{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T15:33:22Z","timestamp":1769441602734,"version":"3.49.0"},"publisher-location":"London","reference-count":27,"publisher":"Springer London","isbn-type":[{"value":"9781447165231","type":"print"},{"value":"9781447165248","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4471-6524-8_5","type":"book-chapter","created":{"date-parts":[[2014,8,29]],"date-time":"2014-08-29T15:09:12Z","timestamp":1409324952000},"page":"83-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Face Anti-spoofing: Multi-spectral Approach"],"prefix":"10.1007","author":[{"given":"Dong","family":"Yi","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Stan Z.","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,18]]},"reference":[{"key":"5_CR1","unstructured":"Duc N, Minh B (2009) Your face is not your password. Black Hat Conference"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Li J, Wang Y, Tan T, Jain AK (2004) Live face detection based on the analysis of fourier spectra. In: Jain AK, Ratha NK (eds) Society of photo-optical instrumentation engineers (SPIE) conference series, vol 5404, pp 296\u2013303","DOI":"10.1117\/12.541955"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Proceedings of the 11th European conference on computer vision: Part VI., ECCV\u201910. Springer, Berlin, pp 504\u2013517","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Maatta J, Hadid A, Pietikainen M (2011) Face spoofing detection from single images using micro-texture analysis. In: Biometrics (IJCB), 2011 international joint conference on, pp 1\u20137","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: Computer vision, 2007. ICCV 2007. IEEE 11th international conference on, pp 1\u20138","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Kollreider K, Fronthaler H, Bigun J (2008) Verifying liveness by multiple experts in face biometrics. In: Computer vision and pattern recognition workshops, 2008. CVPRW \u201908. IEEE computer society conference on, pp 1\u20136","DOI":"10.1109\/CVPRW.2008.4563115"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Kollreider K, Fronthaler H, Bigun J (2005) Evaluating liveness by face images and the structure tensor. In: Automatic identification advanced technologies, 2005. Fourth IEEE workshop on, pp 75\u201380","DOI":"10.1109\/AUTOID.2005.20"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Chetty G, Wagner M (2004) Liveness verification in audio-video speaker authentication. In: In proceeding of the 10th ASSTA conference, pp 358\u2013363. Macquarie University Press","DOI":"10.21437\/Interspeech.2004-429"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: Biometrics (IJCB), 2011 international joint conference on, pp 1\u20137","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Bai J, Ng TT, Gao X, Shi YQ (2010) Is physics-based liveness detection truly possible with a single image? In: Circuits and systems (ISCAS), Proceedings of 2010 IEEE international symposium on, pp 3425\u20133428","DOI":"10.1109\/ISCAS.2010.5537866"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li S (2012) A face antispoofing database with diverse attacks. In: Biometrics (ICB), 2012 5th IAPR international conference on, pp 26\u201331","DOI":"10.1109\/ICB.2012.6199754"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Pavlidis I, Symosek P (2000) The imaging issue in an automatic face\/disguise detection system. In: Computer vision beyond the visible spectrum: methods and applications, 2000. Proceedings of the IEEE workshop on, pp 15\u201324","DOI":"10.1109\/CVBVS.2000.855246"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Kim Y, Na J, Yoon S, Yi J (2009) Masked fake face detection using radiance measurements. J Opt Soc Amer A 26(4)","DOI":"10.1364\/JOSAA.26.000760"},{"key":"5_CR14","unstructured":"OSU thermal imagery database. http:\/\/www.cse.ohiostate.edu\/otcbvs-bench\/"},{"key":"5_CR15","unstructured":"Yi D, Lei Z, Hu Y, Li SZ (2013) Fast matching by 2 lines of code for large scale face recognition systems. CoRR abs\/1302.7180"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Li SZ, Chu R, Liao S, Zhang L (2007) Illumination invariant face recognition using near-infrared images. IEEE Transactions on pattern analysis and machine intelligence 26(Special issue on biometrics: progress and directions)","DOI":"10.1109\/TPAMI.2007.1014"},{"key":"5_CR17","volume-title":"IEEE ICCV workshop on statistical and computational theories of vision","author":"P Viola","year":"2011","unstructured":"Viola P, Jones M (2011) Robust real time object detection. IEEE ICCV workshop on statistical and computational theories of vision. Vancouver, Canada"},{"key":"5_CR18","first-page":"38","volume":"61","author":"TF Cootes","year":"1995","unstructured":"Cootes TF, Taylor CJ, Cooper DH, Graham J (1995) Active shape models: their training and application. CVGIP: image underst 61:38\u201359","journal-title":"CVGIP: image underst"},{"key":"5_CR19","volume-title":"Introduction to statistical pattern recognition","author":"K Fukunaga","year":"1990","unstructured":"Fukunaga K (1990) Introduction to statistical pattern recognition, 2nd edn. Academic Press, Boston","edition":"2"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Ahonen T, Hadid A, Pietikainen M (2004) Face recognition with local binary patterns. In: Proceedings of the European conference on computer vision. Prague, Czech, pp 469\u2013481","DOI":"10.1007\/978-3-540-24670-1_36"},{"key":"5_CR21","unstructured":"Yi D, Lei Z, Li SZ (2011) A robust eye localization method for low quality face images. In: International joint conference on biometrics (IJCB). Washington, pp 15\u201321"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/s11263-010-0380-4","volume":"91","author":"J Saragih","year":"2011","unstructured":"Saragih J, Lucey S, Cohn J (2011) Deformable model fitting by regularized landmark mean-shift. Int J Comput Vis 91:200\u2013215","journal-title":"Int J Comput Vis"},{"key":"5_CR23","unstructured":"Milborrow S, Morkel J, Nicolls F (2010) The MUCT landmarked face database. Pattern recognition association of South Africa (2010). Http:\/\/www.milbo.org\/"},{"issue":"3","key":"5_CR24","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/1015706.1015720","volume":"23","author":"C Rother","year":"2004","unstructured":"Rother C, Kolmogorov V, Blake A (2004) Grabcut: interactive foreground extraction using iterated graph cuts. ACM Trans Graph 23(3):309\u2013314","journal-title":"ACM Trans Graph"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Phillips PJ, Moon H, Rizvi SA, Rauss PJ (2000) The FERET evaluation methodology for face recognition algorithms 22(10):1090\u20131104","DOI":"10.1109\/34.879790"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Okada K, Steffens J, Maurer T, Hong H, Elagin E, Neven H, von der Malsburg C (1998) The Bochum\/USC face recognition system and how it fared in the FERET phase III test","DOI":"10.1007\/978-3-642-72201-1_10"},{"issue":"7","key":"5_CR27","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/34.598228","volume":"19","author":"P Belhumeur","year":"1997","unstructured":"Belhumeur P, Hespanha J, Kriegman D (1997) Eigenfaces vs. fisherfaces: recognition using class specific linear projection. IEEE Trans PAMI 19(7):711\u2013720","journal-title":"IEEE Trans PAMI"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Biometric Anti-Spoofing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-6524-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T19:38:17Z","timestamp":1676403497000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-6524-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9781447165231","9781447165248"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-6524-8_5","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"value":"2191-6586","type":"print"},{"value":"2191-6594","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}