{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T06:31:36Z","timestamp":1756189896713,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Collaborative Research Fund","award":["C1008-16G"],"award-info":[{"award-number":["C1008-16G"]}]},{"name":"Innovation and Technology Support Programme","award":["ITS\/173\/18FP"],"award-info":[{"award-number":["ITS\/173\/18FP"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s00371-020-01849-x","type":"journal-article","created":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T16:04:53Z","timestamp":1589558693000},"page":"1015-1028","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Understanding deep face anti-spoofing: from the perspective of data"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0819-296X","authenticated-orcid":false,"given":"Yujing","family":"Sun","sequence":"first","affiliation":[]},{"given":"Hao","family":"Xiong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3975-8500","authenticated-orcid":false,"given":"Siu Ming","family":"Yiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,15]]},"reference":[{"key":"1849_CR1","doi-asserted-by":"crossref","unstructured":"Atoum, Y., Liu, Y., Jourabloo, A., Liu, X.: Face anti-spoofing using patch and depth-based CNNs. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 319\u2013328. IEEE (2017)","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"1849_CR2","doi-asserted-by":"crossref","unstructured":"Bharadwaj, S., Dhamecha, T.I., Vatsa, M., Singh, R.: Computationally efficient face spoofing detection with motion magnification. In: 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 105\u2013110. IEEE (2013)","DOI":"10.1109\/CVPRW.2013.23"},{"key":"1849_CR3","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 2636\u20132640. IEEE (2015)","DOI":"10.1109\/ICIP.2015.7351280"},{"issue":"8","key":"1849_CR4","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11(8), 1818\u20131830 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"1849_CR5","first-page":"141","volume":"24","author":"Z Boulkenafet","year":"2017","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process. Lett. 24(2), 141\u2013145 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"1849_CR6","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., Hadid, A.: OULU-NPU: a mobile face presentation attack database with real-world variations (2017)","DOI":"10.1109\/FG.2017.77"},{"issue":"6","key":"1849_CR7","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/2816795.2818112","volume":"34","author":"M Chai","year":"2015","unstructured":"Chai, M., Luo, L., Sunkavalli, K., Carr, N., Hadap, S., Zhou, K.: High-quality hair modeling from a single portrait photo. ACM Trans. Graphics (TOG) 34(6), 204 (2015)","journal-title":"ACM Trans. Graphics (TOG)"},{"issue":"2","key":"1849_CR8","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1109\/TIFS.2017.2758748","volume":"13","author":"PP Chan","year":"2018","unstructured":"Chan, P.P., Liu, W., Chen, D., Yeung, D.S., Zhang, F., Wang, X., Hsu, C.C.: Face liveness detection using a flash against 2D spoofing attack. IEEE Trans. Inf. Forensics Secur. 13(2), 521\u2013534 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1849_CR9","unstructured":"Chetty, G.: Biometric liveness detection based on cross modal fusion. In: 12th International Conference on Information Fusion, 2009. FUSION\u201909, pp. 2255\u20132262. IEEE (2009)"},{"key":"1849_CR10","doi-asserted-by":"crossref","unstructured":"Chetty, G.: Biometric liveness checking using multimodal fuzzy fusion. In: 2010 IEEE International Conference on Fuzzy Systems (FUZZ), pp. 1\u20138. IEEE (2010)","DOI":"10.1109\/FUZZY.2010.5584864"},{"key":"1849_CR11","doi-asserted-by":"crossref","unstructured":"Chetty, G., Wagner, M.: Multi-level liveness verification for face-voice biometric authentication. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference, pp. 1\u20136. IEEE (2006)","DOI":"10.1109\/BCC.2006.4341615"},{"issue":"4","key":"1849_CR12","first-page":"463","volume":"1","author":"G Chetty","year":"2009","unstructured":"Chetty, G., Wagner, M.: Biometric person authentication with liveness detection based on audio-visual fusion. Int. J. Biom. 1(4), 463\u2013478 (2009)","journal-title":"Int. J. Biom."