{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:54:10Z","timestamp":1742961250120,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031189067"},{"type":"electronic","value":"9783031189074"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18907-4_62","type":"book-chapter","created":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T23:03:53Z","timestamp":1666825433000},"page":"814-826","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Exploring Masked Image Modeling for\u00a0Face Anti-spoofing"],"prefix":"10.1007","author":[{"given":"Xuetao","family":"Ma","sequence":"first","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yunfei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Daoxiang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,27]]},"reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Atoum, Y., Liu, Y., Jourabloo, A., Liu, X.: Face anti-spoofing using patch and depth-based cnns. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 319\u2013328. IEEE (2017)","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"62_CR2","unstructured":"Bao, H., Dong, L., Wei, F.: Beit: Bert pre-training of image transformers. arXiv preprint arXiv:2106.08254 (2021)"},{"key":"62_CR3","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., Hadid, A.: Oulu-npu: a mobile face presentation attack database with real-world variations. In: 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), pp. 612\u2013618 (2017)","DOI":"10.1109\/FG.2017.77"},{"key":"62_CR4","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/TIFS.2019.2922241","volume":"15","author":"H Chen","year":"2020","unstructured":"Chen, H., Hu, G., Lei, Z., Chen, Y., Robertson, N.M., Li, S.Z.: Attention-based two-stream convolutional networks for face spoofing detection. IEEE Trans. Inf. Forensics Secur. 15, 578\u2013593 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"62_CR5","unstructured":"Chen, M., et al.: Generative pretraining from pixels. In: International Conference on Machine Learning, pp. 1691\u20131703. PMLR (2020)"},{"key":"62_CR6","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: Proceedings of the 37th International Conference on Machine Learning (ICML), vol. 119, pp. 1597\u20131607 (2020)"},{"key":"62_CR7","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), pp. 1\u20137 (2012)"},{"key":"62_CR8","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, vol. 1 (Long and Short Papers), pp. 4171\u20134186 (2019)"},{"key":"62_CR9","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. In: 9th International Conference on Learning Representations (ICLR), pp. 1\u201321 (2021)"},{"key":"62_CR10","doi-asserted-by":"crossref","unstructured":"George, A., Marcel, S.: On the effectiveness of vision transformers for zero-shot face anti-spoofing. In: 2021 IEEE International Joint Conference on Biometrics (IJCB), pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/IJCB52358.2021.9484333"},{"key":"62_CR11","doi-asserted-by":"crossref","unstructured":"He, K., Chen, X., Xie, S., Li, Y., Doll\u00e1r, P., Girshick, R.: Masked autoencoders are scalable vision learners. arXiv preprint arXiv:2111.06377 (2021)","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"62_CR12","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., Girshick, R.: Momentum contrast for unsupervised visual representation learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9729\u20139738 (2020)","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"62_CR13","doi-asserted-by":"crossref","unstructured":"Kim, T., Kim, Y., Kim, I., Kim, D.: Basn: enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing. In: 2019 IEEE\/CVF International Conference on Computer Vision Workshop (ICCVW), pp. 494\u2013503 (2019)","DOI":"10.1109\/ICCVW.2019.00062"},{"issue":"10","key":"62_CR14","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., He, P., Wang, S., Rocha, A., Jiang, X., Kot, A.C.: Learning generalized deep feature representation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13(10), 2639\u20132652 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"62_CR15","doi-asserted-by":"crossref","unstructured":"Liu, H., Kong, Z., Ramachandra, R., Liu, F., Shen, L., Busch, C.: Taming self-supervised learning for presentation attack detection: In-image de-folding and out-of-image de-mixing. arXiv preprint arXiv:2109.04100v1 (2021)","DOI":"10.1109\/TNNLS.2023.3243229"},{"key":"62_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 389\u2013398 (2018)","DOI":"10.1109\/CVPR.2018.00048"},{"key":"62_CR17","doi-asserted-by":"crossref","unstructured":"Liu, Y., Stehouwer, J., Jourabloo, A., Liu, X.: Deep tree learning for zero-shot face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4680\u20134689 (2019)","DOI":"10.1109\/CVPR.2019.00481"},{"key":"62_CR18","doi-asserted-by":"crossref","unstructured":"Liu, Z., et al.: Swin transformer: hierarchical vision transformer using shifted windows. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp. 10012\u201310022 (2021)","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"62_CR19","doi-asserted-by":"crossref","unstructured":"Ming, Z., Yu, Z., Al-Ghadi, M., Visani, M., MuzzamilLuqman, M., Burie, J.C.: Vitranspad: video transformer using convolution and self-attention for face presentation attack detection. arXiv preprint arXiv:2203.01562 (2022)","DOI":"10.1109\/ICIP46576.2022.9897560"},{"key":"62_CR20","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.patrec.2022.03.001","volume":"156","author":"U Muhammad","year":"2022","unstructured":"Muhammad, U., Yu, Z., Komulainen, J.: Self-supervised 2d face presentation attack detection via temporal sequence sampling. Pattern Recogn. Lett. 156, 15\u201322 (2022)","journal-title":"Pattern Recogn. Lett."