{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:01:12Z","timestamp":1761663672553},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319699226"},{"type":"electronic","value":"9783319699233"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69923-3_32","type":"book-chapter","created":{"date-parts":[[2017,10,19]],"date-time":"2017-10-19T02:14:39Z","timestamp":1508379279000},"page":"296-305","source":"Crossref","is-referenced-by-count":9,"title":["Finger Vein Presentation Attack Detection Using Convolutional Neural Networks"],"prefix":"10.1007","author":[{"given":"Xinwei","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Senping","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Wenxiong","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Qiuxia","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,20]]},"reference":[{"issue":"4","key":"32_CR1","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1109\/TIFS.2015.2406533","volume":"10","author":"S Tirunagari","year":"2015","unstructured":"Tirunagari, S., Poh, N., Windridge, D., Iorliam, A., Suki, N., Ho, A.T.: Detection of face spoofing using visual dynamics. IEEE Trans. Inf. Forensics Secur. 10(4), 762\u2013777 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"32_CR2","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1049\/iet-bmt.2013.0020","volume":"3","author":"C Sousedik","year":"2014","unstructured":"Sousedik, C., Busch, C.: Presentation attack detection methods for fingerprint recognition systems: a survey. IET Biom. 3(4), 219\u2013233 (2014)","journal-title":"IET Biom."},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-1-84628-921-7_6","volume-title":"Advances in Biometrics","author":"M Himaga","year":"2008","unstructured":"Himaga, M., Kou, K.: Finger vein authentication technology and financial applications. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics, pp. 89\u2013105. Springer, London (2008). doi: 10.1007\/978-1-84628-921-7_6"},{"issue":"11","key":"32_CR4","doi-asserted-by":"crossref","first-page":"1974","DOI":"10.1109\/TIFS.2014.2361020","volume":"9","author":"W Kang","year":"2014","unstructured":"Kang, W., Wu, Q.: Contactless palm vein recognition using a mutual foreground-based local binary pattern. IEEE Trans. Inf. Forensics Secur. 9(11), 1974\u20131985 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Nguyen, D.T., Park, Y.H., Shin, K.Y., Kwon, S.Y., Lee, H.C., Park, K.R.: Fake finger-vein image detection based on fourier and wavelet transforms. In: IEEE Conference on Digital Signal Processing, pp. 1401\u20131413 (2013)","key":"32_CR5","DOI":"10.1016\/j.dsp.2013.04.001"},{"doi-asserted-by":"crossref","unstructured":"Tome, P., Vanoni, M., Marcel, S.: On the vulnerability of finger vein recognition to spoofing. In: Proceedings of the IEEE BIOSIG, pp. 1\u201310 (2014)","key":"32_CR6","DOI":"10.1109\/ICB.2015.7139056"},{"doi-asserted-by":"crossref","unstructured":"Raghavendra, R., Avinash, M., Marcel, S., Busch, C.: Finger vein liveness detection using motion magnification. In: IEEE Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20137 (2015)","key":"32_CR7","DOI":"10.1109\/BTAS.2015.7358762"},{"doi-asserted-by":"crossref","unstructured":"Tome, P., Raghavendra, R., Busch, C., Tirunagari, S., Poh, N., Shekar, B.H., Gragnaniello, D., Sansone, C., Verdoliva, L., Marcel, S.: The 1st competition on counter measures to finger vein spoofing attacks. In: 2015 International Conference on Biometrics (ICB) (2015)","key":"32_CR8","DOI":"10.1109\/ICB.2015.7139067"},{"doi-asserted-by":"crossref","unstructured":"Tirunagari, S., Poh, N., Bober, M., Windridge, D.: Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1\u20136. IEEE (2015)","key":"32_CR9","DOI":"10.1109\/WIFS.2015.7368599"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-3-319-46654-5_67","volume-title":"Biometric Recognition","author":"K Patel","year":"2016","unstructured":"Patel, K., Han, H., Jain, A.K.: Cross-database face antispoofing with robust feature representation. In: You, Z., Zhou, J., Wang, Y., Sun, Z., Shan, S., Zheng, W., Feng, J., Zhao, Q. (eds.) CCBR 2016. LNCS, vol. 9967, pp. 611\u2013619. Springer, Cham (2016). doi: 10.1007\/978-3-319-46654-5_67"},{"issue":"6","key":"32_CR11","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/TIFS.2016.2520880","volume":"11","author":"RF Nogueira","year":"2016","unstructured":"Nogueira, R.F., de Alencar Lotufo, R., Machado, R.C.: Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 11(6), 1206\u20131213 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Qin, B., Pan, J.F., Cao, G.Z., Du, G.G.: The anti-spoofing study of vein identification system. In: 2009 International Conference on Computational Intelligence and Security (2009)","key":"32_CR12","DOI":"10.1109\/CIS.2009.144"},{"unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (2012)","key":"32_CR13"},{"unstructured":"The ISO\/IEC Standards for Testing of Presentation Attack Detection. http:\/\/www.christoph-busch.de\/files\/Busch-PAD-standards-170329.pdf","key":"32_CR14"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69923-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T21:22:26Z","timestamp":1570224146000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69923-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319699226","9783319699233"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69923-3_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}