{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:32:56Z","timestamp":1743031976636,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030805678"},{"type":"electronic","value":"9783030805685"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80568-5_25","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T17:04:53Z","timestamp":1624467893000},"page":"293-304","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Face Spoof Detection: An Experimental Framework"],"prefix":"10.1007","author":[{"given":"Faseela","family":"Abdullakutty","sequence":"first","affiliation":[]},{"given":"Eyad","family":"Elyan","sequence":"additional","affiliation":[]},{"given":"Pamela","family":"Johnston","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,1]]},"reference":[{"issue":"72","key":"25_CR1","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.engappai.2018.04.013","volume":"1","author":"L Souza","year":"2018","unstructured":"Souza, L., Oliveira, L., Pamplona, M., Papa, J.: How far did we get in face spoofing detection? Eng. Appl. Artif. Intell. 1(72), 368\u201381 (2018)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"2","key":"25_CR2","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","volume":"18","author":"J Galbally","year":"2014","unstructured":"Galbally, J., Marcel, S., Fierrez, J.: Biometric antispoofing methods: a survey in face recognition. IEEE Access 18(2), 1530\u201352 (2014)","journal-title":"IEEE Access"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput. Surveys (CSUR). 50(1), 1\u201337 (2017)","DOI":"10.1145\/3038924"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Singh, R., Agarwal, A., Singh, M., Nagpal, S., Vatsa, M.: On the robustness of face recognition algorithms against attacks and bias. In: Proceedings of the AAAI Conference on Artificial Intelligence 3 April 2020, vol. 34, No. 09, pp. 13583\u201313589 (2020)","DOI":"10.1609\/aaai.v34i09.7085"},{"issue":"15","key":"25_CR5","first-page":"42","volume":"14","author":"A George","year":"2019","unstructured":"George, A., Mostaani, Z., Geissenbuhler, D., Nikisins, O., Anjos, A., Marcel, S.: Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Trans. Inf. Forensics Security 14(15), 42\u201355 (2019)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Tan, X., Li, Y., Liu, J., Jiang, L., Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: European Conference on Computer Vision, vol. 5, pp. 504\u2013517. Springer, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Fahn, C.S., Lee, C.P., Wu, M.L.: A cross-dataset evaluation of anti-face-spoofing methods using random forests and convolutional neural networks. In: Proceedings of the 2019 2nd Artificial Intelligence and Cloud Computing Conference, 21 December 2019, pp. 89\u201396 (2019)","DOI":"10.1145\/3375959.3375985"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Li, J., Zhang, X., Zhang, Y., Wang, H., Yang, F.: Face liveness detection based on multiple feature descriptors. In: 2019 International Conference on Technologies and Applications of Artificial Intelligence (TAAI), 21 November 2019, pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/TAAI48200.2019.8959844"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Hasan, M.R., Mahmud, S.H., Li, X.Y.: Face anti-spoofing using texture-based techniques and filtering methods. In: J. Phys. Conf. Ser. 1229(1), 012044. IOP Publishing (2019)","DOI":"10.1088\/1742-6596\/1229\/1\/012044"},{"issue":"1","key":"25_CR10","first-page":"48","volume":"5","author":"AG Y\u0131lmaz","year":"2020","unstructured":"Y\u0131lmaz, A.G., Turhal, U., Nabiyev, V.V.: Effect of feature selection with meta-heuristic optimization methods on face spoofing detection. J. Mod. Technol. Eng. 5(1), 48\u201359 (2020)","journal-title":"J. Mod. Technol. Eng."},{"issue":"7","key":"25_CR11","doi-asserted-by":"publisher","first-page":"10441","DOI":"10.1007\/s11042-020-10181-4","volume":"80","author":"Ashutosh Satapathy","year":"2020","unstructured":"Satapathy, Ashutosh, Livingston, L.M.Jenila: A lite convolutional neural network built on permuted Xceptio-inception and Xceptio-reduction modules for texture based facial liveness recognition. Multimedia Tools Appl. 80(7), 10441\u201310472 (2020)","journal-title":"Multimedia Tools Appl."},{"issue":"2","key":"25_CR12","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/computers5020010","volume":"5","author":"S Parveen","year":"2016","unstructured":"Parveen, S., Ahmad, S.M., Abbas, N.H., Adnan, W.A., Hanafi, M., Naeem, N.: Face liveness detection using dynamic local ternary pattern (DLTP). Computers 5(2), 10 (2016)","journal-title":"Computers"},{"issue":"4","key":"25_CR13","doi-asserted-by":"publisher","first-page":"423","DOI":"10.3390\/e21040423","volume":"21","author":"R Koshy","year":"2019","unstructured":"Koshy, R., Mahmood, A.: Optimizing deep CNN architectures for face liveness detection. Entropy 21(4), 423 (2019)","journal-title":"Entropy"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Beham, M.P., Roomi, S.M., Jebina, H., Kavitha, M.: Face spoofing detection using binary gradient orientation pattern with deep neural network. In: 2017 Ninth International Conference on Advances in Pattern Recognition (ICAPR), 27 December 2017, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICAPR.2017.8593022"},{"issue":"4","key":"25_CR15","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11760-016-1014-2","volume":"11","author":"A Alotaibi","year":"2016","unstructured":"Alotaibi, A., Mahmood, A.: Deep face liveness detection based on nonlinear diffusion using convolution neural network. Sign. Image Video Process. 