{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:12:13Z","timestamp":1750997533735,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319699226"},{"type":"electronic","value":"9783319699233"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69923-3_57","type":"book-chapter","created":{"date-parts":[[2017,10,19]],"date-time":"2017-10-19T02:14:39Z","timestamp":1508379279000},"page":"528-536","source":"Crossref","is-referenced-by-count":2,"title":["Motion Analysis Based Cross-Database Voting for Face Spoofing Detection"],"prefix":"10.1007","author":[{"given":"Lifang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yaowen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Jian","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Chuncan","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Yukun","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,20]]},"reference":[{"key":"57_CR1","doi-asserted-by":"crossref","unstructured":"Chihaoui, M., Elkefi, A., Bellil, W., Amar, C.B.: A survey of 2D face recognition techniques (2016)","DOI":"10.3390\/computers5040021"},{"key":"57_CR2","doi-asserted-by":"crossref","unstructured":"Li, Y., Xu, K., Yan, Q., Li, Y., Deng, R.H.: Understanding OSN-based facial disclosure against face authentication systems. In: ACM Symposium on Information, Computer and Communications Security, pp. 413\u2013424. ACM (2014)","DOI":"10.1145\/2590296.2590315"},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Omar, L., Ivrissimtzis, I.: Evaluating the resilience of face recognition systems against malicious attacks. In: Uk British Machine Vision Workshop, pp. 5.1\u20135.9 (2015)","DOI":"10.5244\/C.29.BMVW.5"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Das, D.: An overview of face liveness detection. Comput. Sci. (2014)","DOI":"10.5121\/ijit.2014.3202"},{"key":"57_CR5","first-page":"373","volume":"9218","author":"J Yang","year":"2014","unstructured":"Yang, J., Lei, Z., Li, S.Z.: Learn convolutional neural network for face anti-spoofing. Comput. Sci. 9218, 373\u2013384 (2014)","journal-title":"Comput. Sci."},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Alotaibi, A., Mahmood, A.: Enhancing computer vision to detect face spoofing attack utilizing a single frame from a replay video attack using deep learning. In: International Conference on Optoelectronics and Image Processing, pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/OPTIP.2016.7528488"},{"issue":"8","key":"57_CR7","doi-asserted-by":"crossref","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11(8), 1818\u20131830 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"57_CR8","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: Biometrics Special Interest Group, pp. 1\u20137. IEEE (2012)"},{"key":"57_CR9","doi-asserted-by":"crossref","unstructured":"Bharadwaj, S., Dhamecha, T.I., Vatsa, M., Singh, R.: Computationally efficient face spoofing detection with motion magnification. In: Computer Vision and Pattern Recognition Workshops, vol. 13, pp. 105\u2013110. IEEE (2013)","DOI":"10.1109\/CVPRW.2013.23"},{"issue":"4","key":"57_CR10","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1109\/TIFS.2015.2406533","volume":"10","author":"S Tirunagari","year":"2015","unstructured":"Tirunagari, S., Poh, N., Windridge, D., Iorliam, A., Suki, N., Ho, A.T.S.: Detection of face spoofing using visual dynamics. IEEE Trans. Inf. Forensics Secur. 10(4), 762\u2013777 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"57_CR11","doi-asserted-by":"crossref","unstructured":"Bao, W., Li, H., Li, N., Jiang, W.: A liveness detection method for face recognition based on optical flow field. In: International Conference on Image Analysis and Signal Processing, pp. 233\u2013236. IEEE (2009)","DOI":"10.1109\/IASP.2009.5054589"},{"issue":"2","key":"57_CR12","first-page":"363","volume":"22","author":"JY Bouguet","year":"1999","unstructured":"Bouguet, J.Y.: Pyramidal implementation of the lucas kanade feature tracker description of the algorithm. Opencv Doc. 22(2), 363\u2013381 (1999)","journal-title":"Opencv Doc."},{"key":"57_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/3-540-45103-X_50","volume-title":"Image Analysis","author":"G Farneb\u00e4ck","year":"2003","unstructured":"Farneb\u00e4ck, G.: Two-frame motion estimation based on polynomial expansion. In: Bigun, J., Gustavsson, T. (eds.) SCIA 2003. LNCS, vol. 2749, pp. 363\u2013370. Springer, Heidelberg (2003). doi: 10.1007\/3-540-45103-X_50"},{"key":"57_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/978-3-319-46654-5_69","volume-title":"Biometric Recognition","author":"L Wu","year":"2016","unstructured":"Wu, L., Xu, Y., Xu, X., Qi, W., Jian, M.: A face liveness detection scheme to combining static and dynamic features. In: You, Z., Zhou, J., Wang, Y., Sun, Z., Shan, S., Zheng, W., Feng, J., Zhao, Q. (eds.) CCBR 2016. LNCS, vol. 9967, pp. 628\u2013636. Springer, Cham (2016). doi: 10.1007\/978-3-319-46654-5_69"},{"key":"57_CR15","volume-title":"Robust Real-Time Face Detection","author":"P Viola","year":"2004","unstructured":"Viola, P., Jones, M.J.: Robust Real-Time Face Detection. Kluwer Academic Publishers, Dordrecht (2004)"},{"key":"57_CR16","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, vol. 25, pp. 1097\u20131105. Curran Associates Inc (2012)"},{"key":"57_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z.: A face antispoofing database with diverse attacks. In: IAPR International Conference on Biometrics, pp. 26\u201331. IEEE (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"key":"57_CR18","doi-asserted-by":"crossref","unstructured":"Pereira, T.D.F., Anjos, A., Martino, J.M.D., Marcel, S.: Can face anti-spoofing countermeasures work in a real world scenario? In: International Conference on Biometrics, pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/ICB.2013.6612981"},{"issue":"12","key":"57_CR19","doi-asserted-by":"crossref","first-page":"4726","DOI":"10.1109\/TIP.2015.2466088","volume":"24","author":"A Pinto","year":"2015","unstructured":"Pinto, A., Pedrini, H., Schwartz, W.R., Rocha, A.: Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans. Image Process. 24(12), 4726 (2015). A Publication of the IEEE Signal Processing Society","journal-title":"IEEE Trans. Image Process."}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69923-3_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T15:23:10Z","timestamp":1750951390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69923-3_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319699226","9783319699233"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69923-3_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}