{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:57:23Z","timestamp":1742965043294,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819610679"},{"type":"electronic","value":"9789819610686"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1068-6_9","type":"book-chapter","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:05:43Z","timestamp":1738901143000},"page":"89-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Spoofing Attacks Utilizing a\u00a0More Realistic Contactless Palm Vein Correction Algorithm"],"prefix":"10.1007","author":[{"given":"Jianbin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dacan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Runzhang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wenxiong","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"issue":"06","key":"9_CR1","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.11834\/jig.210078","volume":"26","author":"ZN Sun","year":"2021","unstructured":"Sun, Z.N., et al.: Overview of biometrics research. J. Image Graph. 26(06), 1254\u20131329 (2021)","journal-title":"J. Image Graph."},{"issue":"1","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-bmt.2019.0034","volume":"9","author":"W Wu","year":"2020","unstructured":"Wu, W., et al.: Review of palm vein recognition. IET Biom. 9(1), 1\u201310 (2020)","journal-title":"IET Biom."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Tome, P., Vanoni, M., Marcel, S.: On the vulnerability of palm vein recognition to spoofing attacks. In: Proceedings of the International Conference on Biometrics (ICB), Phuket, pp. 319\u2013325. IEEE (2015)","DOI":"10.1109\/ICB.2015.7139056"},{"key":"9_CR4","unstructured":"Tome, P., Vanoni, M., Marcel, S.: On the vulnerability of finger vein recognition to spoofing. In: 2014 International Conference of the Biometrics Special Interest Group (2014)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Nguyen, H.H., et al.: Analysis of master vein attacks on finger vein recognition systems. In: 23rd IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), Waikoloa, pp. 1900\u20131908. IEEE (2023)","DOI":"10.1109\/WACV56688.2023.00194"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.inffus.2021.10.004","volume":"79","author":"K Shaheed","year":"2022","unstructured":"Shaheed, K., et al.: Recent advancements in finger vein recognition technology: methodology, challenges and opportunities. Inform. Fusion 79, 84\u2013109 (2022)","journal-title":"Inform. Fusion"},{"issue":"2","key":"9_CR7","first-page":"465","volume":"13","author":"XW Qiu","year":"2018","unstructured":"Qiu, X.W., et al.: Finger vein presentation attack detection using total variation decomposition. IEEE TIFS 13(2), 465\u2013477 (2018)","journal-title":"IEEE TIFS"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"binti Ashari, N.N., et al.: Multi-scale texture analysis for finger vein anti-spoofing. In: 2021 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET), Kota Kinabalu, pp. 6\u201311. IEEE (2021)","DOI":"10.1109\/IICAIET51634.2021.9574036"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Schuiki, J., et al.: Confronting a variety of finger vein recognition algorithms with wax presentation attack artefacts. In: 9th International Workshop on Biometrics and Forensics (IWBF), Rome. IEEE (2021)","DOI":"10.1109\/IWBF50991.2021.9465091"},{"key":"9_CR10","series-title":"Advances in Computer Vision and Pattern Recognition","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-319-92627-8_18","volume-title":"Handbook of Biometric Anti-Spoofing","author":"A Anjos","year":"2019","unstructured":"Anjos, A., Tome, P., Marcel, S.: An introduction to vein presentation attacks and detection. In: Marcel, S., Nixon, M.S., Fierrez, J., Evans, N. (eds.) Handbook of Biometric Anti-Spoofing. ACVPR, pp. 419\u2013438. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-92627-8_18"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.engappai.2023.107569","volume":"129","author":"K Shaheed","year":"2024","unstructured":"Shaheed, K., et al.: Deep learning techniques for biometric security: a systematic review of presentation attack detection systems. Eng. Appl. Artif. Intel. 129, 1\u201332 (2024)","journal-title":"Eng. Appl. Artif. Intel."},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-319-69923-3_32","volume-title":"Biometric Recognition","author":"X Qiu","year":"2017","unstructured":"Qiu, X., Tian, S., Kang, W., Jia, W., Wu, Q.: Finger vein presentation attack detection using convolutional neural networks. In: Zhou, J., et al. (eds.) CCBR 2017. LNCS, vol. 10568, pp. 296\u2013305. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69923-3_32"},{"issue":"11","key":"9_CR13","first-page":"8690","volume":"69","author":"WL Yang","year":"2020","unstructured":"Yang, W.L., et al.: FVRAS-Net: an embedded finger-vein recognition and AntiSpoofing system using a unified CNN. IEEE TIM 69(11), 8690\u20138701 (2020)","journal-title":"IEEE TIM"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2022.116786","volume":"198","author":"K Shaheed","year":"2022","unstructured":"Shaheed, K., et al.: Finger-vein presentation attack detection using depthwise separable convolution neural network. Expert Syst. Appl. 198, 1\u201316 (2022)","journal-title":"Expert Syst. Appl."},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2023.119546","volume":"218","author":"HX Wang","year":"2023","unstructured":"Wang, H.X., et al.: Anti-spoofing study on palm biometric features. Expert Syst. Appl. 218, 1\u201315 (2023)","journal-title":"Expert Syst. Appl."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Ying H., et al.: Multispectral palm image fusion for accurate contact-free palmprint recognition. In: 15th IEEE International Conference on Image Processing, San Diego, pp. 281\u2013284. IEEE (2008)","DOI":"10.1109\/ICIP.2008.4711746"},{"issue":"11","key":"9_CR17","first-page":"1974","volume":"9","author":"WX Kang","year":"2014","unstructured":"Kang, W.X., Wu, Q.X.: Contactless palm vein recognition using a mutual foreground-based local binary pattern. IEEE TIFS 9(11), 1974\u20131985 (2014)","journal-title":"IEEE TIFS"},{"key":"9_CR18","first-page":"4601","volume":"19","author":"DC Luo","year":"2024","unstructured":"Luo, D.C., et al.: Palm vein recognition under unconstrained and weak-cooperative conditions. IEEE TIFS 19, 4601\u20134614 (2024)","journal-title":"IEEE TIFS"},{"key":"9_CR19","unstructured":"Jin X., et al.: StarLKNet: star Mixup with large kernel networks for palm vein identification. ArXiv preprint, vol. abs\/2405.12721"}],"container-title":["Lecture Notes in Computer Science","Biometric Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1068-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T04:05:53Z","timestamp":1738901153000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1068-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819610679","9789819610686"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1068-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"8 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Biometric Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccbr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ccbr99.cn\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}