11(4), 713\u2013720 (2016)","journal-title":"Sign. Image Video Process."},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Wang, S.Y., Yang, S.H., Chen, Y.P., Huang, J.W.: Face liveness detection based on skin blood flow analysis. Symmetry 9(12), 305 (2017)","DOI":"10.3390\/sym9120305"},{"issue":"3","key":"25_CR17","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s11760-017-1189-1","volume":"12","author":"MP Beham","year":"2017","unstructured":"Beham, M.P., Roomi, S.M.M.: Anti-spoofing enabled face recognition based on aggregated local weighted gradient orientation. Sign. Image Video Process. 12(3), 531\u2013538 (2017)","journal-title":"Sign. Image Video Process."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"M\u00e4\u00e4tt\u00e4, J., Hadid, A., Pietik\u00e4inen, M.: Face spoofing detection from single images using micro-texture analysis. In: 2011 International Joint Conference on Biometrics (IJCB), 11 October 2011, pp. 1\u20137. IEEE (2011)","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Song, L., Ma, H.: Face liveliness detection based on texture and color features. In: 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), 12 April 2019, pp. 418\u2013422. IEEE (2019)","DOI":"10.1109\/ICCCBDA.2019.8725639"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Luan, X., Wang, H., Ou, W., Liu, L.: Face liveness detection with recaptured feature extraction. In: 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), 15 December 2017, pp. 429\u2013432. IEEE (2017)","DOI":"10.1109\/SPAC.2017.8304317"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Angadi, S.A., Kagawade, V.C.: Detection of face spoofing using multiple texture descriptors. In: 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS), 21 December 2018, pp. 151\u2013156. IEEE (2018)","DOI":"10.1109\/CTEMS.2018.8769129"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"\u015eeng\u00fcr, A., Akhtar, Z., Akbulut, Y., Ekici, S., Budak, \u00dc.: Deep feature extraction for face liveness detection. In: 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), 28 September 2018, pp. 1\u20134. IEEE (2018)","DOI":"10.1109\/IDAP.2018.8620804"},{"key":"25_CR23","unstructured":"Vanitha, A., Vaidehi, V., Vasuhi, S.: Liveliness detection in real time videos using color based chromatic moment feature. In: 2018 International Conference on Recent Trends in Advance Computing (ICRTAC), 10 September 2018, pp. 162\u2013167. IEEE (2018)"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Sthevanie, F., Ramadhani, K.N.: Spoofing detection on facial images recognition using LBP and GLCM combination. J. Phys. Conf. Series 971(1) 012014 (2018). IOP Publishing","DOI":"10.1088\/1742-6596\/971\/1\/012014"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: 2015 IEEE International Conference on Image Processing (ICIP), 27 September 2015, pp. 2636\u20132640. IEEE (2015)","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Analysis and Machine Intelligence. 24(7), 971\u2013987, 7 August 2002","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zou, J., He, K., Sun, J.: Accelerating very deep convolutional networks for classification and detection. IEEE Trans. Pattern Anal. Mach. Intell. 38(10), 1943\u201355 (2015)","DOI":"10.1109\/TPAMI.2015.2502579"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2016, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"25_CR29","doi-asserted-by":"crossref","unstructured":"Chingovska, I., Dos Anjos, A.R., Marcel, S.: Biometrics evaluation under spoofing attacks. IEEE Trans. Inf. Forensics Secur. 9(12), 2264\u20132276 (2014)","DOI":"10.1109\/TIFS.2014.2349158"}],"container-title":["Proceedings of the International Neural Networks Society","Proceedings of the 22nd Engineering Applications of Neural Networks Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80568-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T07:55:32Z","timestamp":1656402932000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80568-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030805678","9783030805685"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80568-5_25","relation":{},"ISSN":["2661-8141","2661-815X"],"issn-type":[{"type":"print","value":"2661-8141"},{"type":"electronic","value":"2661-815X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering Applications of Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eann2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.eann2021.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}