{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T05:34:33Z","timestamp":1776490473882,"version":"3.51.2"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319926261","type":"print"},{"value":"9783319926278","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-92627-8_20","type":"book-chapter","created":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T08:02:36Z","timestamp":1546329756000},"page":"457-480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Evaluation Methodologies for Biometric Presentation Attack Detection"],"prefix":"10.1007","author":[{"given":"Ivana","family":"Chingovska","sequence":"first","affiliation":[]},{"given":"Amir","family":"Mohammadi","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Anjos","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Marcel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"key":"20_CR1","unstructured":"Information technology \u2013 Biometric presentation attack detection \u2013 Part 3: Testing and reporting. Standard, International Organization for Standardization, Geneva, CH (2017). https:\/\/www.iso.org\/standard\/67381.html"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Rodrigues RN, Ling LL, Govindaraju V (2009) Robustness of multimodal biometric fusion methods against spoofing attacks. J Vis Lang Comput 20(3):169\u2013179","DOI":"10.1016\/j.jvlc.2009.01.010"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Johnson PA, Tan B, Schuckers S (2010) Multimodal fusion vulnerability to non-zero (spoof) imposters. In: IEEE international workshop on information forensics and security","DOI":"10.1109\/WIFS.2010.5711469"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Akhtar Z, Fumera G, Marcialis GL, Roli F. Robustness evaluation of biometric systems under spoof attacks. In: 16th international conference on image analysis and processing, pp 159\u2013168","DOI":"10.1007\/978-3-642-24085-0_17"},{"key":"20_CR5","unstructured":"Akhtar Z, Fumera G, Marcialis GL, Roli F. Robustness analysis of likelihood ration score fusion rule for multi-modal biometric systems under spoof attacks. In: 45th IEEE international carnahan conference on security technology, pp 237\u2013244"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Akhtar Z, Fumera G, Marcialis GL, Roli F (2012) Evaluation of serial and parallel multibiometric systems under spoofing attacks. In: 5th IEEE international conference on biometrics: theory, applications and systems","DOI":"10.1109\/BTAS.2012.6374590"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Villalba J, Lleida E (2011) Preventing replay attacks on speaker verification systems. In: 2011 IEEE international carnahan conference on security technology (ICCST), pp 1\u20138","DOI":"10.1109\/CCST.2011.6095943"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-21557-5_33","volume-title":"Multiple Classifier Systems","author":"Emanuela Marasco","year":"2011","unstructured":"Marasco E, Johnson P, Sansone C, Schuckers S (2011) Increase the security of multibiometric systems by incorporating a spoofing detection algorithm in the fusion mechanism. In: Proceedings of the 10th international conference on Multiple classifier systems, pp 309\u2013318"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Marasco E, Ding Y, Ross A (2012) Combining match scores with liveness values in a fingerprint verification system. In: 5th IEEE international conference on biometrics: theory, applications and systems","DOI":"10.1109\/BTAS.2012.6374609"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Chingovska I, Anjos A, Marcel S (2013) Anti-spoofing in action: joint operation with a verification system. In: Proceedings of IEEE conference on computer vision and pattern recognition, workshop on biometrics","DOI":"10.1109\/CVPRW.2013.22"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE 11th international conference on computer vision. ICCV 2007, pp 1\u20138","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Bao W, Li H, Li N, Jiang W (2009) A liveness detection method for face recognition based on optical flow field. In: International conference on image analysis and signal processing. IASP 2009, pp. 233\u2013236","DOI":"10.1109\/IASP.2009.5054589"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"yan J, Zhang Z, Lei Z, Yi D, Li SZ (2012) Face liveness detection by exploring multiple scenic clues. In: 12th international conference on control, automation, robotics and vision (ICARCV 