},{"key":"1849_CR13","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1\u20137. IEEE (2012)"},{"key":"1849_CR14","doi-asserted-by":"crossref","unstructured":"Dhamecha, T.I., Nigam, A., Singh, R., Vatsa, M.: Disguise detection and face recognition in visible and thermal spectrums. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/ICB.2013.6613019"},{"key":"1849_CR15","doi-asserted-by":"crossref","unstructured":"de\u00a0Freitas\u00a0Pereira, T., Anjos, A., De\u00a0Martino, J.M., Marcel, S.: Lbp- top based countermeasure against face spoofing attacks. In: Asian Conference on Computer Vision, pp. 121\u2013132. Springer (2012)","DOI":"10.1007\/978-3-642-37410-4_11"},{"key":"1849_CR16","doi-asserted-by":"crossref","unstructured":"de\u00a0Freitas\u00a0Pereira, T., Anjos, A., De\u00a0Martino, J.M., Marcel, S.: Can face anti-spoofing countermeasures work in a real world scenario? In: 2013 International Conference on Biometrics (ICB), pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/ICB.2013.6612981"},{"key":"1849_CR17","doi-asserted-by":"crossref","unstructured":"Erdogmus, N., Marcel, S.: Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect. In: Biometrics: 2013 IEEE Sixth International Conference on Theory, Applications and Systems (BTAS), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/BTAS.2013.6712688"},{"issue":"2","key":"1849_CR18","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2014","unstructured":"Galbally, J., Marcel, S., Fierrez, J.: Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans. Image Process. 23(2), 710\u2013724 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"1849_CR19","doi-asserted-by":"crossref","unstructured":"Gan, J., Li, S., Zhai, Y., Liu, C.: 3D convolutional neural network based on face anti-spoofing. In: 2017 2nd International Conference on Multimedia and Image Processing (ICMIP), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/ICMIP.2017.9"},{"issue":"4","key":"1849_CR20","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/TIFS.2015.2411394","volume":"10","author":"DC Garcia","year":"2015","unstructured":"Garcia, D.C., de Queiroz, R.L.: Face-spoofing 2D-detection based on moir\u00e9-pattern analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 778\u2013786 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1849_CR21","doi-asserted-by":"crossref","unstructured":"Jourabloo, A., Liu, Y., Liu, X.: Face de-spoofing: Anti-spoofing via noise modeling. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 290\u2013306 (2018)","DOI":"10.1007\/978-3-030-01261-8_18"},{"issue":"11","key":"1849_CR22","doi-asserted-by":"publisher","first-page":"2144","DOI":"10.1109\/TPAMI.2014.2316835","volume":"36","author":"K Karsch","year":"2014","unstructured":"Karsch, K., Liu, C., Kang, S.: Depth transfer: depth extraction from video using non-parametric sampling. IEEE Trans. Pattern Anal. Mach. Intell. 36(11), 2144\u20132158 (2014)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"12","key":"1849_CR23","doi-asserted-by":"publisher","first-page":"22471","DOI":"10.3390\/s141222471","volume":"14","author":"S Kim","year":"2014","unstructured":"Kim, S., Ban, Y., Lee, S.: Face liveness detection using a light field camera. Sensors 14(12), 22471\u201322499 (2014)","journal-title":"Sensors"},{"key":"1849_CR24","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization (2014). arXiv preprint arXiv:1412.6980"},{"key":"1849_CR25","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., Pietikainen, M.: Context based face anti-spoofing. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"1849_CR26","doi-asserted-by":"crossref","unstructured":"Lagorio, A., Tistarelli, M., Cadoni, M., Fookes, C., Sridharan, S.: Liveness detection based on 3D face shape analysis. In: 2013 International Workshop on Biometrics and Forensics (IWBF), pp. 1\u20134. IEEE (2013)","DOI":"10.1109\/IWBF.2013.6547310"},{"issue":"10","key":"1849_CR27","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., He, P., Wang, S., Rocha, A., Jiang, X., Kot, A.C.: Learning generalized deep feature representation for face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 13(10), 2639\u20132652 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1849_CR28","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Y., Tan, T., Jain, A.K.: