{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:30:32Z","timestamp":1772645432323,"version":"3.50.1"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319926261","type":"print"},{"value":"9783319926278","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-92627-8_10","type":"book-chapter","created":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T13:02:36Z","timestamp":1546347756000},"page":"207-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Recent Advances in Face Presentation Attack Detection"],"prefix":"10.1007","author":[{"given":"Sushil","family":"Bhattacharjee","sequence":"first","affiliation":[]},{"given":"Amir","family":"Mohammadi","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Anjos","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Marcel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"key":"10_CR1","first-page":"223","volume-title":"Lecture Notes in Computer Science","author":"Nalini K. Ratha","year":"2001","unstructured":"Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In: Bigun J, Smeraldi F (eds) Audio- and video-based biometric person authentication. Springer, Heidelberg, pp 223\u2013228"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues, and research directions. In: Proceedings of IEEE computer society conference on computer vision and pattern recognition workshops (cVPRW), pp 113 \u2013 118","DOI":"10.1109\/CVPRW.2014.22"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Ramachandra R, Raja KB, Venkatesh S, Cheikh FA, B\u00fcsch C (2017) On the vulnerability of extended multispectral face recognition systems towards presentation attacks. In: Proceedings of IEEE international conference on identity, security and behavior analysis (ISBA), pp 1 \u2013 8. https:\/\/doi.org\/10.1109\/ISBA.2017.7947698","DOI":"10.1109\/ISBA.2017.7947698"},{"issue":"2","key":"10_CR4","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/TPAMI.2008.79","volume":"31","author":"J Wright","year":"2009","unstructured":"Wright J, Yang AY, Ganesh A, Sastry SS, Ma Y (2009) Robust face recognition via sparse representation. IEEE Trans Pattern Anal Mach Intell 31(2):210\u2013227. https:\/\/doi.org\/10.1109\/TPAMI.2008.79","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10_CR5","unstructured":"Kanzawa Y, Kimura Y, Naito T (2011) Human skin detection by visible and near-infrared imaging. In: Proceedings of the 12th IAPR conference on machine vision applications, MVA 2011. Nara, Japan"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Parkhi OM, Vedaldi A, Zisserman A (2015) Deep face recognition. In: British machine vision conference","DOI":"10.5244\/C.29.41"},{"key":"10_CR7","unstructured":"Wu X, He R, Sun Z (2015) A lightened CNN for deep face representation. CoRR. http:\/\/arxiv.org\/abs\/1511.02683 , arXiv:1511.02683"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) FaceNet: a unified embedding for face recognition and clustering. CoRR. http:\/\/arxiv.org\/abs\/1503.03832 , arXiv:1503.03832","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"10_CR9","unstructured":"Huang GB, Ramesh M, Berg T, Learned-Miller E (2007) Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments. Technical report 07\u201349, University of Massachusetts, Amherst (MA), USA"},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1049\/iet-bmt.2017.0079","volume":"7","author":"A Mohammadi","year":"2018","unstructured":"Mohammadi A, Bhattacharjee S, Marcel S (2018) Deeply vulnerable: a study of the robustness of face recognition to presentation attacks. IET Biom 7(1):15\u201326. https:\/\/doi.org\/10.1049\/iet-bmt.2017.0079","journal-title":"IET Biom"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Ferrara M, Franco A, Maltoni D (2014) The magic passport. In: Proceedings of IEEE international joint conference on biometrics (IJCB). https:\/\/doi.org\/10.1109\/BTAS.2014.6996240","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Scherhag U, Nautsch A, Rathgeb C, Gomez-Barrero M, Veldhuis RNJ, Spreeuwers L, Schils M, Maltoni D, Grother F, Marcel S, Breithaupt R, Ramachandra R, B\u00fcsch C (2017) Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: Proceedings of international conference of the biometrics special interest group (BIOSIG). https:\/\/doi.org\/10.23919\/BIOSIG.2017.8053499","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Ramachandra R, Raja KB, B\u00fcsch C (2016) Detecting morphed face images. In: Proceedings of IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1 \u2013 7. https:\/\/doi.org\/10.1109\/BTAS.2016.7791169","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"10_CR14","unstructured":"Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of the international conference of biometrics special interest group (BIOSIG)"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The replay-mobile face presentation-attack database. In: Proceedings of international conference of the biometrics special interest group (BIOSIG). https:\/\/doi.org\/10.1109\/BIOSIG.2016.7736936","DOI":"10.1109\/BIOSIG.2016.7736936"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3038924","volume":"50","author":"Raghavendra Ramachandra","year":"2017","unstructured":"Ramachandra R, B\u00fcsch C (2017) Presentation attack detection methods for face recognition systems - a comprehensive survey. ACM Comput Surv 50","journal-title":"ACM Computing Surveys"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Rudd EM, G\u00fcnther M, Boult TE (2016) PARAPH: presentation attack rejection by analyzing polarization hypotheses. In: IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 171 \u2013 178. https:\/\/doi.org\/10.1109\/CVPRW.2016.28","DOI":"10.1109\/CVPRW.2016.28"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing (ICIP), pp 2636\u20132640","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"M\u00e4\u00e4tt\u00e4 J, Hadid A, Pietik\u00e4inen M (2011) Face spoofing detection from single images using micro-texture analysis. In: Proceedings of international joint conference on biometrics (IJCB). https:\/\/doi.org\/10.1109\/IJCB.2011.6117510","DOI":"10.1109\/IJCB.2011.6117510"},{"issue":"8","key":"10_CR20","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818\u20131830. https:\/\/doi.org\/10.1109\/TIFS.2016.2555286","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2018) On the generalization of color texture-based face anti-spoofing. Image Vis Comput. Accepted at the time of writing","DOI":"10.1016\/j.imavis.2018.04.007"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: Proceedings of 12th IEEE international conference on automatic face and gesture recognition (FG 2017)","DOI":"10.1109\/FG.2017.77"},{"issue":"4","key":"10_CR23","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746\u2013761","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"10_CR24","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2014","unstructured":"Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710\u2013724. https:\/\/doi.org\/10.1109\/TIP.2013.2292332","journal-title":"IEEE Trans Image Process"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Li Y, Po LM, Xu X, Feng L, Yuan F (2016) Face liveness detection and recognition using shearlet based feature descriptors. In: Proceedings of IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 874 \u2013 877","DOI":"10.1109\/ICASSP.2016.7471800"},{"issue":"4","key":"10_CR26","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/TIFS.2015.2411394","volume":"10","author":"DC Garcia","year":"2015","unstructured":"Garcia DC, de Queiroz RL (2015) Face-spoofing 2D-detection based on Moir\u00e9-Pattern analysis. IEEE Trans Inf Forensics Secur 10(4):778\u2013786. https:\/\/doi.org\/10.1109\/TIFS.2015.2411394","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"10_CR27","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel K, Han H, Jain A (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268\u20132283. https:\/\/doi.org\/10.1109\/TIFS.2016.2578288","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"10_CR28","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TIFS.2015.2406533","volume":"10","author":"S Tirunagari","year":"2015","unstructured":"Tirunagari S, Poh N, Windridge D, Iorliam A, Suki N, Ho ATS (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10(4):762\u2013777. https:\/\/doi.org\/10.1109\/TIFS.2015.2406533","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10_CR29","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1049\/iet-bmt.2012.0071","volume":"3","author":"A Anjos","year":"2014","unstructured":"Anjos A, Chakka MM, Marcel S (2014) Motion-based counter-measures to photo attacks in face recognition. IET Biom 3(3):147\u2013158. https:\/\/doi.org\/10.1049\/iet-bmt.2012.0071","journal-title":"IET Biom"},{"key":"10_CR30","unstructured":"Yang J, Lei Z, Li SZ (2014) Learn convolutional neural network for face anti-spoofing. CoRR. http:\/\/arxiv.org\/abs\/1408.5601 , arXiv:1408.5601"},{"key":"10_CR31","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. In: Advances in neural information processing systems, vol 25"},{"key":"10_CR32","first-page":"27","volume-title":"Lecture Notes in Computer Science","author":"Oeslle Lucena","year":"2017","unstructured":"Lucena O, Junior A, Hugo GMV, Souza R, Valle E, De Alencar Lotufo R (2017) Transfer learning using convolutional neural networks for face anti-spoofing. In: Karray F, Campilho A, Cheriet F (eds.) Proceedings of international conference on image analysis and recognition (ICIAR), Springer International Publishing, Cham, pp 27\u201334"},{"key":"10_CR33","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. CoRR. http:\/\/arxiv.org\/abs\/1409.1556 , arXiv:1409.1556"},{"issue":"4","key":"10_CR34","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","volume":"10","author":"David Menotti","year":"2015","unstructured":"Menotti D, Chiachia G, Pinto A, Schwartz WR, Pedrini H, Falco A, Rocha A (2015) Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans Inf Forensics Secur 