{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:47:21Z","timestamp":1742914041527,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319751924"},{"type":"electronic","value":"9783319751931"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75193-1_77","type":"book-chapter","created":{"date-parts":[[2018,2,3]],"date-time":"2018-02-03T11:02:59Z","timestamp":1517655779000},"page":"643-651","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Transfer Learning for Robust Face Spoofing Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4441-9108","authenticated-orcid":false,"given":"Gustavo B.","family":"Souza","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5124-3713","authenticated-orcid":false,"given":"Daniel F. S.","family":"Santos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9597-055X","authenticated-orcid":false,"given":"Rafael G.","family":"Pires","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4861-7061","authenticated-orcid":false,"given":"Aparecido N.","family":"Marana","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6494-7514","authenticated-orcid":false,"given":"Jo\u00e3o P.","family":"Papa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,4]]},"reference":[{"issue":"4","key":"77_CR1","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","volume":"10","author":"D Menotti","year":"2015","unstructured":"Menotti, D., Chiachia, G., Pinto, A., Schwartz, W., Pedrini, H., Falcao, A., Rocha, A.: Deep representations for iris, face, and fingerprint spoofing attack detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864\u2013879 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"77_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-39593-2_1","volume":"7978","author":"Y Bengio","year":"2013","unstructured":"Bengio, Y.: Deep learning of representations: looking forward. Stat. Lang. Speech Process. 7978, 1\u201337 (2013)","journal-title":"Stat. Lang. Speech Process."},{"key":"77_CR3","doi-asserted-by":"crossref","unstructured":"Parkhi, O.M., Vedaldi, A., Zisserman, A.: Deep face recognition. In: Proceedings of the British Machine Vision Conference (2015)","DOI":"10.5244\/C.29.41"},{"key":"77_CR4","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of International Conference of BIOSIG, USA, pp. 1\u20137 (2012)"},{"key":"77_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-45344-X_32","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"NK Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223\u2013228. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45344-X_32"},{"key":"77_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-3-319-46654-5_67","volume-title":"Biometric Recognition","author":"K Patel","year":"2016","unstructured":"Patel, K., Han, H., Jain, A.K.: Cross-database face antispoofing with robust feature representation. In: You, Z., Zhou, J., Wang, Y., Sun, Z., Shan, S., Zheng, W., Feng, J., Zhao, Q. (eds.) CCBR 2016. LNCS, vol. 9967, pp. 611\u2013619. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46654-5_67"},{"issue":"11","key":"77_CR7","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"77_CR8","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1106\u20131114 (2012)"},{"key":"77_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35289-8","volume-title":"Neural Networks: Tricks of the Trade","year":"2012","unstructured":"Montavon, G., Orr, G.B., M\u00fcller, K.-R. (eds.): Neural Networks: Tricks of the Trade. LNCS, vol. 7700, 2nd edn. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35289-8","edition":"2"},{"key":"77_CR10","unstructured":"Huang, G., Ramesh, M., Berg, T., Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report 07\u201349, University of Massachusetts, Amherst (2007)"},{"key":"77_CR11","doi-asserted-by":"crossref","unstructured":"Wolf, L., Hassner, T., Maoz, I.: Face recognition in unconstrained videos with matched background similarity. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2011)","DOI":"10.1109\/CVPR.2011.5995566"},{"key":"77_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C Chang","year":"2011","unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2, 1\u201327 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"77_CR13","doi-asserted-by":"crossref","unstructured":"Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T.: Caffe: convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093 (2014)","DOI":"10.1145\/2647868.2654889"},{"issue":"8","key":"77_CR14","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1109\/TIP.2015.2422574","volume":"24","author":"W Kim","year":"2015","unstructured":"Kim, W., Suh, S., Han, J.: Face liveness detection from a single image via diffusion speed model. IEEE Trans. Image Process. 24(8), 2456\u20132465 (2015)","journal-title":"IEEE Trans. Image Process."},{"key":"77_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-37410-4_11","volume-title":"Computer Vision - ACCV 2012 Workshops","author":"T de Freitas Pereira","year":"2013","unstructured":"de Freitas Pereira, T., Anjos, A., De Martino, J.M., Marcel, S.: LBP\u2013TOP based countermeasure against face spoofing attacks. In: Park, J.-I., Kim, J. (eds.) ACCV 2012. LNCS, vol. 7728, pp. 121\u2013132. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37410-4_11"},{"issue":"4","key":"77_CR16","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11760-016-1014-2","volume":"11","author":"A Alotaibi","year":"2017","unstructured":"Alotaibi, A., Mahmood, A.: Deep face liveness detection based on nonlinear diffusion using convolution neural network. Sig. Image Video Process. 11(4), 713\u2013720 (2017)","journal-title":"Sig. Image Video Process."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75193-1_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:25:57Z","timestamp":1710325557000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-75193-1_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319751924","9783319751931"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75193-1_77","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"4 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CIARP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iberoamerican Congress on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valpara\u00edso","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ciarp2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ciarp2017.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}