The 2nd competition on counter measures to 2D face spoofing attacks | IEEE Conference Publication | IEEE Xplore