Daniele Muntoni

Learn More
We faced the problem of detecting 2-D face spoofing at­ tacks performed by placing a printed photo of a real user in front of the camera. For this type of attack it is not possi­ ble to relay just on the face movements as a clue of vitality because the attacker can easily simulate such a case, and also because real users often show a "low vitality" during(More)
Template representativeness is a crucial problem in biometrics. The biometric data is subject to on-going changes which make initial enrolled templates usually acquired in controlled environment, un-representative of the input biometric data. Thus resulting in performance degradation of the system. To deal with this issue, "adaptive" biometric systems based(More)
Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems to exist no comparative studies of different techniques using the same protocols and data. The motivation behind this competition is to compare the performance of different state-of-the-art algorithms on the same database using a(More)
In this paper, an experimental comparison between fixed and trained fusion rules for multimodal personal identity verification is reported. We focused on the behaviour of the considered fusion methods for ensembles of classifiers exhibiting significantly different performance, as this is one of the main characteristics of multimodal biometrics systems. The(More)
The World Wide Web has grown so fast in the last decade and it is today a vital daily part of people. The Internet is used for many purposes by an ever growing number of users, mostly for daily activities, tasks, and services. To face the needs of users, an efficient and effective access to information is required. To deal with this task, the adoption of(More)
  • 1