{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:02:24Z","timestamp":1747368144058,"version":"3.40.5"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_18","type":"book-chapter","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:21Z","timestamp":1747289601000},"page":"263-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Time-Aware Face Anti-spoofing with\u00a0Rotation Invariant Local Binary Patterns and\u00a0Deep Learning"],"prefix":"10.1007","author":[{"given":"Moritz","family":"Finke","sequence":"first","affiliation":[]},{"given":"Alexandra","family":"Dmitrienko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Almeida, W.R., et al.: Detecting face presentation attacks in mobile devices with a patch-based CNN and a sensor-aware loss function. PLOS One 15(9) (2020)","DOI":"10.1371\/journal.pone.0238058"},{"key":"18_CR2","unstructured":"Authority, F.I.R.: FINRA rulebook (2011). https:\/\/www.finra.org\/rules-guidance\/rulebooks\/finra-rules\/2090"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Bharadwaj, S., Dhamecha, T.I., Vatsa, M., Singh, R.: Computationally efficient face spoofing detection with motion magnification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (2013)","DOI":"10.1109\/CVPRW.2013.23"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: IEEE International Conference on Image Processing (ICIP) (2015)","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., Hadid, A.: OULU-NPU: a mobile face presentation attack database with real-world variations. In: 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017) (2017)","DOI":"10.1109\/FG.2017.77"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Cai, R., Li, H., Wang, S., Chen, C., Kot, A.C.: DRL-FAS: a novel framework based on deep reinforcement learning for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 16 (2020)","DOI":"10.1109\/TIFS.2020.3026553"},{"key":"18_CR7","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: BIOSIG-proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG) (2012)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Choi, J.Y., Plataniotis, K.N., Ro, Y.M.: Using colour local binary pattern features for face recognition. In: 2010 IEEE International Conference on Image Processing (2010)","DOI":"10.1109\/ICIP.2010.5653653"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"George, A., Marcel, S.: Deep pixel-wise binary supervision for face presentation attack detection. In: International Conference on Biometrics (ICB) (2019)","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Grinchuk, O., Parkin, A., Glazistova, E.: 3D mask presentation attack detection via high resolution face parts. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (2021)","DOI":"10.1109\/ICCVW54120.2021.00100"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"G\u00fcndog\u0306ar, M.F., Erdem, \u00c7.E.: Presentation attack detection for face recognition using remotephotoplethysmography and cascaded fusion. Turk. J. Electr. Eng. Comput. Sci. 29(7) (2021)","DOI":"10.3906\/elk-2010-93"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Hadid, A.: Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (2014)","DOI":"10.1109\/CVPRW.2014.22"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"He, D.C., Wang, L.: Texture unit, texture spectrum, and texture analysis. IEEE Trans. Geosci. Remote Sens. 28(4) (1990)","DOI":"10.1109\/TGRS.1990.572934"},{"key":"18_CR14","unstructured":"Hinton, G., Srivastava, N., Swersky, K.: Neural networks for machine learning lecture 6a overview of mini-batch gradient descent. 14(8) (2012)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8) (1997)","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"18_CR16","unstructured":"Information technology - Biometric presentation attack detection - Part 1: Framework. Standard, International Organization for Standardization, Geneva, CH (2016)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Khairnar, S., Gite, S., Kotecha, K., Thepade, S.D.: Face liveness detection using artificial intelligence techniques: a systematic literature review and future directions. Big Data Cogn. Comput. 7(1) (2023)","DOI":"10.3390\/bdcc7010037"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2018)","DOI":"10.1109\/CVPR.2018.00048"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Pham, T.D., Batchuluun, G., Noh, K.J., Park, K.R.: Presentation attack face image generation based on a deep generative adversarial network. Sensors 20(7) (2020)","DOI":"10.3390\/s20071810"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Ojala, T., Pietikainen, M., Maenpaa, T.: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 24(7) (2002)","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Shu, X., Tang, H., Huang, S.: Face spoofing detection based on chromatic ED-LBP texture feature. Multimed. Syst. 27 (2021)","DOI":"10.1007\/s00530-020-00719-9"},{"key":"18_CR22","unstructured":"Statista: Cybersecurity 2018 (2018)"},{"key":"18_CR23","unstructured":"Statista: Cybersecurity in the U.S. 2018 (2018). https:\/\/www.statista.com\/study\/58221\/cybersecurity-in-the-us\/"},{"key":"18_CR24","unstructured":"Tu, X., Zhang, H., Xie, M., Luo, Y., Zhang, Y., Ma, Z.: Enhance the motion cues for face anti-spoofing using CNN-LSTM architecture. arXiv preprint arXiv:1901.05635 (2019)"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhang, J., Bian, Y., Cai, Y., Wang, C., Pu, S.: Self-domain adaptation for face anti-spoofing. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035 (2021)","DOI":"10.1609\/aaai.v35i4.16379"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Wang, W., Den\u00a0Brinker, A.C., Stuijk, S., De\u00a0Haan, G.: Algorithmic principles of remote PPG. IEEE Trans. Biomed. Eng. 64(7) (2016)","DOI":"10.1109\/TBME.2016.2609282"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Deep spatial gradient and temporal depth learning for face anti-spoofing. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2020)","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"18_CR28","unstructured":"Wang\u00a0W., Stuijk\u00a0S., G.d.H.: A novel algorithm for remote photoplesthymograpy: spatial subspace rotation. IEEE Trans. Biomed. Eng. PP(99) (2015)"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Wu, H.Y., Rubinstein, M., Shih, E., Guttag, J., Durand, F., Freeman, W.T.: Eulerian video magnification for revealing subtle changes in the world. ACM Trans. Graph. (Proc. SIGGRAPH 2012) 31(4) (2012)","DOI":"10.1145\/2185520.2335416"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Xu, X., Xiong, Y., Xia, W.: On improving temporal consistency for online face liveness detection system. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (2021)","DOI":"10.1109\/ICCVW54120.2021.00097"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Yang, X., et al.: Face anti-spoofing: model matters, so does data. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2019)","DOI":"10.1109\/CVPR.2019.00362"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Yu, Z., Qin, Y., Li, X., Zhao, C., Lei, Z., Zhao, G.: Deep learning for face anti-spoofing: a survey. arXiv preprint arXiv:2106.14948 (2021)","DOI":"10.1109\/TPAMI.2022.3215850"},{"key":"18_CR33","unstructured":"Yu, Z., et al.: Searching central difference convolutional networks for face anti-spoofing. CoRR abs\/2003.04092 (2020). https:\/\/arxiv.org\/abs\/2003.04092"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Zhao, W., Ma, Y., He, X., Huang, H., Lin, X., Zhang, Y.: Face liveness detection using Eulerian video magnification and sift algorithm. In: 2020 IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS) (2020)","DOI":"10.1109\/ICAIIS49377.2020.9194790"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T06:13:34Z","timestamp":1747289614000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_18","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}