{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:36:04Z","timestamp":1760189764034},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:00:00Z","timestamp":1606089600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:00:00Z","timestamp":1606089600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10181-4","type":"journal-article","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:28:51Z","timestamp":1606166931000},"page":"10441-10472","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A lite convolutional neural network built on permuted Xceptio-inception and Xceptio-reduction modules for texture based facial liveness recognition"],"prefix":"10.1007","volume":"80","author":[{"given":"Ashutosh","family":"Satapathy","sequence":"first","affiliation":[]},{"given":"L. M. Jenila","family":"Livingston","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,23]]},"reference":[{"issue":"4","key":"10181_CR1","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11760-016-1014-2","volume":"11","author":"A Alotaibi","year":"2017","unstructured":"Alotaibi A, Mahmood A (2017) Deep face liveness detection based on nonlinear diffusion using convolution neural network. SIViP 11(4):713\u2013720","journal-title":"SIViP"},{"key":"10181_CR2","unstructured":"Angadi SA, Kagawade VC (2018) Detection of face spoofing using multiple texture descriptors. In: 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS). IEEE, pp 151\u2013156"},{"key":"10181_CR3","doi-asserted-by":"publisher","first-page":"13868","DOI":"10.1109\/ACCESS.2017.2729161","volume":"5","author":"SR Arashloo","year":"2017","unstructured":"Arashloo SR, Kittler J, Christmas W (2017) An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. IEEE Access 5:13868\u201313882","journal-title":"IEEE Access"},{"key":"10181_CR4","doi-asserted-by":"crossref","unstructured":"Banerji S, Verma A, Liu C (2012) LBP and color descriptors for image classification. In: Cross disciplinary biometric systems. Springer, Berlin, pp 205\u2013225","DOI":"10.1007\/978-3-642-28457-1_10"},{"issue":"3","key":"10181_CR5","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s11760-017-1189-1","volume":"12","author":"MP Beham","year":"2018","unstructured":"Beham MP, Roomi SMM (2018) Anti-spoofing enabled face recognition based on aggregated local weighted gradient orientation. SIViP 12(3):531\u2013538","journal-title":"SIViP"},{"key":"10181_CR6","doi-asserted-by":"crossref","unstructured":"Beham MP et al (2017) Face spoofing detection using binary gradient orientation pattern with deep neural network. In: 2017 Ninth International Conference on Advances in Pattern Recognition (ICAPR). IEEE, pp 1\u20136","DOI":"10.1109\/ICAPR.2017.8593022"},{"issue":"8","key":"10181_CR7","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","volume":"35","author":"Y Bengio","year":"2013","unstructured":"Bengio Y, Courville A, Vincent P (2013) Representation learning: a review and new perspectives. IEEE Trans Pattern Anal Mach Intell 35(8):1798\u20131828","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"10181_CR8","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.4.043007","volume":"26","author":"A Benlamoudi","year":"2017","unstructured":"Benlamoudi A, Aiadi KE, Ouafi A, Samai D, Oussalah M (2017) Face antispoofing based on frame difference and multilevel representation. J Electron Imaging 26(4):043007","journal-title":"J Electron Imaging"},{"issue":"5","key":"10181_CR9","first-page":"2206","volume":"7","author":"A Bhandare","year":"2016","unstructured":"Bhandare A et al (2016) Applications of convolutional neural networks. Int J Comput Sci Inf Technol 7(5):2206\u20132215","journal-title":"Int J Comput Sci Inf Technol"},{"key":"10181_CR10","doi-asserted-by":"publisher","first-page":"64270","DOI":"10.1109\/ACCESS.2018.2877890","volume":"6","author":"S Bianco","year":"2018","unstructured":"Bianco S, Cadene R, Celona