{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T03:48:35Z","timestamp":1774410515404,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T00:00:00Z","timestamp":1675641600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T00:00:00Z","timestamp":1675641600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s10044-023-01132-4","type":"journal-article","created":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T06:03:01Z","timestamp":1675663381000},"page":"773-782","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["LBP and CNN feature fusion for face anti-spoofing"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5392-3851","authenticated-orcid":false,"given":"Ravi Pratap","family":"Singh","sequence":"first","affiliation":[]},{"given":"Ratnakar","family":"Dash","sequence":"additional","affiliation":[]},{"given":"Ramesh Kumar","family":"Mohapatra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,6]]},"reference":[{"key":"1132_CR1","doi-asserted-by":"crossref","unstructured":"Salem E, Hassaballah M, Mahmoud MM, Ali AMM (2021) Facial features detection: a comparative study. In: The international conference on artificial intelligence and computer vision, pp. 402\u2013412, Springer, Cham","DOI":"10.1007\/978-3-030-76346-6_37"},{"issue":"4","key":"1132_CR2","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1049\/iet-cvi.2014.0084","volume":"9","author":"M Hassaballah","year":"2015","unstructured":"Hassaballah M, Aly S (2015) Face recognition: challenges, achievements and future directions. IET Comput Vis 9(4):614\u2013626","journal-title":"IET Comput Vis"},{"issue":"10","key":"1132_CR3","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel K, Han H, Jain AK (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268\u20132283","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1132_CR4","unstructured":"Chingovska I, Anjos A, Marcel S (2012) September. On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG), pp 1\u20137. IEEE"},{"issue":"2","key":"1132_CR5","first-page":"141","volume":"24","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2016) Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process Lett 24(2):141\u2013145","journal-title":"IEEE Signal Process Lett"},{"key":"1132_CR6","doi-asserted-by":"crossref","unstructured":"Peixoto B, Michelassi C, Rocha A (2011) September. Face liveness detection under bad illumination conditions. In: 2011 18th IEEE international conference on image processing, pp 3557\u20133560. IEEE","DOI":"10.1109\/ICIP.2011.6116484"},{"key":"1132_CR7","doi-asserted-by":"crossref","unstructured":"Chai D, Bouzerdoum A (2000) A Bayesian approach to skin color classification in YCbCr color space. In: 2000 TENCON proceedings. Intelligent systems and technologies for the new millennium (Cat. No. 00CH37119), vol 2, pp 421\u2013424. IEEE","DOI":"10.1109\/TENCON.2000.888774"},{"issue":"6","key":"1132_CR8","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1093\/jnci\/66.6.1031","volume":"66","author":"JW Smith","year":"1981","unstructured":"Smith JW, Torres JE, Holmquist ND (1981) Herpes simplex virus type 2 and human cervical cancer: Relationship between cellular and humoral immune assays for the detection of previous infection. JNCI J Natl Cancer Inst 66(6):1031\u20131036","journal-title":"JNCI J Natl Cancer Inst"},{"key":"1132_CR9","doi-asserted-by":"crossref","unstructured":"Freitas Pereira TD, Anjos A, Martino JMD, Marcel S (2012) LBP-TOP based countermeasure against face spoofing attacks. In: Asian conference on computer vision, pp. 121\u2013132. Springer, Berlin","DOI":"10.1007\/978-3-642-37410-4_11"},{"issue":"12","key":"1132_CR10","first-page":"1397","volume":"64","author":"GB De Souza","year":"2017","unstructured":"De Souza GB, da Silva Santos DF, Pires RG, Marana AN, Papa JP (2017) Deep texture features for robust face spoofing detection. IEEE Trans Circuits Syst II Express Briefs 64(12):1397\u20131401","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"1132_CR11","doi-asserted-by":"crossref","unstructured":"Komulainen J, Hadid A, Pietik\u00e4inen M (2013) Context based face anti-spoofing. In: 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), pp 1\u20138. IEEE","DOI":"10.1109\/BTAS.2013.6712690"},{"issue":"2","key":"1132_CR12","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s10044-020-00948-8","volume":"24","author":"S Karanwal","year":"2021","unstructured":"Karanwal S, Diwakar M (2021) Neighborhood and center difference-based-LBP for face recognition. Pattern Anal Appl 24(2):741\u2013761","journal-title":"Pattern Anal Appl"},{"issue":"2","key":"1132_CR13","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/TBIOM.2020.2973001","volume":"2","author":"S Zhang","year":"2020","unstructured":"Zhang S, Liu A, Wan J, Liang Y, Guo G, Escalera S, Li SZ (2020) Casia-surf: a large-scale multi-modal benchmark for face anti-spoofing. IEEE Trans Biometrics Behav Identity Sci 2(2):182\u2013193","journal-title":"IEEE Trans Biometrics Behav Identity Sci"},{"key":"1132_CR14","doi-asserted-by":"crossref","unstructured":"Parkin A, Grinchuk O (2019) Recognizing multi-modal face spoofing with face recognition networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW.2019.00204"},{"key":"1132_CR15","doi-asserted-by":"crossref","unstructured":"Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) March. A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on biometrics (ICB), pp 26\u201331. IEEE","DOI":"10.1109\/ICB.2012.6199754"},{"key":"1132_CR16","doi-asserted-by":"crossref","unstructured":"Shen T, Huang Y, Tong Z (2019) Facebagnet: Bag-of-local-features model for multi-modal face anti-spoofing. