Executing Experiments for Detection of Makeup Attacks

Generating set of commands

The complete setup has 5 experiments of makeup detection. To facilitate quick running and evaluation of experiments, a simple script is provided to programmatically generate all commands. You can specify the base directory where all the results should be stored, and few other parameters in config.ini in the present folder. Run the python script generate_commands.py in the same folder. As a result, a new text file commands.txt will be generated in the same folder which consists of necessary commands. The commands are divided into 5 sections:

  1. AIM Vulnerability

  2. AIM PAD

  3. YMU Cross-validation

  4. Cross-dataset (Training on YMU)

  5. Cross-dataset (Training on MIFS)

Running the experiments

Run commands from commands.txt to execute experiments, and also to evaluate and plot their results.

Note: Whenever you are working with already preprocessed data, you may use the corresponding flags in spoof.py command to avoid invoking the preprocessing commands.