Executing Other Algorithms

This section explains how to execute face presentation attack detection (PAD) algorithms implemented in bob.pad.face.

Warning

Algorithms introduced in this section might be in the process of publishing. Therefore, it is not allowed to publish results introduced in this section without the permission of the owner of the package. If you are planning to use the results from this section, please contact the owner of the package first. Please check the setup.py for contact information.

Running face PAD Experiments

To run the PAD experiments, use the bob pad command. To see the description of this command you can type in the console:

$ bob pad --help

This script is explained in more detail in Running Presentation Attack Detection Experiments.

Usually, it is a good idea to have at least verbose level 2 (i.e., calling bob pad --verbose --verbose, or the short version bob pad -vv).

Note

Running in Parallel

To run the experiments in parallel, you can use an existing or (define a new) SGE grid or local host multiprocessing configuration. To run the experiment in the Idiap SGE grid, you can simply add the --dask-client sge command line option. To run experiments in parallel on the local machine, add the --dask-client local-parallel option.

See this for more for more details on dask configurations.

Database setups and face PAD algorithms are encoded using bob.bio.base.configuration-files, all stored inside the package structure, in the directory bob/pad/face/config. Documentation for each resource is available on the section Resources.