L, Napoletano P (2018) Benchmark analysis of representative deep neural network architectures. IEEE Access 6:64270\u201364277","journal-title":"IEEE Access"},{"key":"10181_CR11","unstructured":"Bjorck N et al (2018) Understanding batch normalization. In: Advances in neural information processing systems, pp 7694\u20137705"},{"key":"10181_CR12","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z, Komulainen J, Hadid A (2015) Face anti-spoofing based on color texture analysis. In: 2015 IEEE international conference on image processing (ICIP). IEEE, pp 2636\u20132640","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"10181_CR13","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Das D (2014) An overview of face liveness detection. arXiv preprint arXiv:1405.2227","DOI":"10.5121\/ijit.2014.3202"},{"key":"10181_CR14","doi-asserted-by":"crossref","unstructured":"Chollet F (2017) Xception: deep learning with depthwise separable convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1251\u20131258","DOI":"10.1109\/CVPR.2017.195"},{"key":"10181_CR15","doi-asserted-by":"crossref","unstructured":"Das D, Chakraborty S (2014) Face liveness detection based on frequency and micro-texture analysis. In: 2014 International Conference on Advances in Engineering & Technology Research (ICAETR-2014). IEEE, pp 1\u20134","DOI":"10.1109\/ICAETR.2014.7012923"},{"key":"10181_CR16","doi-asserted-by":"crossref","unstructured":"Dong X, Shen J (2018) Triplet loss in siamese network for object tracking. In: Proceedings of the European Conference on Computer Vision (ECCV), pp 459\u2013474","DOI":"10.1007\/978-3-030-01261-8_28"},{"key":"10181_CR17","doi-asserted-by":"crossref","unstructured":"Dong J, Tian C, Xu Y (2017) Face liveness detection using color gradient features. In: 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC). IEEE, pp 377\u2013382","DOI":"10.1109\/SPAC.2017.8304308"},{"issue":"7","key":"10181_CR18","doi-asserted-by":"publisher","first-page":"3516","DOI":"10.1109\/TIP.2019.2898567","volume":"28","author":"X Dong","year":"2019","unstructured":"Dong X, Shen J, Wu D, Guo K, Jin X, Porikli F (2019) Quadruplet network with one-shot learning for fast visual object tracking. IEEE Trans Image Process 28(7):3516\u20133527","journal-title":"IEEE Trans Image Process"},{"key":"10181_CR19","doi-asserted-by":"crossref","unstructured":"Du X, Cai Y, Wang S, Zhang L (2016) Overview of deep learning. In: 2016 31st Youth Academic Annual Conference of Chinese Association of Automation (YAC). IEEE, pp 159\u2013164","DOI":"10.1109\/YAC.2016.7804882"},{"key":"10181_CR20","unstructured":"Gulcehre C et al (2016) Noisy activation functions. In: International conference on machine learning, pp 3059\u20133068"},{"key":"10181_CR21","first-page":"172","volume-title":"Chinese Conference on Pattern Recognition and Computer Vision (PRCV)","author":"H Hao","year":"2019","unstructured":"Hao H, Pei M, Zhao M (2019) Face liveness detection based on client identity using Siamese network. In: Chinese Conference on Pattern Recognition and Computer Vision (PRCV). Springer, Cham, pp 172\u2013180"},{"key":"10181_CR22","unstructured":"Hassaballah M, Murakami K, Ido S (2011) Eye and nose fields detection from gray scale facial images. In: MVA, pp 406\u2013409"},{"key":"10181_CR23","doi-asserted-by":"crossref","unstructured":"He K et al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"10181_CR24","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167"},{"key":"10181_CR25","doi-asserted-by":"crossref","unstructured":"Ito K, Okano T, Aoki T (2017) Recent advances in biometrie security: a case study of liveness detection in face recognition. In: 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, pp 220\u2013227","DOI":"10.1109\/APSIPA.2017.8282031"},{"issue":"8","key":"10181_CR26","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1109\/TIP.2015.2422574","volume":"24","author":"W