{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:11:35Z","timestamp":1743063095210,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030616083"},{"type":"electronic","value":"9783030616090"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61609-0_41","type":"book-chapter","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T19:02:59Z","timestamp":1603134179000},"page":"517-526","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Face Anti-spoofing with a Noise-Attention Network Using Color-Channel Difference Images"],"prefix":"10.1007","author":[{"given":"Yuanyuan","family":"Ren","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yongjian","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Beibei","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yixiang","family":"Xie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yufei","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"key":"41_CR1","unstructured":"Zinelabidine B., Jukka K., Abdenour H.: Face anti-spoofing based on color texture analysis. In: International Conference on Image Processing (ICIP), pp. 2636\u20132640. IEEE, Quebec City (2015)"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 2636\u20132640. IEEE, Quebec City (2015)","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face anti-spoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26\u201331. IEEE, New Delhi (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Atoum, Y., Liu, Y., Jourabloo, A., Liu, X.: Face anti-spoofing using patch and depth-based CNNs. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 319\u2013328. IEEE, Denver (2017)","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Xu, Z., Li, S., Deng, W.: Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In: 2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR), pp. 141\u2013145. IEEE, Kuala Lumpur (2015)","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"41_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-030-01261-8_18","volume-title":"Computer Vision \u2013 ECCV 2018","author":"A Jourabloo","year":"2018","unstructured":"Jourabloo, A., Liu, Y., Liu, X.: Face de-spoofing: anti-spoofing via noise modeling. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11217, pp. 297\u2013315. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01261-8_18"},{"key":"41_CR7","unstructured":"Park, J., Woo, S., Lee, J., Kweon, I.: BAM: bottleneck attention module. In: Proceedings of British Machine Vision Conference (BMVC), Newcastle, UK, p. 147 (2018)"},{"key":"41_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-030-24274-9_20","volume-title":"Artificial Intelligence and Security","author":"B Ma","year":"2019","unstructured":"Ma, B., Wang, X., Zhang, H., Li, F., Dan, J.: CBAM-GAN: generative adversarial networks based on convolutional block attention module. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICAIS 2019. LNCS, vol. 11632, pp. 227\u2013236. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24274-9_20"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Klein, T., Nabi, M.: Attention is (not) all you need for commonsense reasoning. arXiv preprint arXiv:1905.13497(2019)","DOI":"10.18653\/v1\/P19-1477"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778. IEEE, Las Vegas (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"de Freitas Pereira, T., Anjos, A., De Martino, J. M., Marcel, S.: Can face anti-spoofing countermeasures work in a real world scenarion. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20138. IEEE, Madrid (2013)","DOI":"10.1109\/ICB.2013.6612981"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 389\u2013398. IEEE, Salt Lake City (2018)","DOI":"10.1109\/CVPR.2018.00048"},{"key":"41_CR13","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/TIFS.2019.2922241","volume":"15","author":"H Chen","year":"2019","unstructured":"Chen, H., Hu, G., Lei, Z., Chen, Y., Robertson, N.M., Li, S.Z.: Attention-based two-stream convolutional networks for face spoofing detection. IEEE Trans. Inf. Forensics Secur. 15, 578\u2013593 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"41_CR14","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","volume":"10","author":"D Menotti","year":"2015","unstructured":"Menotti, D., et al.: Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864\u2013879 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"41_CR15","doi-asserted-by":"crossref","unstructured":"Lucena, O., Junior, A., Moia, V., et al.: Transfer learning using convolutional neural networks for face anti-spoofing. Proceedings of the 14th International Conference on Image Analysis and Recognition (ICIAR), Montreal, Canada, pp. 27\u201334 (2017)","DOI":"10.1007\/978-3-319-59876-5_4"},{"key":"41_CR16","doi-asserted-by":"publisher","first-page":"1794","DOI":"10.1109\/TIFS.2018.2801312","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., Li, W., Cao, H., Wang, S., Huang, F., Kot, A.C.: Unsupervised domain adaptation for face anti-spooing. IEEE Trans. Inf. Forensics Secur. 