Live face detection based on the analysis of Fourier spectra. In: Biometric Technology for Human Identification, vol. 5404, pp. 296\u2013304. International Society for Optics and Photonics (2004)","DOI":"10.1117\/12.541955"},{"key":"1849_CR29","doi-asserted-by":"crossref","unstructured":"Li, L., Feng, X., Boulkenafet, Z., Xia, Z., Li, M., Hadid, A.: An original face anti-spoofing approach using partial convolutional neural network. In: 2016 6th International Conference on Image Processing Theory Tools and Applications (IPTA), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"1849_CR30","doi-asserted-by":"crossref","unstructured":"Li, Y., Xu, K., Yan, Q., Li, Y., Deng, R.H.: Understanding OSN-based facial disclosure against face authentication systems. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 413\u2013424. ACM (2014)","DOI":"10.1145\/2590296.2590315"},{"issue":"1","key":"1849_CR31","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s10278-013-9636-1","volume":"27","author":"P Liu","year":"2014","unstructured":"Liu, P., Zafar, F., Badano, A.: The effect of ambient illumination on handheld display image quality. J. Digit. Imaging 27(1), 12\u201318 (2014)","journal-title":"J. Digit. Imaging"},{"key":"1849_CR32","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision (2018). arXiv preprint arXiv:1803.11097","DOI":"10.1109\/CVPR.2018.00048"},{"key":"1849_CR33","doi-asserted-by":"crossref","unstructured":"Liu, Y., Stehouwer, J., Jourabloo, A., Liu, X.: Deep tree learning for zero-shot face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4680\u20134689 (2019)","DOI":"10.1109\/CVPR.2019.00481"},{"key":"1849_CR34","doi-asserted-by":"crossref","unstructured":"M\u00e4\u00e4tt\u00e4, J., Hadid, A., Pietik\u00e4inen, M.: Face spoofing detection from single images using micro-texture analysis. In: 2011 international Joint Conference on Biometrics (IJCB), pp. 1\u20137. IEEE (2011)","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"1849_CR35","doi-asserted-by":"crossref","unstructured":"Pan, G., Sun, L., Wu, Z., Lao, S.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE 11th International Conference on Computer Vision, 2007. ICCV 2007, pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"1849_CR36","doi-asserted-by":"crossref","unstructured":"Patel, K., Han, H., Jain, A.K.: Cross-database face antispoofing with robust feature representation. In: Chinese Conference on Biometric Recognition, pp. 611\u2013619. Springer (2016)","DOI":"10.1007\/978-3-319-46654-5_67"},{"issue":"10","key":"1849_CR37","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel, K., Han, H., Jain, A.K.: Secure face unlock: spoof detection on smartphones. IEEE Trans. Inf. Forensics Secur. 11(10), 2268\u20132283 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1849_CR38","doi-asserted-by":"crossref","unstructured":"Peixoto, B., Michelassi, C., Rocha, A.: Face liveness detection under bad illumination conditions. In: 2011 18th IEEE International Conference on Image Processing (ICIP), pp. 3557\u20133560. IEEE (2011)","DOI":"10.1109\/ICIP.2011.6116484"},{"issue":"12","key":"1849_CR39","doi-asserted-by":"publisher","first-page":"4726","DOI":"10.1109\/TIP.2015.2466088","volume":"24","author":"A Pinto","year":"2015","unstructured":"Pinto, A., Pedrini, H., Schwartz, W.R., Rocha, A.: Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans. Image Process. 24(12), 4726\u20134740 (2015)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"1849_CR40","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/TIFS.2015.2395139","volume":"10","author":"A Pinto","year":"2015","unstructured":"Pinto, A., Schwartz, W.R., Pedrini, H., de Rezende Rocha, A.: Using visual rhythms for detecting video-based facial spoof attacks. IEEE Trans. Inf. Forensics Secur. 