problem: spoofing attacks. Up to date, academic research considers spoofing as a binary
classification problem: systems are trained to discriminate between real accesses and
attacks. However, spoofing counter-measures are not designated to operate stand-alone,
but as a part of a recognition system they will protect. In this paper, we study techniques for
decisionlevel and score-level fusion to integrate a recognition and anti-spoofing systems …