ACTIONS
Login
OLD EDITIONS
LivDet 2011
LivDet 2009

INTRODUCTION
RULES
DATA SET
ALGORITHM SUBMISSION
SYSTEMS
PERFORMANCE EVALUATION
SUBMIT A DATASET
CONTACTS
SPONSORS
INVOLVED PEOPLE

«
»
The Department of Electrical and Electronic Engineering of the University of Cagliari in cooperation with the Department of Electrical and Computer Engineering of Clarkson University is proud to announce the third edition of the Fingerprint Liveness Detection Competition 2013 that will be hosted by the International Conference on Biometrics in Madrid.

NEWS
LivDet report and slides presented at ICB 2013 are available!

**** IMPORTANT NOTICE *****
The Crossmatch data set was affected by a problem and it *cannot* be used, as it is, for assessing the performance of a liveness detection algorithm. We kindly ask to all people that have carried out experiments on this data set to contact us in order to receive a subset of emended Crossmatch data. We apologize for this inconvenient and hope this has not impacted on your research work.

CONTACT US
Training and test data distribution (full LivDet2013 data) – Please contact livdet@gmail.com if you would like to request the dataset from LivDet 2013 and previous LivDet competitions.

Spoofing The widespread use of personal verification systems based on fingerprints has shown some weaknesses related to the problem of security. Among the others, it is well-known that a fingerprint verification system can be deceived by submitting artificial reproductions of fingerprints made up of silicon or gelatine to the electronic capture device (optical or capacitive). These images are then processed as “true” fingerprints.

Liveness Detection Therefore, a recent issue in the field of security in fingerprint verification (unsupervised especially) is known as “liveness detection”. The standard verification system is coupled with additional hardware or software modules aimed to certify the authenticity of the submitted fingerprints. Whilst hardware-based solutions are the most expensive, software-based ones attempt to measure liveness from characteristics of images themselves by simply applying image processing algorithms.

Software Liveness Classification The problem of vitality detection is treated as a two-class classification problem (live or fake). An appropriate classifier is designed in order to extract the probability of the image vitality given the extracted set of features. LivDet2013 competition is open to all academic and industrial institutions which have a solution for software-based fingerprint vitality detection problem.

LivDet2013 Competition Overview Each participant is invited to submit its algorithm in an Win32 console application. The performance will be evaluated by utilizing a very large data set of “fake” and “live” fingerprint images captured with four capture devices. The performance rank will be compiled and published in this site.

The goal of the competition is to compare different methodologies for software-based fingerprint liveness detection with a common experimental protocol and data set. The ambition of the competition is to become the reference event for academic and industrial research. The competition is not defined as an official system for quality certification of the proposed solutions, but may impact the state of the art in this crucial field, with reference to the general problem of security in biometric systems.

LivDet 2013 will feature both fingerprint and iris biometrics. The structure of the competition will consist of four separate parts;
  • Fingerprint Part 1: Algorithms
  • Fingerprint Part 2: Systems
IMPORTANT DATE
Deadlines:
  • Registration by January 31, 2013
  • REGISTRATION IS CLOSED
  • Submission by February 28, 2013
IEEE Copyright Notice:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.