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops","DOI":"10.1109\/CVPRW.2019.00203"},{"key":"1132_CR17","doi-asserted-by":"publisher","first-page":"66553","DOI":"10.1109\/ACCESS.2020.2985453","volume":"8","author":"W Sun","year":"2020","unstructured":"Sun W, Song Y, Zhao H, Jin Z (2020) A face spoofing detection method based on domain adaptation and lossless size adaptation. IEEE Access 8:66553\u201366563","journal-title":"IEEE Access"},{"key":"1132_CR18","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Li L, Feng X, Hadid A (2017) May. OULU-NPU: a mobile face presentation attack database with real-world variations. In: 2017 12th IEEE international conference on automatic face & gesture recognition (FG 2017), pp 612\u2013618. IEEE","DOI":"10.1109\/FG.2017.77"},{"issue":"10","key":"1132_CR19","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","volume":"13","author":"H Li","year":"2018","unstructured":"Li H, He P, Wang S, Rocha A, Jiang X, Kot AC (2018) Learning generalized deep feature representation for face anti-spoofing. IEEE Trans Inf Forensics Secur 13(10):2639\u20132652","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1132_CR20","doi-asserted-by":"crossref","unstructured":"Zhou F, Gao C, Chen F, Li C, Li X, Yang F, Zhao Y (2019) July. Face anti-spoofing based on multi-layer domain adaptation. In: 2019 IEEE international conference on multimedia & expo workshops (ICMEW), pp 192\u2013197 IEEE","DOI":"10.1109\/ICMEW.2019.00-88"},{"issue":"4","key":"1132_CR21","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1007\/s10044-020-00875-8","volume":"23","author":"BR Katika","year":"2020","unstructured":"Katika BR, Karthik K (2020) Face anti-spoofing by identity masking using random walk patterns and outlier detection. Pattern Anal Appl 23(4):1735\u20131754","journal-title":"Pattern Anal Appl"},{"issue":"2","key":"1132_CR22","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s10044-020-00937-x","volume":"24","author":"RH Vareto","year":"2021","unstructured":"Vareto RH, Schwartz WR (2021) Face spoofing detection via ensemble of classifiers toward low-power devices. Pattern Anal Appl 24(2):511\u2013521","journal-title":"Pattern Anal Appl"},{"issue":"5","key":"1132_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3402446","volume":"11","author":"X Tu","year":"2020","unstructured":"Tu X, Ma Z, Zhao J, Du G, Xie M, Feng J (2020) Learning generalizable and identity-discriminative representations for face anti-spoofing. ACM Trans Intell Syst Technol (TIST) 11(5):1\u201319","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"issue":"11","key":"1132_CR24","doi-asserted-by":"publisher","first-page":"2396","DOI":"10.1109\/TIFS.2015.2458700","volume":"10","author":"SR Arashloo","year":"2015","unstructured":"Arashloo SR, Kittler J, Christmas W (2015) Face spoofing detection based on multiple descriptor fusion using multiscale dynamic binarized statistical image features. IEEE Trans Inf Forensics Secur 10(11):2396\u20132407","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1132_CR25","doi-asserted-by":"crossref","unstructured":"Guo M, Wang Z, Zhuang S (2021) Feature extraction of dual-convolutional network with LBP for face anti-spoofing. In: 2021 international conference on computer engineering and artificial intelligence (ICCEAI), pp. 305\u2013309. IEEE","DOI":"10.1109\/ICCEAI52939.2021.00061"},{"issue":"7","key":"1132_CR26","doi-asserted-by":"publisher","first-page":"4626","DOI":"10.1109\/TCSVT.2021.3133620","volume":"32","author":"H Wu","year":"2022","unstructured":"Wu H, Zeng D, Hu Y, Shi H, Mei T (2022) Dual spoof disentanglement generation for face anti-spoofing with depth uncertainty learning. IEEE Trans Circuits Syst Video Technol 32(7):4626\u20134638. https:\/\/doi.org\/10.1109\/TCSVT.2021.3133620","journal-title":"IEEE Trans Circuits Syst Video Technol"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-023-01132-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10044-023-01132-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-023-01132-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T17:01:12Z","timestamp":1728838872000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10044-023-01132-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,6]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["1132"],"URL":"https:\/\/doi.org\/10.1007\/s10044-023-01132-4","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,6]]},"assertion":[{"value":"3 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}