{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:38:47Z","timestamp":1726004327618},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319926261"},{"type":"electronic","value":"9783319926278"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-92627-8_8","type":"book-chapter","created":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T08:02:36Z","timestamp":1546329756000},"page":"169-183","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Review of Iris Presentation Attack Detection Competitions"],"prefix":"10.1007","author":[{"given":"David","family":"Yambay","sequence":"first","affiliation":[]},{"given":"Adam","family":"Czajka","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Bowyer","sequence":"additional","affiliation":[]},{"given":"Mayank","family":"Vatsa","sequence":"additional","affiliation":[]},{"given":"Richa","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Afzel","family":"Noore","sequence":"additional","affiliation":[]},{"given":"Naman","family":"Kohli","sequence":"additional","affiliation":[]},{"given":"Daksha","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Schuckers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,2]]},"reference":[{"issue":"7","key":"8_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S0969-4765(07)70140-6","volume":"15","author":"R Cappelli","year":"2007","unstructured":"Cappelli R (2007) Fingerprint verification competition 2006. Biom Technol Today 15(7):7\u20139. https:\/\/doi.org\/10.1016\/S0969-4765(07)70140-6","journal-title":"Biom Technol Today"},{"key":"8_CR2","unstructured":"Alonso-Fernandez F, Bigun J (2013) Halmstad university submission to the first ICB competition on iris recognition (icir2013)"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"Yambay D et al (2014) Livdet-iris 2013-iris liveness detection competition 2013. https:\/\/doi.org\/10.1109\/BTAS.2014.6996283","DOI":"10.1109\/BTAS.2014.6996283"},{"key":"8_CR4","unstructured":"Yambay D, Walczak B, Schuckers S, Czajka A (2017) LivDet-iris 2015\u2013Iris liveness detection. In: IEEE international conference on identity, security and behavior analysis (ISBA), pp 1\u20136"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-642-04146-4_4","volume-title":"Image Analysis and Processing \u2013 ICIAP 2009","author":"Gian Luca Marcialis","year":"2009","unstructured":"Marcialis GL et al (2009) First international fingerprint liveness detection competition\u2014LivDet 2009. In: International conference on image analysis and processing. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-04146-4_4"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Yambay D et al (2011) Livdet 2011 - fingerprint liveness detection competition 2011. In: 5th IAPR\/IEEE international conference on biometrics (ICB 2012)","DOI":"10.1109\/ICB.2012.6199810"},{"key":"8_CR7","unstructured":"Marcialis G et al (2013) Livdet 2013 - fingerprint liveness detection competition 2013. In: 6th IAPR\/IEEE international conference on biometrics (ICB2013)"},{"key":"8_CR8","unstructured":"Marcialis G et al (2014) LivDet 2015\u2013fingerprint liveness detection competition 2015. In: 7th IEEE international conference on biometrics: theory, applications and systems (BTAS 2015)"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Chakka MM et al (2011) Competition on counter measures to 2-d facial spoofing attacks. https:\/\/doi.org\/10.1109\/IJCB.2011.6117509","DOI":"10.1109\/IJCB.2011.6117509"},{"key":"8_CR10","unstructured":"JohnsonJohnson (2013). http:\/\/www.acuvue.com\/products-acuvue-2-colours"},{"key":"8_CR11","unstructured":"CibaVision (2013). http:\/\/www.freshlookcontacts.com"},{"key":"8_CR12","unstructured":"Vision C (2013). http:\/\/coopervision.com\/contact-lenses\/expressions-color-contacts"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Biometric Anti-Spoofing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92627-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T05:00:42Z","timestamp":1573621242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92627-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783319926261","9783319926278"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92627-8_8","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"type":"print","value":"2191-6586"},{"type":"electronic","value":"2191-6594"}],"subject":[],"published":{"date-parts":[[2019]]}}}