{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T17:10:03Z","timestamp":1748711403838,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319264035"},{"type":"electronic","value":"9783319264042"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26404-2_9","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T16:16:40Z","timestamp":1448986600000},"page":"113-123","source":"Crossref","is-referenced-by-count":4,"title":["Facial Expression Analysis as a Means for Additional Biometric Security in Recognition Systems"],"prefix":"10.1007","author":[{"given":"Dustyn James","family":"Tubbs","sequence":"first","affiliation":[]},{"given":"Khandaker Abir","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,17]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Kose, N., Dugelay, J.L.: Shape and texture based countermeasure to protect face recognition systems against mask attacks. In: 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 111\u2013116. IEEE (2013)","DOI":"10.1109\/CVPRW.2013.24"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Kose, N., Dugelay, J.L.: Countermeasure for the protection of face recognition systems against mask attacks. In: 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/FG.2013.6553761"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Kim, G., Eum, S., Suhr, J.K., Kim, D.I., Park, K.R., Kim, J.: InBiometrics (ICB), 2012 5th IAPR International Conference on Face Liveness Detection Based on Texture and Frequency Analyses, pp. 67\u201372. IEEE (2012)","DOI":"10.1109\/ICB.2012.6199760"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/iet-bmt.2011.0009","volume":"1","author":"J M\u00e4\u00e4tt\u00e4","year":"2012","unstructured":"M\u00e4\u00e4tt\u00e4, J., Hadid, A., Pietik\u00e4inen, M.: Face spoofing detection from single images usingtexture and local shape analysis. IET Biometrics 1(1), 3\u201310 (2012)","journal-title":"IET Biometrics"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Frischholz, R.W., Werner, A.: Avoiding replay-attacks in a face recognition system using Head-pose Estimation. In: AMFG 2003. IEEE International Workshop on Analysis and Modeling of Faces and Gestures, pp. 234\u2013235. IEEE (2003)","DOI":"10.1109\/AMFG.2003.1240849"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Lucey, P., Cohn, J.F., Kanade, T., Saragih, J., Ambadar, Z., Matthews, I.: The extended Cohn-Kanade Dataset (CK\u00a0+): a complete dataset for action unit and emotion-specified expression. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 94\u2013101. IEEE (2010)","DOI":"10.1109\/CVPRW.2010.5543262"},{"issue":"8","key":"9_CR7","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/34.709565","volume":"20","author":"L Hong","year":"1998","unstructured":"Hong, L., Wan, Y., Jain, A.: Fingerprint image enhancement: algorithm and performance evaluation. IEEE Trans. Pattern Anal. Mach. Intell. 20(8), 777\u2013789 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"9_CR8","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/89.365379","volume":"3","author":"DA Reynolds","year":"1995","unstructured":"Reynolds, D.A., Rose, R.C.: Robust text-independent speaker identification using Gaussian mixture speaker models. IEEE Trans. Speech Audio Process. 3(1), 72\u201383 (1995)","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Uludag, U., Jain, A.K.: Attacks on biometric systems: a case study in fingerprints. In: Electronic Imaging 2004, pp. 622\u2013633. International Society for Optics and Photonics (2004)","DOI":"10.1117\/12.530907"},{"issue":"3","key":"9_CR10","first-page":"223","volume":"2","author":"Z Piotrowski","year":"2007","unstructured":"Piotrowski, Z., Gajewski, P.: Voice spoofing as an impersonation attack and the way of protection. J. Inf. Assur. Secur. 2(3), 223\u2013225 (2007)","journal-title":"J. Inf. Assur. Secur."},{"key":"9_CR11","unstructured":"Revenkar, P.S., Anjum, A., Gandhare, W.Z.: Secure iris authentication using visual (2010)"},{"issue":"2","key":"9_CR12","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/34.908962","volume":"23","author":"YL Tian","year":"2001","unstructured":"Tian, Y.L., Kanade, T., Cohn, J.F.: Recognizing action units for facial expression analysis. IEEE Trans. Pattern Anal. Mach. Intell. 23(2), 97\u2013115 (2001)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"9_CR13","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1109\/TSMCB.2004.825931","volume":"34","author":"M Pantic","year":"2004","unstructured":"Pantic, M., Rothkrantz, L.J.: Facial action recognition for facial expression analysis from static face images. Cybern. IEEE Trans. Syst. Man Cybern. Part B 34(3), 1449\u20131461 (2004)","journal-title":"Cybern. IEEE Trans. Syst. Man Cybern. Part B"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.neunet.2005.03.004","volume":"18","author":"SV Ioannou","year":"2005","unstructured":"Ioannou, S.V., Raouzaiou, A.T., Tzouvaras, V.A., Mailis, T.P., Karpouzis, K.C., Kollias, S.D.: Emotion recognition through facial expression analysis based on a neurofuzzy network. Neural Netw. 18(4), 423\u2013435 (2005)","journal-title":"Neural Netw."},{"issue":"6","key":"9_CR15","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.imavis.2008.08.005","volume":"27","author":"C Shan","year":"2009","unstructured":"Shan, C., Gong, S., McOwan, P.W.: Facial expression recognition based on local binary patterns: a comprehensive study. Image Vis. Comput. 27(6), 803\u2013816 (2009)","journal-title":"Image Vis. Comput."},{"key":"9_CR16","unstructured":"Noldus FaceReader 5. http:\/\/www.noldus.com\/"},{"issue":"3","key":"9_CR17","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/BF00977785","volume":"9","author":"DT Lee","year":"1980","unstructured":"Lee, D.T., Schachter, B.J.: Two algorithms for constructing a Delaunay triangulation. Int. J. Comput. Inf. Sci. 9(3), 219\u2013242 (1980)","journal-title":"Int. J. Comput. Inf. Sci."},{"issue":"4","key":"9_CR18","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1145\/581271.581272","volume":"5","author":"F Bergadano","year":"2002","unstructured":"Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367\u2013397 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26404-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T16:40:00Z","timestamp":1748709600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26404-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319264035","9783319264042"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26404-2_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}