2012), China","DOI":"10.1109\/ICARCV.2012.6485156"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-642-15567-3_37","volume-title":"Computer Vision \u2013 ECCV 2010","author":"Xiaoyang Tan","year":"2010","unstructured":"Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Proceedings of the european conference on computer vision (ECCV), LNCS 6316. Springer, Berlin, pp 504\u2013517"},{"issue":"1","key":"20_CR15","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.future.2010.11.024","volume":"28","author":"Javier Galbally","year":"2012","unstructured":"Galbally J, Alonso-Fernandez F, Fierrez J, Ortega-Garcia J (2012) A high performance fingerprint liveness detection method based on quality related features. Future Gener Comput Syst 28(1):311\u2013321","journal-title":"Future Generation Computer Systems"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Yambay D, Ghiani L, Denti P, Marcialis G, Roli F, Schuckers S (2012) LivDet 2011 - fingerprint liveness detection competition 2011. In: 2012 5th IAPR international conference on biometrics (ICB), pp 208\u2013215","DOI":"10.1109\/ICB.2012.6199810"},{"key":"20_CR17","unstructured":"Mansfield AJ, Wayman JL, Dr A, Rayner D, Wayman JL (2002) Best practices in testing and reporting performance"},{"key":"20_CR18","unstructured":"Galbally-Herrero J, Fierrez-Aguilar J, Rodriguez-Gonzalez JD, Alonso-Fernandez F, Ortega-Garcia J, Tapiador M (006) On the vulnerability of fingerprint verification systems to fake fingerprints attacks. In: IEEE international carnahan conference on security technology, pp 169\u2013179"},{"key":"20_CR19","first-page":"181","volume-title":"Lecture Notes in Computer Science","author":"Virginia Ruiz-Albacete","year":"2008","unstructured":"Ruiz-Albacete V, Tome-Gonzalez P, Alonso-Fernandez F, Galbally J, Fierrez J, Ortega-Garcia J (2008) Direct attacks using fake images in iris verification. In: Proceedings of the COST 2101 workshop on biometrics and identity management, BIOID, Springer, Berlin, pp 181\u2013190"},{"issue":"3-4","key":"20_CR20","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11235-010-9316-0","volume":"47","author":"J. Galbally","year":"2010","unstructured":"Galbally J, Fierrez J, Alonso-Fernandez F, Martinez-Diaz M (2011) Evaluation of direct attacks to fingerprint verification systems. Telecommun Syst, Spec Issue Biom 47(3):243\u2013254","journal-title":"Telecommunication Systems"},{"key":"20_CR21","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-0-387-21606-5_8","volume-title":"The Elements of Statistical Learning","author":"Trevor Hastie","year":"2001","unstructured":"Hastie T, Tibshirani R, Friedman JH (2001) The elements of statistical learning: data mining, inference, and prediction: with 200 full-color illustrations. Springer, New York"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Lui YM, Bolme D, Phillips P, Beveridge J, Draper B (2012) Preliminary studies on the good, the bad, and the ugly face recognition challenge problem. In: 2012 IEEE computer society conference on computer vision and pattern recognition workshops (CVPRW), pp 9\u201316","DOI":"10.1109\/CVPRW.2012.6239209"},{"key":"20_CR23","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-642-04146-4_4","volume-title":"Image Analysis and Processing \u2013 ICIAP 2009","author":"Gian Luca Marcialis","year":"2009","unstructured":"Marcialis GL, Lewicke A, Tan B, Coli P, Grimberg D, Congiu A, Tidu A, Roli F, Schuckers S (2009) First international fingerprint liveness detection competition \u2013 livdet 2009. In: Proceedings of the IAPR International Conference on Image Analysis and Processing (ICIAP), LNCS-5716, pp 12\u201323 (2009)"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Ghiani L, Yambay D, Mura V, Tocco S, Marcialis G, Roli F, Schuckers S (2013) Livdet 2013 - fingerprint liveness detection competition. In: IEEE international conference on biometrics (ICB)","DOI":"10.1109\/ICB.2013.6613027"},{"key":"20_CR25","unstructured":"Zhiwei Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: Proceedings of the IAPR international conference on biometrics (ICB), pp 26\u201331"},{"issue":"4","key":"20_CR26","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Sec 10(4):746\u2013761. https:\/\/doi.org\/10.1109\/TIFS.2015.2400395","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) OULU-NPU: A mobile face presentation attack database with real-world variations. In: 2017 12th IEEE international