Datasets:
Languages:
English
Size:
< 1K
Tags:
silicone mask
silicone mask attack
3d mask
biometric security
attack detection
liveness detection
License:
Update README.md
Browse files
README.md
CHANGED
|
@@ -20,7 +20,9 @@ Anti spoofing dataset with Silicone 3D mask attacks (10 000 videos)
|
|
| 20 |
## Introduction
|
| 21 |
The Silicone Mask Attack Dataset is designed to address security challenges in liveness detection systems through 3D silicone mask attacks. These presentation attacks are key for testing Passive Liveness Detection systems crucial for iBeta Level 2 certification. This dataset significantly enhances the capabilities of liveness detection models
|
| 22 |
|
| 23 |
-
 models and advanced biometric techniques to detect spoofing attempts.
|
|
@@ -33,7 +35,6 @@ This dataset is crucial for companies preparing to comply with iBeta Level 2 cer
|
|
| 33 |
|
| 34 |
- Additional Flexibility: We can recreate this dataset using both RGB and USB camera inputs to accommodate various research needs.
|
| 35 |
|
| 36 |
-

|
| 37 |
|
| 38 |
## Technical Specifications
|
| 39 |
- File Format: Videos are formatted to be compatible with mainstream ML frameworks.
|
|
|
|
| 20 |
## Introduction
|
| 21 |
The Silicone Mask Attack Dataset is designed to address security challenges in liveness detection systems through 3D silicone mask attacks. These presentation attacks are key for testing Passive Liveness Detection systems crucial for iBeta Level 2 certification. This dataset significantly enhances the capabilities of liveness detection models
|
| 22 |
|
| 23 |
+

|
| 24 |
+
|
| 25 |
+
Successfull Spoofing attack on a Liveness test by [Duobango ](https://www.doubango.org/webapps/face-liveness/)
|
| 26 |
|
| 27 |
## Why Silicone Mask Data?
|
| 28 |
This dataset is crucial for companies preparing to comply with iBeta Level 2 certification which requires anti-spoofing technologies. In today's digital security landscape, the Silicone Mask Dataset serves as a critical resource for training Machine Learning (ML) models and advanced biometric techniques to detect spoofing attempts.
|
|
|
|
| 35 |
|
| 36 |
- Additional Flexibility: We can recreate this dataset using both RGB and USB camera inputs to accommodate various research needs.
|
| 37 |
|
|
|
|
| 38 |
|
| 39 |
## Technical Specifications
|
| 40 |
- File Format: Videos are formatted to be compatible with mainstream ML frameworks.
|