TrainingDataPro's picture
Update README.md
bce4f7b verified
metadata
language:
  - en
license: cc-by-nc-nd-4.0
task_categories:
  - video-classification
tags:
  - code
  - legal
  - finance
dataset_info:
  features:
    - name: photo
      dtype: image
    - name: video
      dtype: string
    - name: worker_id
      dtype: string
    - name: set_id
      dtype: string
    - name: age
      dtype: int8
    - name: country
      dtype: string
    - name: gender
      dtype: string
  splits:
    - name: train
      num_bytes: 45568435
      num_examples: 14
  download_size: 458883249
  dataset_size: 45568435

Presentation Attack Detection 2D Dataset - Biometric Attack Dataset

The liveness detection dataset consists of photos of individuals and videos of him/her wearing printed 2D mask with cut-out holes for eyes. Videos are filmed in different lightning conditions and in different places (indoors, outdoors), a person moves his/her head left, right, up and down. Each video in the dataset has an approximate duration of 15-17 seconds.

πŸ’΄ For Commercial Usage: Full version of the dataset includes much more videos of people for presentation attack detection, leave a request on TrainingData to buy the dataset

Types of media files in the dataset:

  • Photo of the individual
  • Video with the printed photo of the individual, mask is cut along the contour, there are cut-out holes for eyes, mask is attached to the person's head

The dataset comprises videos of genuine facial presentations using various methods, including 2D masks and photos, as well as real and spoof faces. It proposes a novel approach that learns and extracts facial features to prevent spoofing attacks, based on deep neural networks and advanced biometric techniques.

The dataset serves as a valuable resource for computer vision, anti-spoofing tasks, video analysis, and security systems. It allows for the development of algorithms and models that can effectively detect attacks perpetrated by individuals wearing printed 2D masks.

Our results show that this technology works effectively in securing most applications and prevents unauthorized access by distinguishing between genuine and spoofed inputs. Additionally, it addresses the challenging task of identifying unseen spoofing cues, making it one of the most effective techniques in the field of anti-spoofing research.

πŸ’΄ Buy the Dataset: This is just an example of the data. Leave a request on https://trainingdata.pro/datasets to discuss your requirements, learn about the price and buy the dataset

Content

The folder "files" includes 14 folders:

  • corresponding to each person in the sample
  • including photo and video of the individual

File with the extension .csv

includes the following information for each media file:

  • set_id: the identifier of the set of media files,
  • worker_id: the identifier of the person who provided the media file,
  • age: the age of the person,
  • gender: the gender of the person,
  • country: the country of origin of the person

TrainingData provides high-quality data annotation tailored to your needs

More datasets in TrainingData's Kaggle account: https://www.kaggle.com/trainingdatapro/datasets

TrainingData's GitHub: https://github.com/Trainingdata-datamarket/TrainingData_All_datasets

keywords: ibeta level 1, ibeta level 2, liveness detection systems, liveness detection dataset, biometric dataset, biometric data dataset, biometric system attacks, anti-spoofing dataset, face liveness detection, deep learning dataset, face spoofing database, face anti-spoofing, face recognition, face detection, face identification, human video dataset, video dataset, presentation attack detection, presentation attack dataset, 2d print attacks, print 2d attacks dataset, phone attack dataset, face anti spoofing, large-scale face anti spoofing, rich annotations anti spoofing dataset, cut prints spoof attack