{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:05:17Z","timestamp":1743120317284,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811961410"},{"type":"electronic","value":"9789811961427"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-6142-7_25","type":"book-chapter","created":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T16:05:36Z","timestamp":1666281936000},"page":"327-340","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Broad Learning with\u00a0Uniform Local Binary Pattern for\u00a0Fingerprint Liveness Detection"],"prefix":"10.1007","author":[{"given":"Mingyu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chengsheng","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Xinting","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhili","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,21]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1109\/JSTSP.2022.3174655","volume":"16","author":"C Yuan","year":"2022","unstructured":"Yuan, C., Yu, P., Xia, Z., Sun, X., Wu, Q.M.J.: FLD-SRC: fingerprint liveness detection for AFIS based on spatial ridges continuity. IEEE J. Selected Topics Signal Process. 16, 817\u2013827 (2022). https:\/\/doi.org\/10.1109\/JSTSP.2022.3174655","journal-title":"IEEE J. Selected Topics Signal Process."},{"issue":"5\u20136","key":"25_CR2","doi-asserted-by":"publisher","first-page":"1314","DOI":"10.1007\/978-1-84882-254-2","volume":"33","author":"D Maltoni","year":"2005","unstructured":"Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of fingerprint recognition. Ch Synth. Fingerprint Gener. 33(5\u20136), 1314 (2005). https:\/\/doi.org\/10.1007\/978-1-84882-254-2","journal-title":"Ch Synth. Fingerprint Gener."},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.ins.2013.06.041","volume":"268","author":"X Jia","year":"2014","unstructured":"Jia, X., et al.: Multi-scale local binary pattern with filters for spoof fingerprint detection. Inf. Sci. 268, 91\u2013102 (2014). https:\/\/doi.org\/10.1016\/j.ins.2013.06.041","journal-title":"Inf. Sci."},{"issue":"4","key":"25_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1049\/iet-bmt.2013.0020","volume":"3","author":"C Sousedik","year":"2014","unstructured":"Sousedik, C., Busch, C.: Presentation attack detection methods for fingerprint recognition systems: a survey. Iet Biometrics 3(4), 219\u2013233 (2014). https:\/\/doi.org\/10.1049\/iet-bmt.2013.0020","journal-title":"Iet Biometrics"},{"issue":"4","key":"25_CR5","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/S1363-4127(02)","volume":"7","author":"SA Schuckers","year":"2002","unstructured":"Schuckers, S.A.: Spoofing and anti-spoofing measures. Inf. Secur. Tech. Rep. 7(4), 56\u201362 (2002). https:\/\/doi.org\/10.1016\/S1363-4127(02)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-642-04146-4_4","volume-title":"Image Analysis and Processing \u2013 ICIAP 2009","author":"GL Marcialis","year":"2009","unstructured":"Marcialis, G.L., et al.: First international fingerprint liveness detection competition\u2014LivDet 2009. In: Foggia, P., Sansone, C., Vento, M. (eds.) ICIAP 2009. LNCS, vol. 5716, pp. 12\u201323. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04146-4_4"},{"key":"25_CR7","doi-asserted-by":"publisher","unstructured":"Yambay, D., Ghiani, L., P. Denti, P., Marcialis, G.L., Roli, F., Schuckers, S.: Livdet 2011 - fingerprint liveness detection competition 2011. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 208\u2013215 (2012). https:\/\/doi.org\/10.1109\/ICB.2012.6199810","DOI":"10.1109\/ICB.2012.6199810"},{"issue":"7\u20138","key":"25_CR8","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S0969-4765(07)70140-6","volume":"15","author":"R Cappelli","year":"2007","unstructured":"Cappelli, R., Ferrara, M., Franco, A., Maltoni, D.: Fingerprint verification competition 2006. Biometric Technol. Today 15(7\u20138), 7\u20139 (2007). https:\/\/doi.org\/10.1016\/S0969-4765(07)70140-6","journal-title":"Biometric Technol. Today"},{"issue":"5","key":"25_CR9","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/S0167-4048(98)80063-1","volume":"17","author":"H Meyer","year":"1998","unstructured":"Meyer, H.: Six biometric devices point the finger at security. Comput.Secur. 17(5), 410\u2013411 (1998). https:\/\/doi.org\/10.1016\/S0167-4048(98)80063-1","journal-title":"Comput.Secur."