{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:06:07Z","timestamp":1773414367016,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319598758","type":"print"},{"value":"9783319598765","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59876-5_4","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T01:09:35Z","timestamp":1496279375000},"page":"27-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":87,"title":["Transfer Learning Using Convolutional Neural Networks for Face Anti-spoofing"],"prefix":"10.1007","author":[{"given":"Oeslle","family":"Lucena","sequence":"first","affiliation":[]},{"given":"Amadeu","family":"Junior","sequence":"additional","affiliation":[]},{"given":"Vitor","family":"Moia","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Souza","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Valle","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Lotufo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"issue":"7553","key":"4_CR1","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber, J.: Deep learning in neural networks: an overview. Neural Netw. 61, 85\u2013117 (2015)","journal-title":"Neural Netw."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Seal, A., Ganguly, S., Bhattacharjee, D., Nasipuri, M., Basu, D.K.: Automated thermal face recognition based on minutiae extraction. CoRR abs\/1309.1000 (2013)","DOI":"10.1504\/IJCISTUDIES.2013.055220"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yi, D., Lei, Z., Li, S.Z.: Face liveness detection by learning multispectral reflectance distributions. In: Face and Gesture 2011, pp. 436\u2013441, March 2011","DOI":"10.1109\/FG.2011.5771438"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","volume":"2","author":"J Galbally","year":"2014","unstructured":"Galbally, J., Marcel, S., Fierrez, J.: Biometric antispoofing methods: a survey in face recognition. IEEE Access 2, 1530\u20131552 (2014)","journal-title":"IEEE Access"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Y., Tan, T., Jain, A.K.: Live face detection based on the analysis of fourier spectra, vol. 5404, pp. 296\u2013303 (2004)","DOI":"10.1117\/12.541955"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-642-15567-3_37","volume-title":"Computer Vision \u2013 ECCV 2010","author":"X Tan","year":"2010","unstructured":"Tan, X., Li, Y., Liu, J., Jiang, L.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010. LNCS, vol. 6316, pp. 504\u2013517. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-15567-3_37"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Peixoto, B., Michelassi, C., Rocha, A.: Face liveness detection under bad illumination conditions. In: 2011 18th IEEE International Conference on Image Processing, pp. 3557\u20133560, September 2011","DOI":"10.1109\/ICIP.2011.6116484"},{"issue":"7","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1109\/TIFS.2014.2322255","volume":"9","author":"N Erdogmus","year":"2014","unstructured":"Erdogmus, N., Marcel, S.: Spoofing 2D face recognition with 3D masks. IEEE Trans. Inf. Forensics Secur. 9(7), 1084\u20131097 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Pan, G., Sun, L., Wu, Z., Lao, S.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: 2007 IEEE 11th International Conference on Computer Vision, pp. 1\u20138, October 2007","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Li, J.W.: Eye blink detection based on multiple gabor response waves. In: 2008 International Conference on Machine Learning and Cybernetics, vol. 5, pp. 2852\u20132856, July 2008","DOI":"10.1109\/ICMLC.2008.4620894"},{"issue":"6","key":"4_CR12","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/S1007-0214(09)70135-X","volume":"14","author":"W Liting","year":"2009","unstructured":"Liting, W., Xiaoqing, D., Chi, F.: Face live detection method based on physiological motion analysis. Tsinghua Sci. Technol. 14(6), 685\u2013690 (2009)","journal-title":"Tsinghua Sci. Technol."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Kollreider, K., Fronthaler, H., Bigun, J.: Verifying liveness by multiple experts in face biometrics. In: 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 1\u20136, June 2008","DOI":"10.1109\/CVPRW.2008.4563115"},{"issue":"3","key":"4_CR14","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1049\/iet-bmt.2012.0071","volume":"3","author":"A Anjos","year":"2014","unstructured":"Anjos, A., Chakka, M.M., Marcel, S.: Motion-based counter-measures to photo attacks in face recognition. IET Biom. 3(3), 147\u2013158 (2014)","journal-title":"IET Biom."},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-37410-4_11","volume-title":"Computer Vision - ACCV 2012 Workshops","author":"T Freitas Pereira","year":"2013","unstructured":"Freitas Pereira, T., Anjos, A., Martino, J.M., Marcel, S.: LBP \u2013 TOP based countermeasure against face spoofing attacks. In: Park, J.-I., Kim, J. (eds.) ACCV 2012. LNCS, vol. 7728, pp. 121\u2013132. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-37410-4_11"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., Pietik\u00e4inen, M.: Context based face anti-spoofing. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20138, September 2013","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/j.jvcir.2016.03.019","volume":"38","author":"L Feng","year":"2016","unstructured":"Feng, L., Po, L.M., Li, Y., Xu, X., Yuan, F., Cheung, T.C.H., Cheung, K.W.: Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J. Vis. Commun. Image Represent. 38, 451\u2013460 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"4_CR18","unstructured":"Yang, J., Lei, Z., Li, S.Z.: Learn convolutional neural network for face anti-spoofing. CoRR abs\/1408.5601 (2014)"},{"key":"4_CR19","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097\u20131105 (2012)"},{"issue":"4","key":"4_CR20","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","volume":"10","author":"D Menotti","year":"2015","unstructured":"Menotti, D., Chiachia, G., Pinto, A., Schwartz, W.R., Pedrini, H., Falc\u00e3o, A.X., Rocha, A.: Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864\u2013879 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR21","first-page":"1","volume":"11","author":"A Alotaibi","year":"2016","unstructured":"Alotaibi, A., Mahmood, A.: Deep face liveness detection based on nonlinear diffusion using convolution neural network. Sig. Image Video Process. 11, 1\u20138 (2016)","journal-title":"Sig. Image Video Process."},{"issue":"1","key":"4_CR22","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/TPAMI.2015.2437384","volume":"38","author":"R Girshick","year":"2016","unstructured":"Girshick, R., Donahue, J., Darrell, T., Malik, J.: Region-based convolutional networks for accurate object detection and segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 38(1), 142\u2013158 (2016)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Noh, H., Hong, S., Han, B.: Learning deconvolution network for semantic segmentation. In: The IEEE International Conference on Computer Vision (ICCV), December 2015","DOI":"10.1109\/ICCV.2015.178"},{"issue":"5","key":"4_CR24","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TMI.2016.2528162","volume":"35","author":"HC Shin","year":"2016","unstructured":"Shin, H.C., Roth, H.R., Gao, M., Lu, L., Xu, Z., Nogues, I., Yao, J., Mollura, D., Summers, R.M.: Deep convolutional neural networks for computer-aided detection: CNN architectures, dataset characteristics and transfer learning. IEEE Trans. Med. Imaging 35(5), 1285\u20131298 (2016)","journal-title":"IEEE Trans. Med. Imaging"},{"key":"4_CR25","unstructured":"Yosinski, J., Clune, J., Bengio, Y., Lipson, H.: How transferable are features in deep neural networks? In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems 27, pp. 3320\u20133328. Curran Associates, Inc. (2014)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Sharif Razavian, A., Azizpour, H., Sullivan, J., Carlsson, S.: CNN features off-the-shelf: an astounding baseline for recognition. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, June 2014","DOI":"10.1109\/CVPRW.2014.131"},{"issue":"3","key":"4_CR27","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., Huang, Z., Karpathy, A., Khosla, A., Bernstein, M., Berg, A.C., Fei-Fei, L.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. (IJCV) 115(3), 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis. (IJCV)"},{"key":"4_CR28","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. CoRR abs\/1409.1556 (2014)"},{"key":"4_CR29","unstructured":"Chollet, F.: Keras (2015). https:\/\/github.com\/fchollet\/keras"},{"key":"4_CR30","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. CoRR abs\/1412.6980 (2014)"},{"key":"4_CR31","first-page":"163","volume":"2","author":"W Duch","year":"1999","unstructured":"Duch, W., Jankowski, N.: Survey of neural transfer functions. Neural Comput. Surv. 2, 163\u2013213 (1999)","journal-title":"Neural Comput. Surv."},{"key":"4_CR32","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), pp. 1\u20137, September 2012"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20136, September 2013","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"4_CR34","unstructured":"Bastien, F., Lamblin, P., Pascanu, R., Bergstra, J., Goodfellow, I.J., Bergeron, A., Bouchard, N., Bengio, Y.: Theano: new features and speed improvements. In: Deep Learning and Unsupervised Feature Learning NIPS 2012 Workshop (2012)"},{"key":"4_CR35","unstructured":"Amos, B., Ludwiczuk, B., Satyanarayanan, M.: Openface: a general-purpose face recognition library with mobile applications. Technical report, CMU-CS-16-118, CMU School of Computer Science (2016)"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2016","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["Lecture Notes in Computer Science","Image Analysis and Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59876-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:09:42Z","timestamp":1750284582000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59876-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598758","9783319598765"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59876-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"2 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIAR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image Analysis and Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciar2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aimiconf.org\/iciar17\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}