{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:07:54Z","timestamp":1773702474185,"version":"3.50.1"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319926261","type":"print"},{"value":"9783319926278","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-92627-8_14","type":"book-chapter","created":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T08:02:36Z","timestamp":1546329756000},"page":"291-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Review of Face Presentation Attack Detection Competitions"],"prefix":"10.1007","author":[{"given":"Jukka","family":"Komulainen","sequence":"first","affiliation":[]},{"given":"Zinelabidine","family":"Boulkenafet","sequence":"additional","affiliation":[]},{"given":"Zahid","family":"Akhtar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"key":"14_CR1","unstructured":"International Organization for Standardization (2016) ISO\/IEC JTC 1\/SC 37 biometrics: information technology\u2014biometric presentation attack detection\u2014part 1: framework. Technical report"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Chingovska I, Erdogmus N, Anjos A, Marcel S (2016) Face recognition systems under spoofing attacks. In: Bourlai T (ed) Face recognition across the imaging spectrum. Springer International Publishing, pp 165\u2013194","DOI":"10.1007\/978-3-319-28501-6_8"},{"key":"14_CR3","unstructured":"Li Y, Li Y, Xu K, Yan Q, Deng R (2016) Empirical study of face authentication systems under OSNFD attacks. IEEE Trans Dependable Secur Comput"},{"issue":"1","key":"14_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1049\/iet-bmt.2017.0079","volume":"7","author":"A Mohammadi","year":"2018","unstructured":"Mohammadi A, Bhattacharjee S, Marcel S (2018) Deeply vulnerable: a study of the robustness of face recognition to presentation attacks. IET Biom 7(1):15\u201326","journal-title":"IET Biom"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: a mobile face presentation attack database with real-world variations. In: IEEE International conference on automatic face and gesture recognition","DOI":"10.1109\/FG.2017.77"},{"key":"14_CR6","unstructured":"Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: International conference of the biometrics special interest group (BIOSIG), pp 1\u20137"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The REPLAY-MOBILE face presentation-attack database. In: International conference on biometrics special interests group (BIOSIG)","DOI":"10.1109\/BIOSIG.2016.7736936"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-642-15567-3_37","volume-title":"Computer Vision \u2013 ECCV 2010","author":"Xiaoyang Tan","year":"2010","unstructured":"Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. Springer, Berlin, Heidelberg, pp 504\u2013517. https:\/\/doi.org\/10.1007\/978-3-642-15567-3_37"},{"issue":"4","key":"14_CR9","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen D, Han H, Jain A (2015) Face spoof detection with image distortion analysis. Trans Inf Forensics Secur 10(4):746\u2013761","journal-title":"Trans Inf Forensics Secur"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: International conference on biometrics (ICB), pp 26\u201331","DOI":"10.1109\/ICB.2012.6199754"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Akhtar Z, Benlamoudi A, Samai D, Bekhouche S, Ouafi A, Dornaika F, Taleb-Ahmed A, Qin L, Peng F, Zhang L, Long M, Bhilare S, Kanhangad V, Costa-Pazo A, Vazquez-Fernandez E, Perez-Cabo D, Moreira-Perez JJ, Gonzalez-Jimenez D, Mohammadi A, Bhattacharjee S, Marcel S, Volkova S, Tang Y, Abe N, Li L, Feng X, Xia Z, Jiang X, Liu S, Shao 0R, Yuen PC, Almeida WR, Andalo F, Padilha R, Bertocco G, Dias W, Wainer J, Torres R, Rocha A, Angeloni MA, Folego G, Godoy A, Hadid A (2017) A competition on generalized software-based face presentation attack detection in mobile scenarios. In: IEEE international joint conference on biometrics (IJCB)","DOI":"10.1109\/BTAS.2017.8272758"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Chakka M, Anjos A, Marcel S, Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Roli F, Yan J, Yi D, Lei Z, Zhang Z, Li S, Schwartz W, Rocha A, Pedrini H, Lorenzo-Navarro J, Castrillon-Santana M, M\u00e4\u00e4tt\u00e4 J, Hadid A, Pietik\u00e4inen M (2011) Competition on counter measures to 2-D facial spoofing attacks. In: International joint conference