{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:04:17Z","timestamp":1761663857287},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319926261"},{"type":"electronic","value":"9783319926278"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-92627-8_12","type":"book-chapter","created":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T13:02:36Z","timestamp":1546347756000},"page":"247-266","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Challenges of Face Presentation Attack Detection in Real Scenarios"],"prefix":"10.1007","author":[{"given":"Artur","family":"Costa-Pazo","sequence":"first","affiliation":[]},{"given":"Esteban","family":"Vazquez-Fernandez","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Luis","family":"Alba-Castro","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Gonz\u00e1lez-Jim\u00e9nez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"issue":"10","key":"12_CR1","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"Keyurkumar Patel","year":"2016","unstructured":"Patel K, Han H, Jain A (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10), 2268\u20132283","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: 2015 IEEE international conference on image processing (ICIP), pp 2636\u20132640. \nhttps:\/\/doi.org\/10.1109\/ICIP.2015.7351280","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-642-15567-3_37","volume-title":"Computer Vision \u2013 ECCV 2010","author":"Xiaoyang Tan","year":"2010","unstructured":"Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Springer, Berlin, pp 504\u2013517. \nhttps:\/\/doi.org\/10.1007\/978-3-642-15567-3_37"},{"key":"12_CR4","doi-asserted-by":"publisher","unstructured":"Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on biometrics (ICB), pp 26\u201331. \nhttps:\/\/doi.org\/10.1109\/ICB.2012.6199754","DOI":"10.1109\/ICB.2012.6199754"},{"key":"12_CR5","unstructured":"Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG - proceedings of the international conference of biometrics special interest group (BIOSIG), pp 1\u20137"},{"issue":"4","key":"12_CR6","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"Di Wen","year":"2015","unstructured":"Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746\u2013761. \nhttps:\/\/doi.org\/10.1109\/TIFS.2015.2400395","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The replay-mobile face presentation-attack database. In: Proceedings of the international conference on biometrics special interests group (BioSIG)","DOI":"10.1109\/BIOSIG.2016.7736936"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: 2017 12th IEEE international conference on automatic face gesture recognition (FG 2017), pp 612\u2013618. \nhttps:\/\/doi.org\/10.1109\/FG.2017.77","DOI":"10.1109\/FG.2017.77"},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Chingovska I, Yang J, Lei Z, Yi D, Li SZ, K\u00e4hm O, Glaser C, Damer N, Kuijper A, Nouak A, Komulainen J, Pereira TF, Gupta S, Khandelwal S, Bansal S, Rai A, Krishna T, Goyal D, Waris M, Zhang H, Ahmad I, Kiranyaz S, Gabbouj M, Tronci R, Pili M, Sirena N, Roli F, Galbally J, Fi\u00e9rrez J, da\u00a0Silva\u00a0Pinto A, Pedrini H, Schwartz WS, Rocha A, Anjos A, Marcel S (2013) The 2nd competition on counter measures to 2d face spoofing attacks. In: International conference on biometrics, ICB 2013, 4\u20137 June 2013, Madrid, Spain, pp 1\u20136. \nhttps:\/\/doi.org\/10.1109\/ICB.2013.6613026","DOI":"10.1109\/ICB.2013.6613026"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche SE, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L, Peng F, Zhang LB, Long M, Bhilare S, Kanhangad V, Costa-Pazo A, Vazquez-Fernandez E, P\u00e9rez-Cabo D, Moreira-P\u00e9rez JJ, Gonz\u00e1lez-Jim\u00e9nez D, Mohammadi A, Bhattacharjee S, Marcel S, Volkova S, Tang Y, Abe N, Li L, Feng X, Xia Z, Jiang X, Liu S, Shao R, Yuen PC, Almeida WR, Andal\u00f3 F, Padilha R, Bertocco G, Dias W, Wainer J, Torres R, Rocha A, Angeloni MA, Folego G, Godoy A, Hadid A (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: IJCB 2017: international joint conference on biometrics (IJCB)","DOI":"10.1109\/BTAS.2017.8272758"},{"key":"12_CR11","unstructured":"Xu Y, Price T, Frahm JM, Monrose F (2016) Virtual u: defeating face liveness detection by building virtual models from your public photos. In: 25th USENIX security symposium (USENIX security 16). USENIX Association, Austin, TX, pp 497\u2013512"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Jackson AS, Bulat A, Argyriou V, Tzimiropoulos G (2017) Large pose 3d face reconstruction from a single image via direct volumetric CNN regression. CoRR. \narXiv:1703.07834","DOI":"10.1109\/ICCV.2017.117"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"de\u00a0Freitas\u00a0Pereira T, Anjos A, Martino JMD, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: 2013 international conference on biometrics (ICB), pp 1\u20138. \nhttps:\/\/doi.org\/10.1109\/ICB.2013.6612981","DOI":"10.1109\/ICB.2013.6612981"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Miguel-Hurtado O, Guest R, Lunerti C (2017) Voice and face interaction evaluation of a mobile authentication platform. In: 51st IEEE international Carnahan conference on security technology, Oct 2017, Madrid, Spain","DOI":"10.1109\/CCST.2017.8167860"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Trewin S, Swart C, Koved L, Martino J, Singh K, Ben-David S (2012) Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: 28th annual computer security applications conference","DOI":"10.1145\/2420950.2420976"},{"key":"12_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-052029-2.50007-3","volume-title":"Usability engineering","author":"J Nielsen","year":"1993","unstructured":"Nielsen J (1993) Usability engineering. Morgan Kaufmann Publishers Inc., San Francisco"},{"key":"12_CR17","unstructured":"Nielsen J (2010) Website response times"},{"key":"12_CR18","unstructured":"Anjos A, G\u00fcnther M, de\u00a0Freitas\u00a0Pereira T, Korshunov P, Mohammadi A, Marcel S (2017) Continuously reproducing toolchains in pattern recognition and machine learning experiments. In: International conference on machine learning (ICML)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Anjos A, Shafey LE, Wallace R, G\u00fcnther M, McCool C, Marcel S (2012) Bob: a free signal processing and machine learning toolbox for researchers. In: 20th ACM conference on multimedia systems (ACMMM), Nara, Japan","DOI":"10.1145\/2393347.2396517"},{"issue":"2","key":"12_CR20","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2014","unstructured":"Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710\u2013724. \nhttps:\/\/doi.org\/10.1109\/TIP.2013.2292332","journal-title":"IEEE Trans Image Process"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Jain AK, Klare B, Ross A (2015) Guidelines for best practices in biometrics research. In: International conference on biometrics, ICB 2015, Phuket, Thailand, 19\u201322 May 2015, pp 541\u2013545","DOI":"10.1109\/ICB.2015.7139116"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Biometric Anti-Spoofing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92627-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T13:08:59Z","timestamp":1546348139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92627-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783319926261","9783319926278"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92627-8_12","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"type":"print","value":"2191-6586"},{"type":"electronic","value":"2191-6594"}],"subject":[],"published":{"date-parts":[[2019]]}}}