},{"key":"62_CR21","doi-asserted-by":"crossref","unstructured":"Ojala, T., Pietikainen, M., Harwood, D.: Performance evaluation of texture measures with classification based on kullback discrimination of distributions. In: Proceedings of 12th International Conference on Pattern Recognition, vol. 1, pp. 582\u2013585. IEEE (1994)","DOI":"10.1109\/ICPR.1994.576366"},{"key":"62_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2022.103518","volume":"85","author":"F Peng","year":"2022","unstructured":"Peng, F., Meng, S., Long, M.: Presentation attack detection based on two-stream vision transformers with self-attention fusion. J. Vis. Commun. Image Representation 85, 103518 (2022)","journal-title":"J. Vis. Commun. Image Representation"},{"key":"62_CR23","doi-asserted-by":"crossref","unstructured":"Shao, R., Lan, X., Yuen, P.C.: Regularized fine-grained meta face anti-spoofing. In: Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI), pp. 11974\u201311981 (2020)","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"62_CR24","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"62_CR25","doi-asserted-by":"crossref","unstructured":"Vincent, P., Larochelle, H., Bengio, Y., Manzagol, P.A.: Extracting and composing robust features with denoising autoencoders. In: Proceedings of the 25th International Conference on Machine Learning, pp. 1096\u20131103 (2008)","DOI":"10.1145\/1390156.1390294"},{"issue":"12","key":"62_CR26","first-page":"3371","volume":"11","author":"P Vincent","year":"2010","unstructured":"Vincent, P., Larochelle, H., Lajoie, I., Bengio, Y., Manzagol, P.A., Bottou, L.: Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. J. Mach. Learn. Res. 11(12), 3371\u20133408 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"62_CR27","doi-asserted-by":"publisher","first-page":"4280","DOI":"10.1109\/TIFS.2021.3102448","volume":"16","author":"Y Wang","year":"2021","unstructured":"Wang, Y., Song, X., Xu, T., Feng, Z., Wu, X.J.: From rgb to depth: Domain transfer network for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 16, 4280\u20134290 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"62_CR28","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1109\/TIFS.2022.3158062","volume":"17","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Wang, Q., Deng, W., Guo, G.: Learning multi-granularity temporal characteristics for face anti-spoofing. IEEE Trans. Inf. Forensics Sec. 17, 1254\u20131269 (2022)","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"62_CR29","doi-asserted-by":"crossref","unstructured":"Xie, Z., et al.: Simmim: a simple framework for masked image modeling. arXiv preprint arXiv:2111.09886 (2021)","DOI":"10.1109\/CVPR52688.2022.00943"},{"key":"62_CR30","unstructured":"Yang, J., Lei, Z., Li, S.Z.: Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014)"},{"key":"62_CR31","doi-asserted-by":"publisher","first-page":"1290","DOI":"10.1109\/LSP.2021.3089908","volume":"28","author":"Z Yu","year":"2021","unstructured":"Yu, Z., Li, X., Wang, P., Zhao, G.: Transrppg: remote photoplethysmography transformer for 3d mask face presentation attack detection. IEEE Signal Process. Lett. 28, 1290\u20131294 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"62_CR32","doi-asserted-by":"crossref","unstructured":"Yu, Z., et al.: Multi-modal face anti-spoofing based on central difference networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 2766\u20132774 (2020)","DOI":"10.1109\/CVPRW50498.2020.00333"},{"issue":"9","key":"62_CR33","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1109\/TPAMI.2020.3036338","volume":"43","author":"Z Yu","year":"2021","unstructured":"Yu, Z., Wan, J., Qin, Y., Li, X., Li, S.Z., Zhao, G.: Nas-fas: static-dynamic central difference network search for face anti-spoofing. IEEE Trans. Pattern Anal. Mach. Intell. 43(9), 3005\u20133023 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"62_CR34","doi-asserted-by":"crossref","unstructured":"Yu, Z., et al.: Searching central difference convolutional networks for face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5295\u20135305 (2020)","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"62_CR35","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.jvcir.2018.01.001","volume":"51","author":"LB Zhang","year":"2018","unstructured":"Zhang, L.B., Peng, F., Qin, L., Long, M.: Face spoofing detection based on color texture markov feature and support vector machine recursive feature elimination. J. Vis. Commun. Image Represent. 51, 56\u201369 (2018)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"62_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on Biometrics (ICB), pp. 26\u201331 (2012)","DOI":"10.1109\/ICB.2012.6199754"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18907-4_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T16:33:43Z","timestamp":1728232423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18907-4_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031189067","9783031189074"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18907-4_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/en.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"564","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"233","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.03","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.35","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}