on biometrics (IJCB)","DOI":"10.1109\/IJCB.2011.6117509"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Chingovska I, Yang J, Lei Z, Yi D, Li SZ, K\u00e4hm O, Glaser C, Damer N, Kuijper A, Nouak A, Komulainen J, Pereira T, Gupta S, Khandelwal S, Bansal S, Rai A, Krishna T, Goyal D, Waris MA, Zhang H, Ahmad I, Kiranyaz S, Gabbouj M, Tronci R, Pili M, Sirena N, Roli F, Galbally J, Fierrez J, Pinto A, Pedrini H, Schwartz WS, Rocha A, Anjos A, Marcel S (2013) The 2nd competition on counter measures to 2D face spoofing attacks. In: International conference on biometrics (ICB)","DOI":"10.1109\/ICB.2013.6613026"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Erdogmus N, Marcel S (2013) Spoofing attacks to 2D face recognition systems with 3D masks. In: IEEE international conference of the biometrics special interest group","DOI":"10.1109\/TIFS.2014.2322255"},{"issue":"3","key":"14_CR15","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1109\/TIP.2015.2395951","volume":"24","author":"R Raghavendra","year":"2015","unstructured":"Raghavendra R, Raja KB, Busch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24(3):1060\u20131075","journal-title":"IEEE Trans Image Process"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Pavlidis I, Symosek P (2000) The imaging issue in an automatic face\/disguise detection system. In: IEEE workshop on computer vision beyond the visible spectrum: methods and applications (CVBVS), pp 15\u201324","DOI":"10.1109\/CVBVS.2000.855246"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Rudd EM, G\u00fcnther M, Boult TE (2016) PARAPH: presentation attack rejection by analyzing polarization hypotheses. In: IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 171 \u2013 178. https:\/\/doi.org\/10.1109\/CVPRW.2016.28","DOI":"10.1109\/CVPRW.2016.28"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Zhang Z, Yi D, Lei Z, Li SZ (2011) Face liveness detection by learning multispectral reflectance distributions. In: International conference on face and gesture, pp 436\u2013441","DOI":"10.1109\/FG.2011.5771438"},{"issue":"3","key":"14_CR19","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1109\/TIFS.2007.902037","volume":"2","author":"K Kollreider","year":"2007","unstructured":"Kollreider K, Fronthaler H, Faraj MI, Bigun J (2007) Real-time face detection and motion analysis with application in liveness assessment. IEEE Trans Inf Forensics Secur 2(3):548\u2013558","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"14_CR20","unstructured":"Ng ES, Chia AYS (2012) Face verification using temporal affective cues. In: International conference on pattern recognition (ICPR), pp 1249\u20131252"},{"key":"14_CR21","unstructured":"Chetty G, Wagner M (2004) Liveness verification in audio-video speaker authentication. In: Australian international conference on speech science and technology, pp 358\u2013363"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Frischholz RW, Werner A (2003) Avoiding replay-attacks in a face recognition system using head-pose estimation. In: IEEE international workshop on analysis and modeling of faces and gestures","DOI":"10.1109\/AMFG.2003.1240849"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"De Marsico M, Nappi M, Riccio D, Dugelay JL (2012) Moving face spoofing detection via 3D projective invariants. In: IAPR international conference on biometrics (ICB)","DOI":"10.1109\/ICB.2012.6199761"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Wang T, Yang J, Lei Z, Liao S, Li SZ (2013) Face liveness detection using 3D structure recovered from a single camera. In: International conference on biometrics (ICB)","DOI":"10.1109\/ICB.2013.6612957"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Li J, Wang Y, Tan T, Jain AK (2004) Live face detection based on the analysis of Fourier spectra. In: Proceedings of biometric technology for human identification, pp 296\u2013303","DOI":"10.1117\/12.541955"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Bai J, Ng TT, Gao X, Shi YQ (2010) Is physics-based liveness detection truly possible with a single image? In: IEEE international symposium on circuits and systems (ISCAS), pp 3425\u20133428","DOI":"10.1109\/ISCAS.2010.5537866"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Kose N, Dugelay JL (2013) Countermeasure for the protection of face recognition systems against