{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:32:10Z","timestamp":1773408730541,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642227134","type":"print"},{"value":"9783642227141","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_62","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T12:01:51Z","timestamp":1311595311000},"page":"604-611","source":"Crossref","is-referenced-by-count":9,"title":["Security Analysis of Multimodal Biometric Systems against Spoof Attacks"],"prefix":"10.1007","author":[{"given":"Zahid","family":"Akhtar","sequence":"first","affiliation":[]},{"given":"Sandeep","family":"Kale","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial \u201dgummy\u201d fingers on fingerprint systems. In: Proc. of SPIE Optical Security and Counterfeit Deterrence Techniques IV, vol.\u00a04677, pp. 275\u2013289 (2002)","DOI":"10.1117\/12.462719"},{"key":"62_CR2","doi-asserted-by":"crossref","unstructured":"He, X., Lu, Y., Shi, P.: A Fake Iris Detection Method Based on FFT and Quality Assessment. In: Proc. Chinese Conf. on Pattern Recognition, pp. 316\u2013319 (2008)","DOI":"10.1109\/CCPR.2008.68"},{"key":"62_CR3","volume-title":"Handbook of Multibiometrics","author":"A. Ross","year":"2006","unstructured":"Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer, Heidelberg (2006)"},{"key":"62_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.jvlc.2009.01.010","volume":"20","author":"R.N. Rodrigues","year":"2009","unstructured":"Rodrigues, R.N., Ling, L.L., Govindaraju, V.: Robustness of multimodal biometric methods against spoof attacks. J. of Visual Languages and Computing\u00a020, 169\u2013179 (2009)","journal-title":"J. of Visual Languages and Computing"},{"key":"62_CR5","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. on Adv. in Sig. Proc., 1\u201317 (2008)","DOI":"10.1155\/2008\/579416"},{"key":"62_CR6","doi-asserted-by":"crossref","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Proceedings of third AVBPA, pp. 223\u2013228 (2001)","DOI":"10.1007\/3-540-45344-X_32"},{"key":"62_CR7","unstructured":"Libor Spacek: University of Essex Face Database, http:\/\/dces.essex.ac.uk\/mv\/allfaces\/index.html"},{"key":"62_CR8","unstructured":"PolyU HRF Database, http:\/\/www.comp.polyu.edu.hk\/~biometrics\/HRF\/HRF.htm"},{"key":"62_CR9","unstructured":"IIT Delhi Iris Database version 1.0, http:\/\/web.iitd.ac.in\/~biometrics\/Database_Iris.htm"},{"issue":"1","key":"62_CR10","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.patcog.2009.04.026","volume":"43","author":"D. Zhang","year":"2010","unstructured":"Zhang, D., Kanhangad, V., Luo, N., Kumar, A.: Robust Palmprint Verification Using 2D and 3D Features. Pattern Recognition\u00a043(1), 358\u2013368 (2010)","journal-title":"Pattern Recognition"},{"key":"62_CR11","volume-title":"Face Recognition using Principal Component Analysis. Department of Computer Science","author":"K. Kim","year":"2000","unstructured":"Kim, K.: Face Recognition using Principal Component Analysis. Department of Computer Science. University of Maryland, College Park (2000)"},{"issue":"1","key":"62_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J.G. Daugman","year":"2004","unstructured":"Daugman, J.G.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol.\u00a014(1), 21\u201330 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"62_CR13","volume-title":"Handbook of Fingerprint Recognition","author":"D. Maltoni","year":"2003","unstructured":"Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)"},{"key":"62_CR14","doi-asserted-by":"crossref","unstructured":"Suen, C.Y., Lam, L.: Multiple Classifier Combination Methodologies for Different Output Levels. In: Proc. Int. Workshop on Multiple Classifier Systems, pp. 52\u201366 (2000)","DOI":"10.1007\/3-540-45014-9_5"},{"key":"62_CR15","volume-title":"Pattern Classification","author":"R. Duda","year":"2001","unstructured":"Duda, R., Hart, P., Stork, D.: Pattern Classification. John Wiley Inc., Chichester (2001)"},{"issue":"11-13","key":"62_CR16","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1016\/S0167-8655(99)00108-7","volume":"20","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Prabhakar, S., Chen, S.: Combining Multiple Matchers for a High Security Fingerprint Verification System. Pattern Recognition Letters\u00a020(11-13), 1371\u20131379 (1999)","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"62_CR17","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1109\/TPAMI.2007.70796","volume":"30","author":"K. Nandakumar","year":"2008","unstructured":"Nandakumar, K., Chen, Y., Dass, S.C., Jain, A.K.: Likelihood Ratio Based Biometric Score Fusion. IEEE Trans. on PAMI\u00a030(2), 342\u2013347 (2008)","journal-title":"IEEE Trans. on PAMI"},{"key":"62_CR18","volume-title":"Neural Networks for Pattern Recognition","author":"C. Bishop","year":"1999","unstructured":"Bishop, C.: Neural Networks for Pattern Recognition. Oxford University Press, Oxford (1999)"},{"key":"62_CR19","doi-asserted-by":"crossref","unstructured":"Poh, N., Bengio, S.: Why Do Multi-Stream, Multi-Band and Multi-Modal Approaches Work on Biometric User Authentication Tasks? In: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp. 893\u2013896 (2004)","DOI":"10.1109\/ICASSP.2004.1327255"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T05:15:17Z","timestamp":1560402917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_62","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}