Kim","year":"2015","unstructured":"Kim W, Suh S, Han JJ (2015) Face liveness detection from a single image via diffusion speed model. IEEE Trans Image Process 24(8):2456\u20132465","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"10181_CR27","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.imavis.2007.05.004","volume":"27","author":"K Kollreider","year":"2009","unstructured":"Kollreider K, Fronthaler H, Bigun J (2009) Non-intrusive liveness detection by face images. Image Vis Comput 27(3):233\u2013244","journal-title":"Image Vis Comput"},{"issue":"4","key":"10181_CR28","doi-asserted-by":"publisher","first-page":"423","DOI":"10.3390\/e21040423","volume":"21","author":"R Koshy","year":"2019","unstructured":"Koshy R, Mahmood A (2019) Optimizing deep CNN architectures for face Liveness detection. Entropy 21(4):423","journal-title":"Entropy"},{"key":"10181_CR29","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097\u20131105"},{"issue":"2","key":"10181_CR30","first-page":"11","volume":"4","author":"IB Kusuma","year":"2018","unstructured":"Kusuma IB et al (2018) Image spoofing detection using local binary pattern and local binary pattern variance. Int J Inf Commun Technol (IjoICT) 4(2):11\u201318","journal-title":"Int J Inf Commun Technol (IjoICT)"},{"key":"10181_CR31","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1109\/TIP.2019.2936112","volume":"29","author":"Q Lai","year":"2019","unstructured":"Lai Q et al (2019) Video saliency prediction using spatiotemporal residual attentive networks. IEEE Trans Image Process 29:1113\u20131126","journal-title":"IEEE Trans Image Process"},{"key":"10181_CR32","doi-asserted-by":"crossref","unstructured":"Larbi K et al (2018) DeepColorFASD: face anti spoofing solution using a multi channeled color spaces CNN. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, pp 4011\u20134016","DOI":"10.1109\/SMC.2018.00680"},{"key":"10181_CR33","doi-asserted-by":"crossref","unstructured":"Lee CE et al (2018) Towards building a remote anti-spoofing face authentication system. In: TENCON 2018-2018 IEEE Region 10 Conference. IEEE, pp 0321\u20130326","DOI":"10.1109\/TENCON.2018.8650440"},{"issue":"1","key":"10181_CR34","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/iet-bmt.2017.0089","volume":"7","author":"L Li","year":"2017","unstructured":"Li L, Correia PL, Hadid A (2017) Face recognition under spoofing attacks: countermeasures and research directions. IET Biometrics 7(1):3\u201314","journal-title":"IET Biometrics"},{"key":"10181_CR35","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1201\/9781351003827-2","volume-title":"Deep learning in computer vision: principles and applications","author":"K Li","year":"2020","unstructured":"Li K et al (2020) Object detection with convolutional neural networks. In: Hassaballah M, Awad AI (eds) Deep learning in computer vision: principles and applications. Taylor & Francis, Boca Raton, pp 41\u201362"},{"key":"10181_CR36","doi-asserted-by":"publisher","first-page":"3351","DOI":"10.1109\/TIP.2019.2959256","volume":"29","author":"Z Liang","year":"2019","unstructured":"Liang Z, Shen J (2019) Local semantic siamese networks for fast tracking. IEEE Trans Image Process 29:3351\u20133364","journal-title":"IEEE Trans Image Process"},{"key":"10181_CR37","doi-asserted-by":"crossref","unstructured":"Luan X et al (2017) Face liveness detection with recaptured feature extraction. In: 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC). IEEE, pp 429\u2013432","DOI":"10.1109\/SPAC.2017.8304317"},{"key":"10181_CR38","doi-asserted-by":"crossref","unstructured":"Mhou K, van der Haar D, Leung WS (2017) Face spoof detection using light reflection in moderate to low lighting. In: 2017 2nd Asia-Pacific Conference on Intelligent Robot Systems (ACIRS). IEEE, pp 47\u201352","DOI":"10.1109\/ACIRS.2017.7986063"},{"key":"10181_CR39","unstructured":"Nwankpa C et