mask attacks. In: International conference on automatic face and gesture recognition (FG)","DOI":"10.1109\/FG.2013.6553761"},{"key":"14_CR28","doi-asserted-by":"publisher","unstructured":"M\u00e4\u00e4tt\u00e4 J, Hadid A, Pietik\u00e4inen M (2011) Face spoofing detection from single images using micro-texture analysis. In: Proceedings of international joint conference on biometrics (IJCB). https:\/\/doi.org\/10.1109\/IJCB.2011.6117510","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Yang J, Lei Z, Liao S, Li SZ (2013) Face liveness detection with component dependent descriptor. In: International conference on biometrics (ICB)","DOI":"10.1109\/ICB.2013.6612955"},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/j.jvcir.2016.03.019","volume":"38","author":"L Feng","year":"2016","unstructured":"Feng L, Po LM, Li Y, Xu X, Yuan F, Cheung TCH, Cheung KW (2016) Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J Vis Commun Image Represent 38:451\u2013460","journal-title":"J Vis Commun Image Represent"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Galbally J, Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: IAPR\/IEEE international conference on pattern recognition (ICPR), pp 1173\u20131178","DOI":"10.1109\/ICPR.2014.211"},{"issue":"2","key":"14_CR32","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"Javier Galbally","year":"2014","unstructured":"Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710\u2013724","journal-title":"IEEE Transactions on Image Processing"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Bharadwaj S, Dhamecha TI, Vatsa M, Richa S (2013) Computationally efficient face spoofing detection with motion magnification. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","DOI":"10.1109\/CVPRW.2013.23"},{"key":"14_CR34","volume-title":"Recent Advances in Face Recognition","author":"Gang Pan","year":"2008","unstructured":"Pan G, Wu Z, Sun L (2008) Liveness detection for face recognition. In: Proceedings of recent advances in face recognition, pp 109\u2013124. In-Teh"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Siddiqui T, Bharadwaj S, Dhamecha T, Agarwal A, Vatsa M, Singh R, Ratha N (2016) Face anti-spoofing with multifeature videolet aggregation. In: International conference on pattern recognition (ICPR)","DOI":"10.1109\/ICPR.2016.7899772"},{"issue":"4","key":"14_CR36","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TIFS.2015.2406533","volume":"10","author":"S Tirunagari","year":"2015","unstructured":"Tirunagari S, Poh N, Windridge D, Iorliam A, Suki N, Ho ATS (2015) Detection of face spoofing using visual dynamics. IEEE Trans Inf Forensics Secur 10(4):762\u2013777","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"14_CR37","unstructured":"Li X, Komulainen J, Zhao G, Yuen PC, Pietik\u00e4inen M (2016) Generalized face anti-spoofing by detecting pulse from face videos. In: International conference on pattern recognition (ICPR)"},{"key":"14_CR38","doi-asserted-by":"crossref","unstructured":"Liu S, Yuen PC, Zhang S, Zhao G (2016) 3D mask face anti-spoofing with remote photoplethysmography. In: European conference on computer vision (ECCV). Springer International Publishing, pp 85\u2013100","DOI":"10.1007\/978-3-319-46478-7_6"},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"de\u00a0Freitas\u00a0Pereira T, Anjos A, De\u00a0Martino J, Marcel S (2013) Can face anti-spoofing countermeasures work in a real world scenario? In: International conference on biometrics (ICB)","DOI":"10.1109\/ICB.2013.6612981"},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: IEEE international conference on image processing (ICIP)","DOI":"10.1109\/ICIP.2015.7351280"},{"issue":"2","key":"14_CR41","first-page":"141","volume":"24","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2016) Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Sig Process Lett 24(2):141\u2013145","journal-title":"IEEE Sig Process Lett"},{"issue":"8","key":"14_CR42","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2016) Face spoofing detection using colour texture analysis. IEEE Trans Inf Forensics Secur 11(8):1818\u20131830","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2018) On the generalization of color texture-based face anti-spoofing. Image Vis Comput","DOI":"10.1016\/j.imavis.2018.04.007"},{"key":"14_CR44","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-3-319-46654-5_67","volume-title":"Biometric