Bob 2.0 implementation of ISV scoring. All input ids are strings.

This algorithm is a legacy one. The API has changed since its implementation. New versions and forks will need to be updated.
This algorithm is splittable

Algorithms have at least one input and one output. All algorithm endpoints are organized in groups. Groups are used by the platform to indicate which inputs and outputs are synchronized together. The first group is automatically synchronized with the channel defined by the block in which the algorithm is deployed.

Group: probes

Endpoint Name Data Format Nature
probe_isv_offset system/array_1d_floats/1 Input
probe_statistics tutorial/gmm_statistics/1 Input
template_ids system/array_1d_text/1 Input
probe_id system/text/1 Input
probe_client_id system/text/1 Input
scores elie_khoury/string_probe_scores/1 Output

Group: templates

Endpoint Name Data Format Nature
template_model tpereira/isvmachine/1 Input
template_client_id system/text/1 Input
template_id system/text/1 Input

Group: train

Endpoint Name Data Format Nature
ubm tutorial/gmm/1 Input
isvbase tpereira/isvbase/1 Input

The code for this algorithm in Python
The ruler at 80 columns indicate suggested POSIX line breaks (for readability).
The editor will automatically enlarge to accomodate the entirety of your input
Use keyboard shortcuts for search/replace and faster editing. For example, use Ctrl-F (PC) or Cmd-F (Mac) to search through this box

Computes the ISV scoring.

Specific details can be found in Equation (40) in [McCool2013].

This algorithm relies on the Bob library.

The inputs are:

  • probe_isv_offset: The Session Offset of a probe.
  • probe_statistics: A set of GMM Statistics of a probe.
  • template_ids: A set of probe (class/subject) identifiers as an array of text strings.
  • ubm: A GMM corresponding to the Universal Background Model.
  • isvbase: The subspace_u and subspace_d for the session and the client offset respectivelly.
  • template_id: Client (class/subject) identifier as a text string.
  • template_model: The client model is the latent variable zi ( Eq. (31) in McCool2013) that corresponds to the client offset (with the session variations suppressed).

The output are the scores.

[McCool2013]
  1. McCool, et al.: Session variability modelling for face authentication. IET biometrics 2.3 (2013): 117-129.

Experiments

Updated Name Databases/Protocols Analyzers
pkorshunov/pkorshunov/isv-asv-pad-fusion-complete/1/asv_isv-pad_lbp_hist_ratios_lr-fusion_lr-pa_aligned avspoof/2@physicalaccess_verify_train,avspoof/2@physicalaccess_verification,avspoof/2@physicalaccess_verification_spoof,avspoof/2@physicalaccess_verify_train_spoof,avspoof/2@physicalaccess_antispoofing pkorshunov/spoof-score-fusion-roc_hist/1
pkorshunov/pkorshunov/isv-asv-pad-fusion-complete/1/asv_isv-pad_gmm-fusion_lr-pa avspoof/2@physicalaccess_verify_train,avspoof/2@physicalaccess_verification,avspoof/2@physicalaccess_verification_spoof,avspoof/2@physicalaccess_verify_train_spoof,avspoof/2@physicalaccess_antispoofing pkorshunov/spoof-score-fusion-roc_hist/1
pkorshunov/pkorshunov/isv-speaker-verification-spoof/1/isv-speaker-verification-spoof-pa avspoof/2@physicalaccess_verification_spoof,avspoof/2@physicalaccess_verification pkorshunov/eerhter_postperf_iso_spoof/1
pkorshunov/pkorshunov/isv-speaker-verification/1/isv-speaker-verification-licit avspoof/2@physicalaccess_verification pkorshunov/eerhter_postperf_iso/1

This table shows the number of times this algorithm has been successfully run using the given environment. Note this does not provide sufficient information to evaluate if the algorithm will run when submitted to different conditions.

Terms of Service | Contact Information | BEAT platform version 2.2.1b0 | © Idiap Research Institute - 2013-2024