel, S{\\'{e}}bastien},\n editor = {Marcel, S{\\'{e}}bastien and Nixon, Mark and Fierrez, Julian and Evans, Nicholas},\n title = {Evaluation Methodologies for Biometric Presentation Attack Detection},\n booktitle = {Handbook of Biometric Anti-Spoofing},\n edition = {2nd},\n chapter = {20},\n year = {2019},\n publisher = {Springer International Publishing},\n isbn = {978-3-319-92627-8},\n url = {https://www.springer.com/us/book/9783319926261},\n doi = {10.1007/978-3-319-92627-8},\n crossref = {Chingovska_Idiap-Internal-RR-30-2018},\n pdf = {https://publidiap.idiap.ch/downloads//papers/2018/Chingovska_SPRINGER_2019.pdf}\n }\n\n\nReproduction\n------------\n\nThe installation instructions are based on conda_ and works on **Linux and\nMacOS systems only**. `Install conda`_ before continuing.\n\nOnce you have installed conda_, create a conda environment with the following\ncommand and activate it::\n\n $ conda create --name bob.hobpad2.chapter20 --override-channels \\\n -c https://www.idiap.ch/software/bob/conda -c defaults \\\n bob.hobpad2.chapter20\n $ conda activate bob.hobpad2.chapter20\n\nThis will install all the required software to reproduce this book chapter.\nOnce installed, follow the commands below to generate the plots::\n\n $ # To generate Figure 4:\n $ bob measure gen generic_scores\n $ bob measure hist generic_scores/scores-dev -o fig4.a.pdf\n $ bob measure det generic_scores/scores-dev -o fig4.b.pdf --lines-at ' ' --no-disp-legend --titles ' '\n $ bob measure epc generic_scores/scores-{dev,eval} -o fig4.c.pdf --titles ' ' --no-disp-legend -xl '$\\beta$'\n $ # To generate Figure 5:\n $ bob vulnerability gen vuln_scores\n $ bob vulnerability hist vuln_scores/{licit,spoof}/scores-dev -o fig5.a.pdf --no-iapmr-line\n $ bob vulnerability hist vuln_scores/{licit,spoof}/scores-dev -o fig5.b.pdf --no-real-data\n $ bob vulnerability det vuln_scores/{licit,spoof}/scores-dev -o fig5.c.pdf --fnmr 0.0214 --no-real-data --title ' '\n $ bob vulnerability fmr_iapmr vuln_scores/{licit,spoof}/scores-{dev,eval} -o fig5.d.pdf --no-disp-legend --title ' '\n $ bob vulnerability epc vuln_scores/{licit,spoof}/scores-{dev,eval} -o fig5.e.pdf --title ' '\n $ bob vulnerability epsc vuln_scores/{licit,spoof}/scores-{dev,eval} -o fig5.f.pdf -nI --titles 'EPSC with $\\beta = 0.50$' --no-disp-legend\n\n\nContact\n-------\n\nFor questions or reporting issues to this software package, contact our\ndevelopment `mailing list`_.\n\n\n.. Place your references here:\n.. _bob: https://www.idiap.ch/software/bob\n.. _installation: https://www.idiap.ch/software/bob/install\n.. _mailing list: https://www.idiap.ch/software/bob/discuss\n.. _conda: https://conda.io\n.. _install conda: https://conda.io/docs/user-guide/install/index.html", "description_content_type": "", "docs_url": null, "download_url": "", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "https://gitlab.idiap.ch/bob/bob.hobpad2.chapter20", "keywords": "bob", "license": "GPLv3", "maintainer": "", "maintainer_email": "", "name": "bob.hobpad2.chapter20", "package_url": "https://pypi.org/project/bob.hobpad2.chapter20/", "platform": "", "project_url": "https://pypi.org/project/bob.hobpad2.chapter20/", "project_urls": { "Homepage": "https://gitlab.idiap.ch/bob/bob.hobpad2.chapter20" }, "release_url": "https://pypi.org/project/bob.hobpad2.chapter20/1.0.2/", "requires_dist": null, "requires_python": "", "summary": "Software package to reproduce Evaluation Methodologies for Biometric Presentation Attack Detection chapter of Handbook of Biometric Anti-Spoofing: Presentation Attack Detection 2nd Edition", "version": "1.0.2" }, "last_serial": 4584897, "releases": { "1.0.2": [ { "comment_text": "", "digests": { "md5": "3d523d6d8c807ad4aa10c976f2dd1c21", "sha256": "aadea5c987f91f67dfcf833ea226c5bd36833f5053f6f6c3273e2df34e84086a" }, "downloads": -1, "filename": "bob.hobpad2.chapter20-1.0.2.zip", "has_sig": false, "md5_digest": "3d523d6d8c807ad4aa10c976f2dd1c21", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 35219, "upload_time": "2018-12-11T11:15:28", "url": "https://files.pythonhosted.org/packages/2f/51/6e38eda72651ef00bb348cb558dc197bfdd8b05d5e0807508f5161ce5b29/bob.hobpad2.chapter20-1.0.2.zip" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "3d523d6d8c807ad4aa10c976f2dd1c21", "sha256": "aadea5c987f91f67dfcf833ea226c5bd36833f5053f6f6c3273e2df34e84086a" }, "downloads": -1, "filename": "bob.hobpad2.chapter20-1.0.2.zip", "has_sig": false, "md5_digest": "3d523d6d8c807ad4aa10c976f2dd1c21", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 35219, "upload_time": "2018-12-11T11:15:28", "url": "https://files.pythonhosted.org/packages/2f/51/6e38eda72651ef00bb348cb558dc197bfdd8b05d5e0807508f5161ce5b29/bob.hobpad2.chapter20-1.0.2.zip" } ] }