{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:38:46Z","timestamp":1726004326998},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319926261"},{"type":"electronic","value":"9783319926278"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-92627-8_7","type":"book-chapter","created":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T13:02:36Z","timestamp":1546347756000},"page":"151-168","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Application of Dynamic Features of the Pupil for Iris Presentation Attack Detection"],"prefix":"10.1007","author":[{"given":"Adam","family":"Czajka","sequence":"first","affiliation":[]},{"given":"Benedict","family":"Becker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"key":"7_CR1","unstructured":"ISO\/IEC: Information technology \u2013 Biometric presentation attack detection \u2013 Part 1: Framework, 30107\u20133 (2016)"},{"issue":"2","key":"7_CR2","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2014","unstructured":"Galbally J, Marcel S, Fierrez J (2014) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process (TIP) 23(2):710\u2013724. \nhttps:\/\/doi.org\/10.1109\/TIP.2013.2292332","journal-title":"IEEE Trans Image Process (TIP)"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Wei Z, Qiu X, Sun Z, Tan T (2008) Counterfeit iris detection based on texture analysis. In: International conference on pattern recognition, pp 1\u20134. \nhttps:\/\/doi.org\/10.1109\/ICPR.2008.4761673","DOI":"10.1109\/ICPR.2008.4761673"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Doyle JS, Bowyer KW, Flynn PJ (2013) Variation in accuracy of textured contact lens detection based on sensor and lens pattern. In: IEEE international conference on biometrics: theory applications and systems (BTAS), pp 1\u20137. \nhttps:\/\/doi.org\/10.1109\/BTAS.2013.6712745","DOI":"10.1109\/BTAS.2013.6712745"},{"issue":"7","key":"7_CR5","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell (TPAMI) 24(7):971\u2013987. \nhttps:\/\/doi.org\/10.1109\/TPAMI.2002.1017623","journal-title":"IEEE Trans Pattern Anal Mach Intell (TPAMI)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-540-69905-7_27","volume-title":"Lecture Notes in Computer Science","author":"Ville Ojansivu","year":"2008","unstructured":"Ojansivu V, Heikkil\u00e4 J (2008) Blur insensitive texture classification using local phase quantization. Springer, Berlin, pp 236\u2013243. \nhttps:\/\/doi.org\/10.1007\/978-3-540-69905-7_27"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Zhang L, Zhou Z, Li H (2012) Binary Gabor pattern: an efficient and robust descriptor for texture classification. In: IEEE international conference on image processing (ICIP), pp 81\u201384. \nhttps:\/\/doi.org\/10.1109\/ICIP.2012.6466800","DOI":"10.1109\/ICIP.2012.6466800"},{"issue":"6","key":"7_CR8","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/TPAMI.2013.234","volume":"36","author":"Z Sun","year":"2014","unstructured":"Sun Z, Zhang H, Tan T, Wang J (2014) Iris image classification based on hierarchical visual codebook. IEEE Trans Pattern Anal Mach Intell (TPAMI) 36(6):1120\u20131133. \nhttps:\/\/doi.org\/10.1109\/TPAMI.2013.234","journal-title":"IEEE Trans Pattern Anal Mach Intell (TPAMI)"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: IEEE international conference on computer vision and pattern recognition (CVPR), vol 1, pp 886\u2013893. \nhttps:\/\/doi.org\/10.1109\/CVPR.2005.177","DOI":"10.1109\/CVPR.2005.177"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"1672","DOI":"10.1109\/ACCESS.2015.2477470","volume":"3","author":"JS Doyle","year":"2015","unstructured":"Doyle JS, Bowyer KW (2015) Robust detection of textured contact lenses in iris recognition using BSIF. IEEE Access 3:1672\u20131683. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2015.2477470","journal-title":"IEEE Access"},{"issue":"4","key":"7_CR11","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TIFS.2015.2400393","volume":"10","author":"R Raghavendra","year":"2015","unstructured":"Raghavendra R, Busch C (2015) Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Trans Inf Forensics Secur (TIFS) 10(4):703\u2013715. \nhttps:\/\/doi.org\/10.1109\/TIFS.2015.2400393","journal-title":"IEEE Trans Inf Forensics Secur (TIFS)"},{"issue":"4","key":"7_CR12","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","volume":"10","author":"D Menotti","year":"2015","unstructured":"Menotti D, Chiachia G, Pinto A, Schwartz W, Pedrini H, Falcao A, Rocha A (2015) Deep representations for iris, face, and fingerprint spoofing detection. IEEE Trans Inf Forensics Secur (TIFS) 10(4):864\u2013879. \nhttps:\/\/doi.org\/10.1109\/TIFS.2015.2398817","journal-title":"IEEE Trans Inf Forensics Secur (TIFS)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Yambay D, Becker B, Kohli N, Yadav D, Czajka A, Bowyer KW, Schuckers S, Singh R, Vatsa M, Noore A, Gragnaniello D, Sansone C, Verdoliva L, He L, Ru Y, Li H, Liu N, Sun Z, Tan T (2017) LivDet iris 2017 \u2013 iris liveness detection competition 2017. In: IEEE international joint conference on biometrics (IJCB), pp 1\u20136","DOI":"10.1109\/BTAS.2017.8272763"},{"issue":"10","key":"7_CR14","doi-asserted-by":"publisher","first-page":"2048","DOI":"10.1109\/TIFS.2015.2440188","volume":"10","author":"K