{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:18Z","timestamp":1773655878474,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540767879","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76788-6_14","type":"book-chapter","created":{"date-parts":[[2007,11,12]],"date-time":"2007-11-12T14:24:16Z","timestamp":1194877456000},"page":"168-179","source":"Crossref","is-referenced-by-count":25,"title":["Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum"],"prefix":"10.1007","author":[{"given":"Changlong","family":"Jin","sequence":"first","affiliation":[]},{"given":"Hakil","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Elliott","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Uludag, U., Jain, A.K.: Attacks on Biometric Systems: A Case Study in Fingerprints. In: Proc. SPIE-EI 2004, January 18-22, 2004, San Jose, CA, pp. 622\u2013633 (2004)","DOI":"10.1117\/12.530907"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial Gummy Fingers on Fingerprint Systems. In: Proceedings of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol.\u00a04677 (2002)","DOI":"10.1117\/12.462719"},{"key":"14_CR3","unstructured":"Drahansk\u00fd, M., N\u00f6tzel, R., Funk, W.: Liveness Detection based on Fine Movements of the Fingertip Surface. In: 2006 IEEE Information Assurance Workshop, June 21-23, 2006, pp. 42\u201347 (2006)"},{"key":"14_CR4","first-page":"289","volume-title":"Proceedings of IFIP TC8\/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications","author":"T. Putte van der","year":"2000","unstructured":"van der Putte, T., Keuning, J.: Biometrical fingerprint recognition: don\u2019t get your fingers burned. In: Proceedings of IFIP TC8\/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, pp. 289\u2013303. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Baldisserra, D., Franco, A., Maio, D., Maltoni, D.: Fake Fingerprint Detection by Odor Analysis. In: ICBA 2006. Proceedings International Conference on Biometric Authentication, Hong Kong (January 2006)","DOI":"10.1007\/11608288_36"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Derakhshani, R., Schuckers, S.A.C., Hornak, L.A., O\u2019Gorman, L.: Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recognition\u00a036, 383\u2013396","DOI":"10.1016\/S0031-3203(02)00038-9"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Parthasaradhi, S.T.V., Derakhshani, R., Hornak, L.A., Schuckers, S.A.C.: Time-Series Detection of Perspiration as a Liveness Test in fingerprint Devices. IEEE Trans. on Systems, Man, and Cybernetics - Part C\u00a035(3) (August 2005)","DOI":"10.1109\/TSMCC.2005.848192"},{"key":"14_CR8","unstructured":"Tan, B., Schuckers, S.: Liveness Detection using an Intensity Based Approach in Fingerprint Scanners. In: Proceedings of Biometrics Symposium, Arlington, VA (September 2005)"},{"key":"14_CR9","unstructured":"Tan, B., Schuckers, S.: Liveness Detection for Fingerprint Scanners Based on the Statistics of Wavelet Signal Processing. In: Computer Vision and Pattern Recognition Workshop, 17-22 June 2006, p. 26 (2006)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Abhyankar, A., Schuckers, S.: Empirical Mode Decomposition Liveness Check in Fingerprint Time Series Captures. In: Computer Vision and Pattern Recognition Workshop, 17-22 June 2006, p. 28 (2006)","DOI":"10.1109\/CVPRW.2006.70"},{"issue":"3","key":"14_CR11","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1109\/TIFS.2006.879289","volume":"1","author":"A. Antonelli","year":"2006","unstructured":"Antonelli, A., Cappelli, R., Maio, D., Maltoni, D.: Fake Finger Detection by Skin Distortion Analysis. IEEE Transactions on Information Forensics and Security\u00a01(3), 360\u2013373 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"14_CR12","unstructured":"Chen, Y., Jain, A., Dass, S.: Fingerprint Deformation for Spoof Detection. In: Proceedings of Biometrics Symposium, Arlington, VA, pp. 27\u201328 (September 2005)"},{"issue":"20","key":"14_CR13","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1049\/el:20052577","volume":"41","author":"Y.S. Moon","year":"2005","unstructured":"Moon, Y.S., Chen, J.S., Chan, K.C., So, K., Woo, K.C.: Wavelet based fingerprint liveness detection. Electronics Letters\u00a041(20), 1112\u20131113 (2005)","journal-title":"Electronics Letters"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Zhan, X., Yin, Y., Sun, Z., Chen, Y.: A method based on continuous spectrum analysis and artificial immune network optimization algorithm for fingerprint image ridge distance estimation. In: Computer and Information Technology, 2005. The Fifth International Conference on, 21-23 September 2005, pp. 728\u2013733 (2005)","DOI":"10.1109\/CIT.2005.17"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Daugman, J.: How Iris Recognition Works. In: Proceedings of 2002 International Conference on Image Processing, vol.\u00a01 (2002)","DOI":"10.1109\/ICIP.2002.1037952"},{"issue":"1","key":"14_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0031-3203(99)00040-0","volume":"33","author":"Z..M. Kov\u00e1cs-Vajna","year":"2000","unstructured":"Kov\u00e1cs-Vajna, Z.M., Rovatti, R., Frazzoni, M.: Fingerprint ridge distance computation methodologies. Pattern Recognition\u00a033(1), 69\u201380 (2000)","journal-title":"Pattern Recognition"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76788-6_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T06:59:56Z","timestamp":1737529196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76788-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540767879"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76788-6_14","relation":{},"subject":[]}}