10(4):864\u2013879. https:\/\/doi.org\/10.1109\/TIFS.2015.2398817","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10_CR35","unstructured":"Nagpal C, Dubey SR (2018) A performance evaluation of convolutional neural networks for face anti spoofing. CoRR. https:\/\/arxiv.org\/abs\/1805.04176 , arXiv:1805.04176"},{"key":"10_CR36","doi-asserted-by":"publisher","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR), pp 2818\u20132826. https:\/\/doi.org\/10.1109\/CVPR.2016.308","DOI":"10.1109\/CVPR.2016.308"},{"key":"10_CR37","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of IEEE conference on computer vision and pattern recognition (CVPR), pp 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"10_CR38","doi-asserted-by":"publisher","unstructured":"Li L, Xia Z, Li L, Jiang X, Feng X, Roli F (2017) Face anti-spoofing via hybrid convolutional neural network. In: Proceedings of international conference on the frontiers and advances in data science (FADS), pp 120\u2013124. https:\/\/doi.org\/10.1109\/FADS.2017.8253209","DOI":"10.1109\/FADS.2017.8253209"},{"issue":"3","key":"10_CR39","doi-asserted-by":"publisher","first-page":"699","DOI":"10.3390\/s18030699","volume":"18","author":"Dat Tien Nguyen","year":"2018","unstructured":"Nguyen TD, Pham TD, Baek NR, Park KR (2018) Combining deep and handcrafted image features for presentation attack detection in face recognition systems using visible-light camera sensors. J Sens 18(3):699\u2013727. https:\/\/doi.org\/10.3390\/s18030699","journal-title":"Sensors"},{"key":"10_CR40","doi-asserted-by":"publisher","unstructured":"Xu Z, Li S, Deng W (2015) Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In: Proceedings of 3rd IAPR asian conference on pattern recognition (ACPR), pp 141\u2013145. https:\/\/doi.org\/10.1109\/ACPR.2015.7486482","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Liu Y, Jourabloo A, Liu X (2018) Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceeding of IEEE computer vision and pattern recognition, Salt Lake City, USA","DOI":"10.1109\/CVPR.2018.00048"},{"issue":"4","key":"10_CR42","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1109\/TIFS.2015.2400392","volume":"10","author":"I Chingovska","year":"2015","unstructured":"Chingovska I, dos Anjos AR (2015) On the use of client identity information for face antispoofing. IEEE Trans Inf Forensics Secur 10(4):787\u2013796. https:\/\/doi.org\/10.1109\/TIFS.2015.2400392","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"10_CR43","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1109\/TIFS.2015.2403306","volume":"10","author":"J Yang","year":"2015","unstructured":"Yang J, Lei Z, Yi D, Li SZ (2015) Person-specific face antispoofing with subject domain adaptation. IEEE Trans Inf Forensics Secur 10(4):797\u2013809. https:\/\/doi.org\/10.1109\/TIFS.2015.2403306","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10_CR44","doi-asserted-by":"publisher","unstructured":"Ge S, Li J, Ye Q, Luo Z (2017) Detecting masked faces in the wild with LLE-CNNs. In: Proceedings of IEEE conference on computer vision and pattern recognition (CVPR), pp 426\u2013434. https:\/\/doi.org\/10.1109\/CVPR.2017.53","DOI":"10.1109\/CVPR.2017.53"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Wang S, Yun Fu Y (2016) Face behind makeup. In: Proceedings of the thirtieth conference of the association for the advancement of artificial intelligence, pp 58\u201364","DOI":"10.1609\/aaai.v30i1.10002"},{"key":"10_CR46","doi-asserted-by":"publisher","unstructured":"Kose N, Apvrille L, Dugelay JL (2015) Facial makeup detection technique based on texture and shape analysis. In: Proceedings of 11th IEEE international conference on automatic face and gesture recognition, Ljubljana, Slovenia (FG). Ljubljana, SLOVENIA, 4\u20138 May 2015. https:\/\/doi.org\/10.1109\/FG.2015.7163104 . http:\/\/www.eurecom.fr\/publication\/4494","DOI":"10.1109\/FG.2015.7163104"},{"key":"10_CR47","doi-asserted-by":"publisher","unstructured":"Agarwal A, Yadav D, Kohli N, Singh R, Vatsa M, Noore A (2017) Face presentation attack with latex masks in multispectral videos. In: Proceedings of IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 275\u2013283. https:\/\/doi.org\/10.1109\/CVPRW.2017.40","DOI":"10.1109\/CVPRW.2017.40"},{"key":"10_CR48","doi-asserted-by":"publisher","unstructured":"Boulkenafet Z et al (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: Proceedings of IEEE international joint conference on biometrics (IJCB), pp 688\u2013696. https:\/\/doi.org\/10.1109\/BTAS.2017.8272758","DOI":"10.1109\/BTAS.2017.8272758"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Arashloo SR, Kittler J (2017) An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. In: Proceedings of the IEEE international joint conference on biometrics (IJCB), pp 80\u201389","DOI":"10.1109\/BTAS.2017.8272685"},{"key":"10_CR50","doi-asserted-by":"publisher","unstructured":"Nikisins O, Mohammadi A, Anjos A, Marcel S (2018) On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing. In: Proceedings of international conference on biometrics (ICB). https:\/\/doi.org\/10.1109\/ICB2018.2018.00022","DOI":"10.1109\/ICB2018.2018.00022"},{"key":"10_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/9682453","volume":"2016","author":"Holger Steiner","year":"2016","unstructured":"Steiner H, Sporrer S, Kolb A, Jung N (2016) Design of an active multispectral SWIR camera system for skin detection and face verification. J Sens 2016(1):1 \u2013 8. Article ID 9682453, Special Issue on Multispectral, Hyperspectral, and Polarimetric Imaging Technology","journal-title":"Journal of Sensors"},{"key":"10_CR52","doi-asserted-by":"crossref","unstructured":"Bourlai T, Narang N, Cukic B, Hornak L (2012) On designing a SWIR multi-wavelength facial-based acquisition system. In: Proceedings of SPIE: infrared technology and applications, vol 8353","DOI":"10.1117\/12.919392"},{"key":"10_CR53","doi-asserted-by":"publisher","unstructured":"Ramachandra R, Raja KB, Venkatesh S, B\u00fcsch C (2017) Extended multispectral face presentation attack detection: an approach based on fusing information from individual spectral bands. In: Proceedings of 20th international conference on information fusion (Fusion). https:\/\/doi.org\/10.23919\/ICIF.2017.8009749","DOI":"10.23919\/ICIF.2017.8009749"},{"key":"10_CR54","doi-asserted-by":"crossref","unstructured":"Bhattacharjee S, Marcel S (2017) What you can\u2019t see can help you \u2013 extended range imaging for 3d-mask presentation attack detection. In: Proceedings of the 16th international conference of the biometrics special interest group (BIOSIG), Darmstadt, Germany","DOI":"10.23919\/BIOSIG.2017.8053524"},{"key":"10_CR55","doi-asserted-by":"crossref","unstructured":"Bhattacharjee S, Mohammadi A, Marcel S (2018) Spoofing deep face recognition with custom silicone masks. In: Proceedings of the IEEE international conference on biometrics: theory, applications and systems (BTAS). Los Angeles, USA )","DOI":"10.1109\/BTAS.2018.8698550"},{"key":"10_CR56","doi-asserted-by":"crossref","unstructured":"Erdogmus N, Marcel S (2013) Spoofing in 2D Face recognition with 3d masks and anti-spoofing with kinect. In: Proceedings of the IEEE international conference on biometrics: theory, applications and systems (BTAS)","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"10_CR57","doi-asserted-by":"publisher","unstructured":"Liu S, Yang B, Yuen PC, Zhao G (2016) A 3D mask face anti-spoofing database with real world variations. In: Proceedings of IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 1551\u20131557. https:\/\/doi.org\/10.1109\/CVPRW.2016.193","DOI":"10.1109\/CVPRW.2016.193"},{"key":"10_CR58","doi-asserted-by":"crossref","unstructured":"Agarwal A, Singh R, Vatsa M (2016) Face anti-spoofing using haralick features. In: Proceedings of the IEEE international conference on biometrics: theory, applications, and systems (BTAS), Niagara Falls, USA, pp 1\u20136","DOI":"10.1109\/BTAS.2016.7791171"},{"issue":"7","key":"10_CR59","doi-asserted-by":"publisher","first-page":"1713","DOI":"10.1109\/TIFS.2017.2676720","volume":"12","author":"I Manjani","year":"2017","unstructured":"Manjani I, Tariyal S, Vatsa M, Singh R, Majumdar A (2017) Detecting silicone mask-based presentation attack via deep dictionary learning. IEEE Trans Inf Forensics Secur 12(7):1713\u20131723. https:\/\/doi.org\/10.1109\/TIFS.2017.2676720","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIP.2015.2402551","volume":"24","author":"R Ramachandra","year":"2015","unstructured":"Ramachandra R, Raja K, B\u00fcsch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24(3):1\u201316","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"10_CR61","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/TIFS.2015.2395139","volume":"10","author":"A Pinto","year":"2015","unstructured":"Pinto A, Schwartz WR, Pedrini H, Rocha ADR (2015) Using visual rhythms for detecting video-based facial spoof attacks. IEEE Trans Inf Forensics Secur 10(5):1025\u20131038. https:\/\/doi.org\/10.1109\/TIFS.2015.2395139","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10_CR62","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-319-28501-6_8","volume-title":"Face Recognition Across the Imaging Spectrum","author":"Ivana Chingovska","year":"2016","unstructured":"Chingovska I, Erdogmus N, Anjos A, Marcel S (2016) Face recognition systems under spoofing attacks. In: Bourlai T (ed.) Face recognition across the imaging spectrum, Springer, Berlin, pp 165\u2013194 (2016)"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Biometric Anti-Spoofing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92627-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T12:43:09Z","timestamp":1662727389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92627-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783319926261","9783319926278"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92627-8_10","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"value":"2191-6586","type":"print"},{"value":"2191-6594","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}