al (2018) Activation functions: comparison of trends in practice and research for deep learning. arXiv preprint arXiv:1811.03378"},{"key":"10181_CR40","doi-asserted-by":"crossref","unstructured":"Pan S, Deravi F (2019) Spatio-temporal texture features for presentation attack detection in biometric systems. In: 2019 Eighth International Conference on Emerging Security Technologies (EST). IEEE, pp 1\u20136","DOI":"10.1109\/EST.2019.8806220"},{"key":"10181_CR41","first-page":"1491","volume":"108","author":"S Parveen","year":"2015","unstructured":"Parveen S et al (2015) Face anti-spoofing methods. Curr Sci 108:1491\u20131500","journal-title":"Curr Sci"},{"issue":"2","key":"10181_CR42","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/computers5020010","volume":"5","author":"S Parveen","year":"2016","unstructured":"Parveen S, Ahmad S, Abbas N, Adnan W, Hanafi M, Naeem N (2016) Face liveness detection using dynamic local ternary pattern (DLTP). Computers 5(2):10","journal-title":"Computers"},{"key":"10181_CR43","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Cabo D et al (2019) Deep anomaly detection for generalized face anti-spoofing. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops","DOI":"10.1109\/CVPRW.2019.00201"},{"issue":"1","key":"10181_CR44","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3390\/su12010085","volume":"12","author":"FA Pujol","year":"2020","unstructured":"Pujol FA et al (2020) Entropy-based face recognition and spoof detection for security applications. Sustainability 12(1):85","journal-title":"Sustainability"},{"key":"10181_CR45","doi-asserted-by":"crossref","unstructured":"Qin L et al (2017) Content-independent face presentation attack detection with directional local binary pattern. In: Chinese Conference on Biometric Recognition. Springer, Cham, pp 118\u2013126","DOI":"10.1007\/978-3-319-69923-3_13"},{"key":"10181_CR46","first-page":"102482","volume":"52","author":"RJ Raghavendra","year":"2020","unstructured":"Raghavendra RJ, Kunte RS (2020) Extended local ternary co-relation pattern: a novel feature descriptor for face anti-spoofing. J Inf Secur Appl 52:102482","journal-title":"J Inf Secur Appl"},{"key":"10181_CR47","doi-asserted-by":"crossref","unstructured":"Rehman YAU, Po LM, Liu M (2017) Deep learning for face anti-spoofing: an end-to-end approach. In: 2017 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA). IEEE, pp 195\u2013200","DOI":"10.23919\/SPA.2017.8166863"},{"key":"10181_CR48","doi-asserted-by":"publisher","first-page":"113002","DOI":"10.1016\/j.eswa.2019.113002","volume":"142","author":"YAU Rehman","year":"2020","unstructured":"Rehman YAU, Po LM, Liu M (2020) SLNet: stereo face liveness detection via dynamic disparity-maps and convolutional neural network. Expert Syst Appl 142:113002","journal-title":"Expert Syst Appl"},{"key":"10181_CR49","unstructured":"Ruder S (2016) An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747"},{"key":"10181_CR50","unstructured":"\u015eeng\u00fcr A et al (2018) Deep feature extraction for face liveness detection. In: 2018 International Conference on Artificial Intelligence and Data Processing (IDAP). IEEE, pp 1\u20134"},{"issue":"3","key":"10181_CR51","doi-asserted-by":"publisher","first-page":"360","DOI":"10.3390\/sym11030360","volume":"11","author":"J Seo","year":"2019","unstructured":"Seo J, Chung IJ (2019) Face liveness detection using thermal face-CNN with external knowledge. Symmetry 11(3):360","journal-title":"Symmetry"},{"key":"10181_CR52","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"10181_CR53","doi-asserted-by":"crossref","unstructured":"Singh AK, Joshi P, Nandi GC (2014) Face recognition with liveness detection using eye and mouth movement. In: 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014). IEEE, pp 592\u2013597","DOI":"10.1109\/ICSPCT.2014.6884911"},{"key":"10181_CR54","doi-asserted-by":"crossref","unstructured":"Smith