conference on automatic face and gesture recognition (FG 2017), IEEE, pp 612\u2013618","DOI":"10.1109\/FG.2017.77"},{"key":"20_CR28","unstructured":"Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: Proceedings of the IEEE international conference of the biometrics special interest group (BIOSIG), pp 1\u20137"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Costa-Pazo A, Bhattacharjee S, Vazquez-Fernandez E, Marcel S (2016) The REPLAY-MOBILE face presentation-attack database. In: 2016 International conference of the biometrics special interest group (BIOSIG), IEEE, pp 1\u20137. http:\/\/ieeexplore.ieee.org\/abstract\/document\/7736936\/","DOI":"10.1109\/BIOSIG.2016.7736936"},{"issue":"5","key":"20_CR30","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/TIFS.2015.2395139","volume":"10","author":"A Pinto","year":"2015","unstructured":"Pinto A, Schwartz WR, Pedrini H, de Rezende Rocha A (2015) Using visual rhythms for detecting video-based facial spoof attacks. IEEE Trans Inf Forensics Sec 10(5):1025\u20131038","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Peixoto B, Michelassi C, Rocha A (2011) Face liveness detection under bad illumination conditions. In: 2011 18th IEEE international conference on image processing (ICIP), pp 3557\u20133560","DOI":"10.1109\/ICIP.2011.6116484"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Vanoni M, Tome P, El Shafey L, Marcel S (2014) Cross-database evaluation with an open finger vein sensor. In: IEEE workshop on biometric measurements and systems for security and medical applications (BioMS). http:\/\/publications.idiap.ch\/index.php\/publications\/show\/2928","DOI":"10.1109\/BIOMS.2014.6951532"},{"key":"20_CR33","unstructured":"Tome P, Vanoni M, Marcel S (2014) On the vulnerability of finger vein recognition to spoofing. In: IEEE international conference of the biometrics special interest group (BIOSIG). http:\/\/publications.idiap.ch\/index.php\/publications\/show\/2910"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Tome P, Raghavendra R, Busch C, Tirunagari S, Poh N, Shekar BH, Gragnaniello D, Sansone C, Verdoliva L, Marcel S (2015) The 1st competition on counter measures to finger vein spoofing attacks. In: The 8th IAPR international conference on biometrics (ICB). http:\/\/publications.idiap.ch\/index.php\/publications\/show\/3095","DOI":"10.1109\/ICB.2015.7139067"},{"key":"20_CR35","doi-asserted-by":"crossref","unstructured":"Tome P, Marcel S (2015) On the vulnerability of palm vein recognition to spoofing attacks. In: The 8th IAPR international conference on biometrics (ICB). http:\/\/publications.idiap.ch\/index.php\/publications\/show\/3096","DOI":"10.1109\/ICB.2015.7139056"},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"Kinnunen T, Sahidullah M, Delgado H, Todisco M, Evans N, Yamagishi J, Lee KA (2017) The asvspoof 2017 challenge: assessing the limits of replay spoofing attack detection","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Erg\u00fcnay SK, Khoury E, Lazaridis A, Marcel S (2015) On the vulnerability of speaker verification to realistic voice spoofing. In: IEEE international conference on biometrics: theory, applications and systems (BTAS). https:\/\/publidiap.idiap.ch\/downloads\/\/papers\/2015\/KucurErgunay_IEEEBTAS_2015.pdf","DOI":"10.1109\/BTAS.2015.7358783"},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Korshunov P, Goncalves AR, Violato RP, Simes FO, Marcel S (2018) On the use of convolutional neural networks for speech presentation attack detection. In: International conference on identity, security and behavior analysis","DOI":"10.1109\/ISBA.2018.8311474"},{"key":"20_CR39","doi-asserted-by":"crossref","unstructured":"Poh N, Bengio S (2006) Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication. Pattern Recognition 2006","DOI":"10.1016\/j.patcog.2005.06.011"},{"key":"20_CR40","doi-asserted-by":"crossref","unstructured":"Martin A, Doddington G, Kamm T, Ordowski M (1997) The det curve in assessment of detection task performance. In: Eurospeech, pp 1895\u20131898","DOI":"10.21437\/Eurospeech.1997-504"},{"key":"20_CR41","unstructured":"Bengio S, Keller M, Mari\u00e9thoz J (2003) The expected performance curve. Technical Report Idiap-RR-85-2003, Idiap Research Institute"},{"issue":"6","key":"20_CR42","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/S1007-0214(09)70135-X","volume":"14","author":"Liting Wang","year":"2009","unstructured":"Wang L, Ding