},{"key":"25_CR10","doi-asserted-by":"publisher","unstructured":"Nikam, S.B., Agarwal, S.: Texture and wavelet-based spoof fingerprint detection for fingerprint biometric systems. In: First International Conference on Emerging Trends in Engineering and Technology 2008, pp. 675\u2013680 (2008). https:\/\/doi.org\/10.1109\/ICETET.2008.134","DOI":"10.1109\/ICETET.2008.134"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Putte, T., Keuning, J.: Biometrical fingerprint recognition: don\u2019t get your fingers burned. In: Smart Card Research and Advanced Applications, pp. 289\u2013303 (2000)","DOI":"10.1007\/978-0-387-35528-3_17"},{"key":"25_CR12","doi-asserted-by":"publisher","unstructured":"Drahansk\u00fd, M., N\u00f6tzel, R., Wolfgang, F.: Liveness detection based on fine movements of the fingertip surface. In: Proceedings of the 2006 IEEE Workshop on Information Assurance, pp. 42\u201347 (2006). https:\/\/doi.org\/10.1109\/iaw.2006.1652075","DOI":"10.1109\/iaw.2006.1652075"},{"key":"25_CR13","unstructured":"Kallo, P., Kiss, I., Podmaniczky, A., Talosi, J.: Detector for recognizing the living character of a finger in a fingerprint recognizing apparatus. US6175641B1 (2001)"},{"key":"25_CR14","doi-asserted-by":"publisher","unstructured":"4 Abhyankar, A.S., Schuckers, S.C.: A wavelet-based approach to detecting liveness in fingerprint scanners. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 5404 (2004). https:\/\/doi.org\/10.1117\/12.542939","DOI":"10.1117\/12.542939"},{"key":"25_CR15","doi-asserted-by":"publisher","unstructured":"Schuckers, S., Abhyankar, A.: Detecting liveness in fingerprint scanners using wavelets: Results of the test dataset. In: Biometric Authentication, ECCV International Workshop, Bioaw, Prague, Czech Republic, May, vol. 3087 (2004). https:\/\/doi.org\/10.1007\/978-3-540-25976-3_10","DOI":"10.1007\/978-3-540-25976-3_10"},{"key":"25_CR16","doi-asserted-by":"publisher","unstructured":") Zhang, Y., Tian, J., Chen, X.: Fake finger detection based on thin-plate spline distortion model. in: Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27\u201329, 2007, Proceedings, vol. 4642 (2007). https:\/\/doi.org\/10.1007\/978-3-540-74549-5_78","DOI":"10.1007\/978-3-540-74549-5_78"},{"issue":"20","key":"25_CR17","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1049\/el:20052577","volume":"41","author":"YS Moon","year":"2005","unstructured":"Moon, Y.S., Chen, J.S., Chan, K.C., So, K., Woo, K.C.: Wavelet based 545 fingerprint liveness detection. Electron. Lett. 41(20), 1112\u20131113 (2005). https:\/\/doi.org\/10.1049\/el:20052577","journal-title":"Electron. Lett."},{"issue":"3","key":"25_CR18","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1109\/TIFS.2006.879289","volume":"1","author":"A Antonelli","year":"2006","unstructured":"Antonelli, A., Cappelli, R., Maio, D., Maltoni, D.: Fake finger detection by skin distortion analysis. IEEE Trans. Inf. Forensics Secur. 1(3), 360\u2013373 (2006). https:\/\/doi.org\/10.1109\/TIFS.2006.879289","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"18","key":"25_CR19","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1049\/el.2010.1549","volume":"46","author":"N Manivanan","year":"2010","unstructured":"Manivanan, N., Memon, S., Balachandran, W.: Automatic detection of active sweat pores of fingerprint using highpass and correlation filtering. Electron. Lett. 46(18), 1268\u20131269 (2010). https:\/\/doi.org\/10.1049\/el.2010.1549","journal-title":"Electron. Lett."},{"issue":"2","key":"25_CR20","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJBM.2008.020141","volume":"1","author":"SB Nikam","year":"2008","unstructured":"Nikam, S.B., Agarwal, S.: Local binary pattern and wavelet-based spoof fingerprint detection. Int. J. Biometrics 1(2), 141\u2013159 (2008). https:\/\/doi.org\/10.1504\/IJBM.2008.020141","journal-title":"Int. J. Biometrics"},{"key":"25_CR21","unstructured":"Kannala, J., Rahtu, E.: BSIF: binarized statistical image features. In: 2012 21st International Conference on Pattern Recognition (ICPR). IEEE (2012)"},{"key":"25_CR22","unstructured":"Ghiani, L., Marcialis, G.L., Roli, F.: Fingerprint liveness detection by local phase quantization. In: Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012), pp. 537\u2013540 (2012)"},{"key":"25_CR23","doi-asserted-by":"publisher","unstructured":". Mohan, L.S., James, J.: Fingerprint spoofing detection using hog and local binary pattern (2017). https:\/\/doi.org\/10.17148\/IJARCCE.2017.64111","DOI":"10.17148\/IJARCCE.2017.64111"},{"issue":"4","key":"25_CR24","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1109\/TSMC.2018.2874281","volume":"50","author":"Z Xia","year":"2020","unstructured":"Xia, Z., Yuan, C., Lv, R., Sun, X., Xiong, N.N., Shi, Y.