DF, Wiliem A, Lovell BC (2015) Binary watermarks: a practical method to address face recognition replay attacks on consumer mobile devices. In: IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015). IEEE, pp 1\u20136","DOI":"10.1109\/ISBA.2015.7126344"},{"issue":"10","key":"10181_CR55","doi-asserted-by":"publisher","first-page":"373","DOI":"10.2352\/ISSN.2470-1173.2018.10.IMAWM-373","volume":"2018","author":"L Song","year":"2018","unstructured":"Song L, Liu C (2018) Face liveness detection based on joint analysis of rgb and near-infrared image of faces. Electron Imaging 2018(10):373\u2013371","journal-title":"Electron Imaging"},{"key":"10181_CR56","unstructured":"Song L, Ma H (2019) Face liveness detection based on texture and color textures. In: 2019 International Conference on Cloud Computing and Big Data Analytics (ICCCBDA). IEEE, pp 418\u2013422"},{"key":"10181_CR57","unstructured":"Song X et al (2020) Face anti-spoofing detection using least square weight fusion of channel-based feature classifiers (no. 2701). EasyChair"},{"key":"10181_CR58","doi-asserted-by":"publisher","first-page":"012014","DOI":"10.1088\/1742-6596\/971\/1\/012014","volume":"971","author":"F Sthevanie","year":"2018","unstructured":"Sthevanie F, Ramadhani KN (2018) Spoofing detection on facial images recognition using LBP and GLCM combination. J Phys Conf Ser 971:012014","journal-title":"J Phys Conf Ser"},{"key":"10181_CR59","doi-asserted-by":"publisher","first-page":"3181","DOI":"10.1109\/TIFS.2020.2985530","volume":"15","author":"W Sun","year":"2020","unstructured":"Sun W, Song Y, Chen C, Huang J, Kot AC (2020) Face spoofing detection based on local ternary label supervision in fully convolutional networks. IEEE Trans Inf Forensics Secur 15:3181\u20133196","journal-title":"IEEE Trans. Inf Forensics Secur"},{"key":"10181_CR60","doi-asserted-by":"crossref","unstructured":"Szegedy C et al (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"10181_CR61","doi-asserted-by":"crossref","unstructured":"Szegedy C et al (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"10181_CR62","doi-asserted-by":"crossref","unstructured":"Tan X et al (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: European conference on computer vision. Springer, Berlin, pp 504\u2013517","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"10181_CR63","doi-asserted-by":"crossref","unstructured":"Uzun E et al (2018) rtCaptcha: a real-time CAPTCHA based Liveness detection system. In: NDSS","DOI":"10.14722\/ndss.2018.23253"},{"key":"10181_CR64","unstructured":"van der Haar DT (2018) Real-time face antispoofing using Shearlets. In: International Information Security Conference. Springer, Cham, pp 16\u201329"},{"key":"10181_CR65","unstructured":"Vanitha A, Vaidehi V, Vasuhi S (2018) Liveliness detection in real time videos using color based chromatic moment feature. In: 2018 International Conference on Recent Trends in Advance Computing (ICRTAC). IEEE, pp 162\u2013167"},{"issue":"1","key":"10181_CR66","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/TIP.2017.2754941","volume":"27","author":"W Wang","year":"2017","unstructured":"Wang W, Shen J, Shao L (2017) Video salient object detection via fully convolutional networks. IEEE Trans Image Process 27(1):38\u201349","journal-title":"IEEE Trans Image Process"},{"issue":"12","key":"10181_CR67","doi-asserted-by":"publisher","first-page":"305","DOI":"10.3390\/sym9120305","volume":"9","author":"SY Wang","year":"2017","unstructured":"Wang SY, Yang SH, Chen YP, Huang JW (2017) Face liveness detection based on skin blood flow analysis. Symmetry 9(12):305","journal-title":"Symmetry"},{"key":"10181_CR68","doi-asserted-by":"crossref","unstructured":"Wang W, Shen J, Ling H (2018) A deep network solution for attention and aesthetics aware photo cropping. IEEE Trans Pattern Anal Mach Intell","DOI":"10.1109\/TPAMI.2018.2840724"},{"key":"10181_CR69","unstructured":"Wu