{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:14:37Z","timestamp":1750997677878,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319698991"},{"type":"electronic","value":"9783319699004"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69900-4_2","type":"book-chapter","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T01:42:58Z","timestamp":1509414178000},"page":"11-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Biometric Counter-Spoofing for Mobile Devices Using Gaze Information"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0233-4923","authenticated-orcid":false,"given":"Asad","family":"Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0524-1132","authenticated-orcid":false,"given":"Nawal","family":"Alsufyani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8627-3429","authenticated-orcid":false,"given":"Sanaul","family":"Hoque","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0885-437X","authenticated-orcid":false,"given":"Farzin","family":"Deravi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,1]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-540-74549-5_27","volume-title":"Advances in Biometrics","author":"L Sun","year":"2007","unstructured":"Sun, L., Pan, G., Wu, Z., Lao, S.: Blinking-based live face detection using conditional random fields. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 252\u2013260. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-74549-5_27"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Pan, G., Sun, L., Wu, Z., Lao, S.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE 11th International Conference on Computer Vision (ICCV), pp. 1\u20138 (2007)","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Schwartz, W.R., Rocha, A., Pedrini, H.: Face spoofing detection through partial least squares and low-level descriptors. In: International Joint Conference on Biometrics (IJCB), pp. 1\u20138 (2011)","DOI":"10.1109\/IJCB.2011.6117592"},{"key":"2_CR4","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of IEEE BIOSIG, pp. 1\u20137 (2012)"},{"issue":"5","key":"2_CR5","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/TIFS.2015.2395139","volume":"10","author":"A Pinto","year":"2015","unstructured":"Pinto, A., Schwartz, W.R., Pedrini, H., Rocha, A.: Using visual rhythms for detecting video-based facial spoof attacks. IEEE Trans. Inf. Forensics Secur. 10(5), 1025\u20131038 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/iet-bmt.2011.0009","volume":"1","author":"J Maatta","year":"2012","unstructured":"Maatta, J., Hadid, A., Pietikainen, M.: Face spoofing detection from single images using texture and local shape analysis. IET Biometrics 1(1), 3\u201310 (2012)","journal-title":"IET Biometrics"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Peixoto, B., Michelassi, C., Rocha, A.: Face liveness detection under bad illumination conditions. In: 18th IEEE International Conference on Image Processing, pp. 3557\u20133560 (2011)","DOI":"10.1109\/ICIP.2011.6116484"},{"issue":"4","key":"2_CR8","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"2_CR9","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/34.927464","volume":"23","author":"AS Georghiades","year":"2001","unstructured":"Georghiades, A.S., Belhumeur, P.N., Kriegman, D.J.: From few to many: illumination cone models for face recognition under variable lighting and pose. IEEE Trans. Pattern Anal. Mach. Intell. 23(6), 643\u2013660 (2001)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Anjos A., Marcel, S.: Counter-measures to photo attacks in face recognition: a public database and a baseline. In: 2011 International Joint Conference on Biometrics (IJCB), pp. 1\u20137 (2011)","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Lagorio, A., Tistarelli, M., Cadoni, M., Fookes, C., Sridharan, S.: Liveness detection based on 3d face shape analysis. In: International Workshop on Biometrics and Forensics (IWBF), pp. 1\u20134 (2013)","DOI":"10.1109\/IWBF.2013.6547310"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Wang, T., Yang, J., Lei, Z., Liao, S., Li, S.Z.: Face liveness detection using 3d structure recovered from a single camera. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20136 (2013)","DOI":"10.1109\/ICB.2013.6612957"},{"issue":"12","key":"2_CR13","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1016\/j.imavis.2013.12.014","volume":"32","author":"M De Marsico","year":"2014","unstructured":"De Marsico, M., Galdi, C., Nappi, M., Riccio, D.: Firme: face and iris recognition for mobile engagement. Image Vis. Comput. 32(12), 1161\u20131172 (2014)","journal-title":"Image Vis. Comput."},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Frischholz R.W., Werner, A.: Avoiding replay-attacks in a face recognition system using head-pose estimation. In: IEEE International Workshop on Analysis and Modeling of Faces and Gestures (AMFG), pp. 234\u2013235 (2003)","DOI":"10.1109\/AMFG.2003.1240849"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Ali, A., Deravi, F., Hoque, S.: Liveness detection using gaze collinearity. In: 2012 Third International Conference on Emerging Security Technologies (EST), pp. 62\u201365 (2012)","DOI":"10.1109\/EST.2012.12"},{"key":"2_CR16","unstructured":"Ali, A., Deravi, F., Hoque, S.: Spoofing attempt detection using gaze colocation. In: 2013 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u201312 (2013)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Ali, A., Deravi, F., Hoque, S.: Directional sensitivity of gaze-collinearity features in liveness detection. In: 4th International Conference on Emerging Security Technologies (EST), pp. 8\u201311 (2013)","DOI":"10.1109\/EST.2013.7"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Singh, A.K., Joshi, P., Nandi, G.C.: Face recognition with liveness detection using eye and mouth movement. In: 2014 International Conference on Signal Propagation and Computer Technology (IC- SPCT), pp. 592\u2013597 (2014)","DOI":"10.1109\/ICSPCT.2014.6884911"},{"issue":"4","key":"2_CR19","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TIFS.2015.2398819","volume":"10","author":"DF Smith","year":"2015","unstructured":"Smith, D.F., Wiliem, A., Lovell, C.: Face recognition on consumer devices: reflections on replay attacks. IEEE Trans. Inf. Forensics Secur. 10(4), 736\u2013745 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Boehm, A., Chen, D., Frank, M., Huang, L., Kuo, C., Lolic, T., Martinovic, I., Song, D.: Safe: secure authentication with face and eyes. In: 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1\u20138 (2013)","DOI":"10.1109\/PRISMS.2013.6927175"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-25417-3_25","volume-title":"Biometric Recognition","author":"L Cai","year":"2015","unstructured":"Cai, L., Huang, L., Liu, C.: Person-specific face spoofing detection for replay attack based on gaze estimation. In: Yang, J., Yang, J., Sun, Z., Shan, S., Zheng, W., Feng, J. (eds.) Biometric Recognition. LNCS, vol. 9428, pp. 201\u2013211. Springer, Cham (2015). doi:10.1007\/978-3-319-25417-3_25"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Kollreider, K., Fronthaler, H., Bigun, J.: Evaluating liveness by face images and the structure tensor. In: 4th IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), pp. 75\u201380 (2005)","DOI":"10.1109\/AUTOID.2005.20"},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Ali, A., Hoque, S., Deravi, F.: Gaze stability for liveness detection. Pattern Anal. Applic. (2016). doi:10.1007\/s10044-016-0587-2","DOI":"10.1007\/s10044-016-0587-2"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Asthana, A., Zafeiriou, S., Cheng, S., Pantic, M.: Incremental face alignment in the wild. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1859\u20131866 (2014)","DOI":"10.1109\/CVPR.2014.240"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69900-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T20:11:26Z","timestamp":1750968686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-69900-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319698991","9783319699004"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69900-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"1 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PReMI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition and Machine Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"premi2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isical.ac.in\/~premi17","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}