X, Fang C (2009) Face live detection method based on physiological motion analysis. Tsinghua Sci Technol 14(6):685\u2013690","journal-title":"Tsinghua Science and Technology"},{"key":"20_CR43","doi-asserted-by":"crossref","unstructured":"Zhang Z, Yi D, Lei Z, Li S (2011) Face liveness detection by learning multispectral reflectance distributions. In: 2011 IEEE international conference on automatic face gesture recognition and workshops (FG 2011), pp 436\u2013441","DOI":"10.1109\/FG.2011.5771438"},{"key":"20_CR44","unstructured":"Johnson P, Lazarick R, Marasco E, Newton E, Ross A, Schuckers S (2012) Biometric liveness detection: Framework and metrics. In: International biometric performance conference"},{"key":"20_CR45","doi-asserted-by":"crossref","unstructured":"Gao X, Tsong Ng T, Qiu B, Chang SF (2010) Single-view recaptured image detection based on physics-based features. In: IEEE international conference on multimedia and expo (ICME). Singapore","DOI":"10.1109\/ICME.2010.5583280"},{"key":"20_CR46","doi-asserted-by":"crossref","unstructured":"Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Ricerche S, Roli F (2011) Fusion of multiple clues for photo-attack detection in face recognition systems. In: Proceedings of the 2011 international joint conference on biometrics, IJCB \u201911, IEEE Computer Society, pp 1\u20136","DOI":"10.1109\/IJCB.2011.6117522"},{"key":"20_CR47","volume-title":"Handbook of Biometrics","year":"2008","unstructured":"Jain AK, Flynn P, Ross AA (eds) (2008) Handbook of biometrics. Springer, Berlin"},{"key":"20_CR48","unstructured":"Adler A, Schuckers S (2009) Encyclopedia of biometrics, chap. security and liveness, overview, Springer, Berlin, pp 1146\u20131152"},{"issue":"8","key":"20_CR49","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1016\/j.patrec.2009.09.032","volume":"31","author":"Javier Galbally","year":"2010","unstructured":"Galbally J, Cappelli R, Lumini A, de Rivera GG, Maltoni D, Fi\u00e9rrez J, Ortega-Garcia J, Maio D (2010) An evaluation of direct attacks using fake fingers generated from iso templates. Pattern Recogn Lett 31(8):725\u2013732","journal-title":"Pattern Recognition Letters"},{"key":"20_CR50","doi-asserted-by":"crossref","unstructured":"Rodrigues R, Kamat N, Govindaraju V (2010) Evaluation of biometric spoofing in a multimodal system. In: 2010 Fourth IEEE international conference on biometrics: theory applications and systems (BTAS)","DOI":"10.1109\/BTAS.2010.5634531"},{"key":"20_CR51","unstructured":"Matsumoto T, Matsumoto H, Yamada K, Hoshino S (2002) Impact of artifical gummy fingers on fingerprint systems. In: SPIE proceedings: optical security and counterfeit deterrence techniques, vol 4677"},{"key":"20_CR52","unstructured":"Patrick P, Aversano G, Blouet R, Charbit M, Chollet G (2005) Voice forgery using alisp: indexation in a client memory. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing, 2005 (ICASSP \u201905), vol 1, pp 17\u201320"},{"key":"20_CR53","unstructured":"Alegre F, Vipperla R, Evans N, Fauve B (2012) On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals. In: 2012 Proceedings of the 20th european signal processing conference (EUSIPCO), pp 36\u201340"},{"key":"20_CR54","doi-asserted-by":"crossref","unstructured":"Bonastre JF, Matrouf D, Fredouille C (2007) Artificial impostor voice transformation effects on false acceptance rates. In: INTERSPEECH, pp 2053\u20132056","DOI":"10.21437\/Interspeech.2007-173"},{"issue":"12","key":"20_CR55","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1109\/TIFS.2014.2349158","volume":"9","author":"Ivana Chingovska","year":"2014","unstructured":"Chingovska I, Rabello dos Anjos A, Marcel S (2014) Biometrics evaluation under spoofing attacks. IEEE Trans Inf Forensics Sec 9(12):2264\u20132276 http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6879440","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Biometric Anti-Spoofing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92627-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T08:44:25Z","timestamp":1662713065000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92627-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783319926261","9783319926278"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92627-8_20","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"value":"2191-6586","type":"print"},{"value":"2191-6594","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}