B, Pan M, Zhang Y (2019) A review of face anti-spoofing and its applications in China. In: International conference on harmony search algorithm. Springer, Cham, pp 35\u201343"},{"key":"10181_CR70","doi-asserted-by":"crossref","unstructured":"Xie S et al (2017) Aggregated residual transformations for deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1492\u20131500","DOI":"10.1109\/CVPR.2017.634"},{"key":"10181_CR71","doi-asserted-by":"crossref","unstructured":"Yang T et al (2020) Evaluating facial recognition web services with adversarial and synthetic samples. Neurocomputing","DOI":"10.1016\/j.neucom.2019.11.117"},{"key":"10181_CR72","doi-asserted-by":"publisher","first-page":"3683","DOI":"10.1109\/TIFS.2020.2998956","volume":"15","author":"C Yao","year":"2020","unstructured":"Yao C, Jia Y, di H, Wu Y (2020) Face spoofing detection using relativity representation on Riemannian manifold. IEEE Trans Inf Forensics Secur 15:3683\u20133693","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10181_CR73","unstructured":"Ye M, Shen J, Lin G, Xiang T, Shao L, Hoi SC (2020) Deep learning for person re-identification: a survey and outlook. arXiv preprint arXiv:2001.04193"},{"issue":"1","key":"10181_CR74","first-page":"48","volume":"5","author":"AG Y\u0131lmaz","year":"2020","unstructured":"Y\u0131lmaz AG, Turhal U, Nabiyev VV (2020) Effect of feature selection with meta-heuristic optimization methods on face spoofing detection. J Mod Technol Eng 5(1):48\u201359","journal-title":"J Mod Technol Eng"},{"key":"10181_CR75","doi-asserted-by":"publisher","first-page":"115990","DOI":"10.1016\/j.image.2020.115990","volume":"89","author":"W Zhang","year":"2020","unstructured":"Zhang W, Xiang S (2020) Face anti-spoofing detection based on DWT-LBP-DCT features. Signal Process Image Commun 89:115990","journal-title":"Signal Process Image Commun"},{"key":"10181_CR76","doi-asserted-by":"crossref","unstructured":"Zhang Z et al (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on Biometrics (ICB). IEEE, pp 26\u201331","DOI":"10.1109\/ICB.2012.6199754"},{"issue":"10","key":"10181_CR77","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1109\/TPAMI.2015.2502579","volume":"38","author":"X Zhang","year":"2015","unstructured":"Zhang X, Zou J, He K, Sun J (2015) Accelerating very deep convolutional networks for classification and detection. IEEE Trans Pattern Anal Mach Intell 38(10):1943\u20131955","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10181_CR78","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.jvcir.2018.01.001","volume":"51","author":"LB Zhang","year":"2018","unstructured":"Zhang LB, Peng F, Qin L, Long M (2018) Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination. J Vis Commun Image Represent 51:56\u201369","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"10181_CR79","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/TMM.2017.2750415","volume":"20","author":"X Zhao","year":"2017","unstructured":"Zhao X, Lin Y, Heikkil\u00e4 J (2017) Dynamic texture recognition using volume local binary count patterns with an application to 2D face spoofing detection. IEEE Trans Multimedia 20(3):552\u2013566","journal-title":"IEEE Trans Multimedia"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10181-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10181-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10181-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T00:09:33Z","timestamp":1616717373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10181-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,23]]},"references-count":79,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10181"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10181-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,23]]},"assertion":[{"value":"7 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}