Raja","year":"2015","unstructured":"Raja K, Raghavendra R, Busch C (2015) Video presentation attack detection in visible spectrum iris recognition using magnified phase information. IEEE Trans Inf Forensics Secur (TIFS) 10(10):2048\u20132056. \nhttps:\/\/doi.org\/10.1109\/TIFS.2015.2440188","journal-title":"IEEE Trans Inf Forensics Secur (TIFS)"},{"issue":"4","key":"7_CR15","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/TIFS.2015.2405345","volume":"10","author":"OV Komogortsev","year":"2015","unstructured":"Komogortsev OV, Karpov A, Holland CD (2015) Attack of mechanical replicas: liveness detection with eye movements. IEEE Trans Inf Forensics Secur (TIFS) 10(4):716\u2013725. \nhttps:\/\/doi.org\/10.1109\/TIFS.2015.2405345","journal-title":"IEEE Trans Inf Forensics Secur (TIFS)"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Pacut A, Czajka A (2006) Aliveness detection for iris biometrics. In: IEEE international Carnahan conferences security technology (ICCST), pp 122\u2013129. \nhttps:\/\/doi.org\/10.1109\/CCST.2006.313440","DOI":"10.1109\/CCST.2006.313440"},{"key":"7_CR17","unstructured":"Czajka A, Pacut A, Chochowski M (2011) Method of eye aliveness testing and device for eye aliveness testing, United States Patent, US 8,061,842"},{"issue":"4","key":"7_CR18","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TIFS.2015.2398815","volume":"10","author":"A Czajka","year":"2015","unstructured":"Czajka A (2015) Pupil dynamics for iris liveness detection. IEEE Trans Inf Forensics Secur (TIFS) 10(4):726\u2013735. \nhttps:\/\/doi.org\/10.1109\/TIFS.2015.2398815","journal-title":"IEEE Trans Inf Forensics Secur (TIFS)"},{"issue":"4","key":"7_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3232849","volume":"51","author":"Adam Czajka","year":"2018","unstructured":"Czajka A, Bowyer KW (2018) Presentation attack detection for iris recognition: an assessment of the state of the art. ACM Comput Surv (CSUR) 1(1):1\u201335. \nhttps:\/\/doi.org\/10.1145\/3232849\n\n, \narXiv:1804.00194","journal-title":"ACM Computing Surveys"},{"key":"7_CR20","unstructured":"Sutra G, Dorizzi B, Garcia-Salitcetti S, Othman N (2017) A biometric reference system for iris. OSIRIS version 4.1. \nhttp:\/\/svnext.it-sudparis.eu\/svnview2-eph\/ref_syst\/iris_osiris_v4.1\/\n\n. Accessed 1 Aug 2017"},{"issue":"2 Rein Control,","key":"7_CR21","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1111\/j.1749-6632.1969.tb14024.x","volume":"156","author":"Michael Kohn","year":"1969","unstructured":"Kohn M, Clynes M (1969) Color dynamics of the pupil. Ann N Y Acad Sci 156(2):931\u2013950. Available online at Wiley Online Library (2006)","journal-title":"Annals of the New York Academy of Sciences"},{"issue":"2","key":"7_CR22","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/72.279181","volume":"5","author":"Y Bengio","year":"1994","unstructured":"Bengio Y, Simard P, Frasconi P (1994) Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Netw 5(2):157\u2013166. \nhttps:\/\/doi.org\/10.1109\/72.279181","journal-title":"IEEE Trans Neural Netw"},{"issue":"8","key":"7_CR23","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780. \nhttps:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Gers FA, Schmidhuber J (2000) Recurrent nets that time and count. In: International joint conference on neural network (IJCNN), vol 3, pp 189\u2013194. \nhttps:\/\/doi.org\/10.1109\/IJCNN.2000.861302","DOI":"10.1109\/IJCNN.2000.861302"},{"issue":"10","key":"7_CR25","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"Klaus Greff","year":"2017","unstructured":"Greff K, Srivastava RK, Koutnk J, Steunebrink BR, Schmidhuber J (2016) LSTM: a search space Odyssey. IEEE Trans Neural Netw Learn Syst (99):1\u201311. \nhttps:\/\/doi.org\/10.1109\/TNNLS.2016.2582924","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Cho K, van Merri\u00ebnboer B, Bahdanau D, Bengio Y (2014) On the properties of neural machine translation: encoder\u2013decoder approaches. In: Workshop on syntax, semantics and structure in statistical translation (SSST), pp 1\u20136","DOI":"10.3115\/v1\/W14-4012"},{"key":"7_CR27","unstructured":"Hinton G, Srivastava N, Swersky K (2017) Neural networks for machine learning. Lecture 6a: overview of mini-batch gradient descent. \nhttp:\/\/www.cs.toronto.edu\/~tijmen\/csc321\n\n. Accessed 28 April 2017"},{"key":"7_CR28","unstructured":"Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: Teh YW, Titterington M (eds) International conference on artificial intelligence and statistics (AISTATS), Proceedings of machine learning research, vol\u00a09. PMLR, Chia Laguna Resort, Sardinia, Italy, pp 249\u2013256"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Biometric Anti-Spoofing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92627-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T13:07:22Z","timestamp":1546348042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92627-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783319926261","9783319926278"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92627-8_7","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"type":"print","value":"2191-6586"},{"type":"electronic","value":"2191-6594"}],"subject":[],"published":{"date-parts":[[2019]]}}}