Challenge 1: Liveness Detection in Action
This Challenge is available for either contact and contactless fingerprint or both.
Please indicate during registration.
In real applications, the Fingerprint Liveness Detection system works together with a recognition system in order to protect it from spoofing attacks. Competitors are invited to submit a complete algorithm able not only to output the liveness probability (liveness output) but also an integrated match score (IMS output) which includes the probability above with the probability of belonging to the declared user.
In last years it was noticed that the existence of artifacts due to the human skin (person-specific) and to the particular curvature of ridges and valleys (finger-specific) can impact in liveness detection systems’ performance and can be exploit to improve the integrated system. In particular, the data acquired during the recognition system’s initial enrollment phase can be used to lower the liveness error rate and consequently, to improve the integrated system performance. For this challenge, participants can decide whether to exploit the additional information coming from the enrolled user (“user-specific effect”).
Each submitted algorithm must be a Windows or Linux console application with the following list of parameters:
Synopsis: [nameOfAlgorithm].exe [ndataset] [templateimagesfile] [probeimagesfile] [livenessoutputfile] [IMSoutputfile]
[nameOfAlgorithm].exe – It is the executable name. Format: Windows or Linux console application (es. .exe) [ndataset] – It is the identification number of the dataset to analyse. Legend:- GreenBit
- Dermalog
- Unkown1
- Unknown2
![](https://sites.unica.it/livdet/files/2024/04/ims_scheme.png)
Fig.1 Block diagram of a possible Integrated Match System comparison
Each parameter related to the dataset configuration must be set before submission. Each competitor can configure his algorithm by the training-set available after the registration. Only Windows or Linux console applications with the above characteristics will be accepted for the competition.
Participants are recommended to send a description of their algorithm.
They may publish also the source code of their algorithm, but this is not mandatory.