Competition on counter measures to 2-D facial spoofing attacks | IEEE Conference Publication | IEEE Xplore