-Q.: A novel weber local binary descriptor for fingerprint liveness detection. IEEE Trans. Syst. Man Cybern. Syst. 50(4), 1526\u20131536 (2020). https:\/\/doi.org\/10.1109\/TSMC.2018.2874281","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"05","key":"25_CR25","doi-asserted-by":"publisher","first-page":"053038","DOI":"10.1117\/1.JEI.27.5.053038","volume":"27","author":"R Mehboob","year":"2018","unstructured":"Mehboob, R., Dawood, H., Dawood, H., Ilyas, M.U., Guo, P., Banjar, A.: Live fingerprint detection using magnitude of perceived spatial stimuli and local phase information. J. Electron. Imaging 27(05), 053038 (2018). https:\/\/doi.org\/10.1117\/1.JEI.27.5.053038","journal-title":"J. Electron. Imaging"},{"issue":"6","key":"25_CR26","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TIFS.2016.2520880","volume":"11","author":"RF Nogueira","year":"2016","unstructured":"Nogueira, R.F., de Alencar Lotufo, R., Machado, R.C.: Fingerprint liveness detection using convolutional neural networks. IEEE Trans. Inf. Forensics Secur. 11(6), 1206\u20131213 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2520880","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"25_CR27","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.patrec.2016.03.015","volume":"77","author":"S Kim","year":"2016","unstructured":"Kim, S., Park, B., Song, B.S., Yang, S.: Deep belief network based statistical feature learning for fingerprint liveness detection. Pattern Recogn. Lett. 77, 58\u201365 (2016). https:\/\/doi.org\/10.1016\/j.patrec.2016.03.015","journal-title":"Pattern Recogn. Lett."},{"key":"25_CR28","doi-asserted-by":"publisher","first-page":"26953","DOI":"10.1109\/ACCESS.2019.2901235","volume":"7","author":"C Yuan","year":"2019","unstructured":"Yuan, C., Xia, Z., Jiang, L., Wu, J., Sun, X.: Fingerprint liveness detection using an improved CNN with image scale equalization. IEEE Access 7, 26953\u201326966 (2019)","journal-title":"IEEE Access"},{"key":"25_CR29","doi-asserted-by":"publisher","first-page":"91476","DOI":"10.1109\/ACCESS.2019.2927357","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Shi, D., Zhan, X., et al.: Slim-ResCNN: a deep residual convolutional neural network for fingerprint liveness detection. IEEE Access 7, 91476\u201391487 (2019)","journal-title":"IEEE Access"},{"key":"25_CR30","doi-asserted-by":"publisher","unstructured":"Banerjee, S., Chaudhuri, S.: DeFraudNet: End2End fingerprint spoof detection using patch level attention. In: Proceedings - 2020 IEEE Winter Conference on Applications of Computer Vision, WACV 2020, pp. 2684\u20132693 (2020). https:\/\/doi.org\/10.1109\/WACV45572.2020.9093397","DOI":"10.1109\/WACV45572.2020.9093397"},{"key":"25_CR31","doi-asserted-by":"publisher","unstructured":". Wang, Y., Mu, Z. Zeng, H.: Block-based and multi-resolution methods for ear recognition using wavelet transform and uniform local binary patterns. In: 2008 19th International Conference on Pattern Recognition, pp. 1\u20134 (2008). https:\/\/doi.org\/10.1109\/ICPR.2008.4761854","DOI":"10.1109\/ICPR.2008.4761854"},{"issue":"1","key":"25_CR32","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/TNNLS.2017.2716952","volume":"29","author":"CLP Chen","year":"2018","unstructured":"Chen, C.L.P., Liu, Z.: Broad learning system: an effective and efficient incremental learning system without the need for deep architecture. IEEE Trans. Neural Netw. Learn. Syst. 29(1), 10\u201324 (2018). https:\/\/doi.org\/10.1109\/TNNLS.2017.2716952","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"25_CR33","doi-asserted-by":"publisher","unstructured":"Ghiani, L., et al.: Livdet 2013 fingerprint liveness detection competition 2013. In: International Conference on Biometrics (ICB) 2013, pp. 1\u20136 (2013). https:\/\/doi.org\/10.1109\/ICB.2013.6613027","DOI":"10.1109\/ICB.2013.6613027"},{"key":"25_CR34","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. Computer Science (2014)"},{"issue":"6","key":"25_CR35","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017). https:\/\/doi.org\/10.1145\/3065386","journal-title":"Commun. ACM"},{"key":"25_CR36","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016, pp. 770\u2013778 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["Communications in Computer and Information Science","Neural Computing for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-6142-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T16:14:18Z","timestamp":1666282458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-6142-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811961410","9789811961427"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-6142-7_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"21 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Computing for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jinan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncaa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/dl2link.com\/ncaa2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"205","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"77","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.09","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.68","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}