Recognition","author":"Keyurkumar Patel","year":"2016","unstructured":"Patel K, Han H, Jain AK (2016) Cross-database face antispoofing with robust feature representation. In: Chinese conference on biometric recognition (CCBR), pp 611\u2013619"},{"issue":"12","key":"14_CR45","doi-asserted-by":"publisher","first-page":"4726","DOI":"10.1109\/TIP.2015.2466088","volume":"24","author":"A Pinto","year":"2015","unstructured":"Pinto A, Pedrini H, Robson Schwartz W, Rocha A (2015) Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans Image Process 24(12):4726\u20134740","journal-title":"IEEE Trans Image Process"},{"key":"14_CR46","unstructured":"Yang J, Lei Z, Li SZ (2014) Learn convolutional neural network for face anti-spoofing. CoRR. http:\/\/arxiv.org\/abs\/1408.5601"},{"key":"14_CR47","doi-asserted-by":"crossref","unstructured":"Manjani I, Tariyal S, Vatsa M, Singh R, Majumdar A (2017) Detecting silicone mask based presentation attack via deep dictionary learning. IEEE Trans Inf Forensics Secur","DOI":"10.1109\/TIFS.2017.2676720"},{"key":"14_CR48","doi-asserted-by":"crossref","unstructured":"Anjos A, Marcel S (2011) Counter-measures to photo attacks in face recognition: a public database and a baseline. In: Proceedings of IAPR IEEE international joint conference on biometrics (IJCB)","DOI":"10.1109\/IJCB.2011.6117503"},{"issue":"7","key":"14_CR49","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala T, Pietik\u00e4inen M, M\u00e4enpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971\u2013987","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"14_CR50","doi-asserted-by":"crossref","unstructured":"Korshunov P, Marcel S, Muckenhirn H, Gon\u00e7alves AR, Mello AGS, Violato RPV, Simoes FO, Neto MU, de\u00a0Assis\u00a0Angeloni M, Stuchi JA, Dinkel H, Chen N, Qian Y, Paul D, Saha G, Sahidullah M (2016) Overview of BTAS 2016 speaker anti-spoofing competition. In: IEEE international conference on biometrics theory, applications and systems (BTAS)","DOI":"10.1109\/BTAS.2016.7791200"},{"key":"14_CR51","doi-asserted-by":"crossref","unstructured":"Yambay D, Becker B, Kohli N, Yadav D, Czajka A, Bowyer KW, Schuckers S, Singh R, Vatsa M, Noore A, Gragnaniello D, Sansone C, Verdoliva L, He L, Ru Y, Li H, Liu N, Sun Z, Tan T (2017) LivDet-Iris 2017\u2014iris liveness detection competition 2017. In: IEEE international joint conference on biometrics (IJCB)","DOI":"10.1109\/BTAS.2017.8272763"},{"key":"14_CR52","doi-asserted-by":"crossref","unstructured":"Yambay D, Doyle JS, Bowyer KW, Czajka A, Schuckers S (2014) LivDet-iris 2013\u2014iris liveness detection competition 2013. In: IEEE international joint conference on biometrics (IJCB), pp 1\u20138","DOI":"10.1109\/BTAS.2014.6996283"},{"key":"14_CR53","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/ACCESS.2014.2381273","volume":"2","author":"J Galbally","year":"2014","unstructured":"Galbally J, Marcel S, Fi\u00e9rrez J (2014) Biometric antispoofing methods: a survey in face recognition. IEEE Access 2:1530\u20131552","journal-title":"IEEE Access"},{"key":"14_CR54","doi-asserted-by":"crossref","unstructured":"Chingovska I, Anjos A, Marcel S (2013) Anti-spoofing in action: joint operation with a verification system. In: IEEE conference on computer vision and pattern recognition workshops (CVPRW), pp 98\u2013104","DOI":"10.1109\/CVPRW.2013.22"},{"key":"14_CR55","doi-asserted-by":"crossref","unstructured":"Rattani A, Poh N, Ross A (2013) A bayesian approach for modeling sensor influence on quality, liveness and match score values in fingerprint verification. In: IEEE international workshop on information forensics and security (WIFS), pp 37\u201342","DOI":"10.1109\/WIFS.2013.6707791"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Biometric Anti-Spoofing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92627-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T08:43:42Z","timestamp":1662713022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92627-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783319926261","9783319926278"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92627-8_14","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"value":"2191-6586","type":"print"},{"value":"2191-6594","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}