10(5), 1025\u20131038 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1849_CR41","unstructured":"Qi, C.R., Su, H., Mo, K., Guibas, L.J.: Pointnet: Deep learning on point sets for 3D classification and segmentation. In: Proceedings of Computer Vision and Pattern Recognition (CVPR). vol. 1, number 2, p. 4. IEEE (2017)"},{"key":"1849_CR42","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/B978-0-12-336156-1.50050-1","volume":"4","author":"C Schlick","year":"1994","unstructured":"Schlick, C.: Fast alternatives to Perlin\u2019s bias and gain functions. Graph. Gems IV 4, 401\u2013403 (1994)","journal-title":"Graph. Gems IV"},{"key":"1849_CR43","doi-asserted-by":"crossref","unstructured":"Siddiqui, T.A., Bharadwaj, S., Dhamecha, T.I., Agarwal, A., Vatsa, M., Singh, R., Ratha, N.: Face anti-spoofing with multifeature videolet aggregation. In: 2016 23rd International Conference on Pattern Recognition (ICPR), pp. 1035\u20131040. IEEE (2016)","DOI":"10.1109\/ICPR.2016.7899772"},{"issue":"1\u20132","key":"1849_CR44","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/S1077-3142(03)00075-4","volume":"91","author":"DA Socolinsky","year":"2003","unstructured":"Socolinsky, D.A., Selinger, A., Neuheisel, J.D.: Face recognition with visible and thermal infrared imagery. Comput. Vis. Image Underst. 91(1\u20132), 72\u2013114 (2003)","journal-title":"Comput. Vis. Image Underst."},{"key":"1849_CR45","doi-asserted-by":"crossref","unstructured":"Tan, X., Li, Y., Liu, J., Jiang, L.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: European Conference on Computer Vision, pp. 504\u2013517. Springer (2010)","DOI":"10.1007\/978-3-642-15567-3_37"},{"issue":"4","key":"1849_CR46","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TIFS.2015.2406533","volume":"10","author":"S Tirunagari","year":"2015","unstructured":"Tirunagari, S., Poh, N., Windridge, D., Iorliam, A., Suki, N., Ho, A.T.: Detection of face spoofing using visual dynamics. IEEE Trans. Inf. Forensics Secur. 10(4), 762\u2013777 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1849_CR47","doi-asserted-by":"crossref","unstructured":"Wang, T., Yang, J., Lei, Z., Liao, S., Li, S.Z.: Face liveness detection using 3D structure recovered from a single camera. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/ICB.2013.6612957"},{"issue":"4","key":"1849_CR48","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1849_CR49","doi-asserted-by":"crossref","unstructured":"Xu, Z., Li, S., Deng, W.: Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In: 2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR), pp. 141\u2013145. IEEE (2015)","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"1849_CR50","unstructured":"Yang, J., Lei, Z., Li, S.Z.: Learn convolutional neural network for face anti-spoofing (2014). arXiv preprint arXiv:1408.5601"},{"key":"1849_CR51","doi-asserted-by":"crossref","unstructured":"Yang, J., Lei, Z., Liao, S., Li, S.Z.: Face liveness detection with component dependent descriptor. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/ICB.2013.6612955"},{"key":"1849_CR52","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face antispoofing database with diverse attacks. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 26\u201331. IEEE (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"issue":"3","key":"1849_CR53","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/TMM.2017.2750415","volume":"20","author":"X Zhao","year":"2018","unstructured":"Zhao, X., Lin, Y., Heikkil\u00e4, J.: Dynamic texture recognition using volume local binary count patterns with an application to 2D face spoofing detection. IEEE Trans. Multimed. 20(3), 552\u2013566 (2018)","journal-title":"IEEE Trans. Multimed."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-01849-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-020-01849-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-01849-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T23:20:45Z","timestamp":1621034445000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-020-01849-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,15]]},"references-count":53,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["1849"],"URL":"https:\/\/doi.org\/10.1007\/s00371-020-01849-x","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"type":"print","value":"0178-2789"},{"type":"electronic","value":"1432-2315"}],"subject":[],"published":{"date-parts":[[2020,5,15]]},"assertion":[{"value":"15 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Prof. Xiu Ming Yiu has received research Grants from the Hong Kong Government.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}