13, 1794\u20131809 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"41_CR17","doi-asserted-by":"publisher","first-page":"4726","DOI":"10.1109\/TIP.2015.2466088","volume":"24","author":"A Pinto","year":"2015","unstructured":"Pinto, A., Pedrini, H., Schwartz, W.R., Rocha, A.: Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans. Image Process 24, 4726\u20134740 (2015)","journal-title":"IEEE Trans. Image Process"},{"key":"41_CR18","unstructured":"Yang, J., Lei, Z., Li, S.Z.: Learn convolutional neural network for face anti-spoofing. CoRR, vol. abs\/1408.5601, August 2018. http:\/\/arxiv.org\/abs\/1408.5601"},{"issue":"4","key":"41_CR19","doi-asserted-by":"publisher","first-page":"043007","DOI":"10.1117\/1.JEI.26.4.043007","volume":"26","author":"A Benlamoudi","year":"2017","unstructured":"Benlamoudi, A., Aiadi, K.E., Ouafi, A., et al.: Face antispoofing based on frame difference and multilevel representation. J. Electron. Imaging 26(4), 043007 (2017)","journal-title":"J. Electron. Imaging"},{"issue":"4","key":"41_CR20","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"W Di","year":"2015","unstructured":"Di, W., Hu, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"41_CR21","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Proceedings of the Advances in Neural Information Processing Systems (NIPS), Montreal, Canada, pp. 3104\u20133112 (2014)"},{"key":"41_CR22","doi-asserted-by":"crossref","unstructured":"Luong, M.T., Pham, H., Manning, C.D.: Effective approaches to attention-based neural machine translation. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing(EMNLP), Lisbon, Portugal, pp. 17\u201321 (2015)","DOI":"10.18653\/v1\/D15-1166"},{"key":"41_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-540-74549-5_27","volume-title":"Advances in Biometrics","author":"L Sun","year":"2007","unstructured":"Sun, L., Pan, G., Wu, Z., Lao, S.: Blinking-based live face detection using conditional random fields. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 252\u2013260. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74549-5_27"},{"key":"41_CR24","doi-asserted-by":"crossref","unstructured":"Pan, G., Sun, L., Wu, Z., et al.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: Proceedings of the 2007 IEEE 11th International Conference on Computer Vision, Rio de Janeiro, Brazil, pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/ICCV.2007.4409068"},{"issue":"4","key":"41_CR25","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TIFS.2015.2404294","volume":"10","author":"D Gragnaniello","year":"2015","unstructured":"Gragnaniello, D., Poggi, G., Sansone, C., et al.: An investigation of local descriptors for biometric spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 849\u2013863 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"41_CR26","doi-asserted-by":"crossref","unstructured":"Mirjalili, V., Ross, A.: Soft biometric privacy: retaining biometric utility of face images while perturbing gender. In: 2017 IEEE International Conference on Biometrics (IJCB), pp. 564\u2013573. IEEE, CO, USA (2017)","DOI":"10.1109\/BTAS.2017.8272743"},{"key":"41_CR27","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., He, P., Wang, S., et al.: Learning generalized deep feature representation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13, 2639\u20132652 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"41_CR28","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., Pietikainen, M.: Context based face anti-spoofing. In: IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems, Arlington, US, pp. 1\u20138 (2013)","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"41_CR29","doi-asserted-by":"crossref","unstructured":"Yang, J., Lei, Z., Liao, S., Li, S.Z.: Face liveness detection with component dependent descriptor. In: IEEE International Conference on Biometrics, Madrid, Spain, pp. 1\u20136 (2013)","DOI":"10.1109\/ICB.2013.6612955"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61609-0_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T14:01:55Z","timestamp":1619272915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-61609-0_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030616083","9783030616090"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61609-0_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bratislava","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-nns.org\/icann2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"249","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"139","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"*The conference was postponed to 2021 due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}