{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T18:06:56Z","timestamp":1765994816842,"version":"3.37.3"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10338-1","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T18:03:27Z","timestamp":1611857007000},"page":"14693-14721","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Survey of non-intrusive face spoof detection methods"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9917-8444","authenticated-orcid":false,"given":"Pooja R.","family":"Patil","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1648-3695","authenticated-orcid":false,"given":"Subhash S.","family":"Kulkarni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,28]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Akhtar Z, Michelon C, Foresti G L (2014) Liveness detection for biometric authentication in mobile applications. In: 2014 International Carnahan conference on security technology (ICCST). IEEE, pp 1\u20136","key":"10338_CR1","DOI":"10.1109\/CCST.2014.6986982"},{"doi-asserted-by":"crossref","unstructured":"Akhtar Z, Micheloni C, Piciarelli C, Foresti G L (2014) Mobio_livdet: mobile biometric liveness detection. In: 2014 11th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, pp 187\u2013192","key":"10338_CR2","DOI":"10.1109\/AVSS.2014.6918666"},{"doi-asserted-by":"crossref","unstructured":"Alotaibi A, Mahmood A (2016) Enhancing computer vision to detect face spoofing attack utilizing a single frame from a replay video attack using deep learning. In: 2016 International conference on optoelectronics and image processing (ICOIP). IEEE, pp 1\u20135","key":"10338_CR3","DOI":"10.1109\/OPTIP.2016.7528488"},{"key":"10338_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","volume":"101","author":"R Amin","year":"2016","unstructured":"Amin R, Islam S H, Biswas G, Khan M K, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42\u201362","journal-title":"Comput Netw"},{"unstructured":"Angadi S A, Kagawade V C (2018) Detection of face spoofing using multiple texture descriptors. In: 2018 International conference on computational techniques, electronics and mechanical systems (CTEMS). IEEE, pp 151\u2013156","key":"10338_CR5"},{"doi-asserted-by":"crossref","unstructured":"Atoum Y, Liu Y, Jourabloo A, Liu X (2017) Face anti-spoofing using patch and depth-based cnns. In: 2017 IEEE international joint conference on biometrics (IJCB). IEEE, pp 319\u2013328","key":"10338_CR6","DOI":"10.1109\/BTAS.2017.8272713"},{"doi-asserted-by":"crossref","unstructured":"Bai J, Ng T -T, Gao X, Shi Y -Q (2010) Is physics-based liveness detection truly possible with a single image?. In: Proceedings of 2010 IEEE international symposium on circuits and systems. IEEE, pp 3425\u20133428","key":"10338_CR7","DOI":"10.1109\/ISCAS.2010.5537866"},{"doi-asserted-by":"crossref","unstructured":"Bao W, Li H, Li N, Jiang W (2009) A liveness detection method for face recognition based on optical flow field. In: 2009 International conference on image analysis and signal processing. IEEE, pp 233\u2013236","key":"10338_CR8","DOI":"10.1109\/IASP.2009.5054589"},{"issue":"2","key":"10338_CR9","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1109\/TPAMI.2003.1177153","volume":"25","author":"R Basri","year":"2003","unstructured":"Basri R, Jacobs D W (2003) Lambertian reflectance and linear subspaces. IEEE Trans Pattern Anal Mach Intell 25(2):218\u2013233","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"doi-asserted-by":"crossref","unstructured":"Benlamoudi A, Samai D, Ouafi A, Bekhouche S E, Taleb-Ahmed A, Hadid A (2015) Face spoofing detection using local binary patterns and fisher score. In: 2015 3rd International conference on control, engineering & information technology (CEIT). IEEE, pp 1\u20135","key":"10338_CR10","DOI":"10.1109\/CEIT.2015.7233145"},{"doi-asserted-by":"crossref","unstructured":"Bhogal A P S, S\u00f6llinger D, Trung P, Uhl A (2017) Non-reference image quality assessment for biometric presentation attack detection. In: 2017 5th International workshop on biometrics and forensics (IWBF). IEEE, pp 1\u20136","key":"10338_CR11","DOI":"10.1109\/IWBF.2017.7935080"},{"issue":"1","key":"10338_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"3","key":"10338_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang C -C, Lin C -J (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):1\u201327","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"unstructured":"Chingovska I, Anjos A, Marcel S (2012) On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG-proceedings of the international conference of biometrics special interest group (BIOSIG). IEEE, pp 1\u20137","key":"10338_CR14"},{"doi-asserted-by":"crossref","unstructured":"Crete F, Dolmiere T, Ladret P, Nicolas M (2007) The blur effect: perception and estimation with a new no-reference perceptual blur metric. In: Human vision and electronic imaging XII, vol 6492. International Society for Optics and Photonics, p 64920I","key":"10338_CR15","DOI":"10.1117\/12.702790"},{"key":"10338_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389","volume-title":"An introduction to support vector machines and other kernel-based learning methods","author":"N Cristianini","year":"2000","unstructured":"Cristianini N, Shawe-Taylor J, et al. (2000) An introduction to support vector machines and other kernel-based learning methods. Cambridge University Press, Cambridge"},{"doi-asserted-by":"crossref","unstructured":"Dhawanpatil T, Joglekar B (2017) Face spoofing detection using multiscale local binary pattern approach. In: 2017 International conference on computing, communication, control and automation (ICCUBEA). IEEE, pp 1\u20135","key":"10338_CR17","DOI":"10.1109\/ICCUBEA.2017.8463735"},{"doi-asserted-by":"crossref","unstructured":"Dong J, Tian C, Xu Y (2017) Face liveness detection using color gradient features. In: 2017 International conference on security, pattern analysis, and cybernetics (SPAC). IEEE, pp 377\u2013382","key":"10338_CR18","DOI":"10.1109\/SPAC.2017.8304308"},{"issue":"2","key":"10338_CR19","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher R A (1936) The use of multiple measurements in taxonomic problems. Ann Eugenics 7(2):179\u2013188","journal-title":"Ann Eugenics"},{"doi-asserted-by":"crossref","unstructured":"Galbally J, Marcel S (2014) Face anti-spoofing based on general image quality assessment. In: 2014 22nd International conference on pattern recognition. IEEE, pp 1173\u20131178","key":"10338_CR20","DOI":"10.1109\/ICPR.2014.211"},{"issue":"2","key":"10338_CR21","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2013","unstructured":"Galbally J, Marcel S, Fierrez J (2013) Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Trans Image Process 23(2):710\u2013724","journal-title":"IEEE Trans Image Process"},{"doi-asserted-by":"crossref","unstructured":"Gao X, Ng T -T, Qiu B, Chang S -F (2010) Single-view recaptured image detection based on physics-based features. In: 2010 IEEE international conference on multimedia and expo. IEEE, pp 1469\u20131474","key":"10338_CR22","DOI":"10.1109\/ICME.2010.5583280"},{"issue":"4","key":"10338_CR23","first-page":"778","volume":"10","author":"DC Garcia","year":"2015","unstructured":"Garcia D C, de Queiroz R L (2015) Face-spoofing 2d-detection based on moir\u00e9-pattern analysis. IEEE Trans Pattern Anal Mach Intell 10 (4):778\u2013786","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"doi-asserted-by":"crossref","unstructured":"Garud D, Agrwal S (2016) Face liveness detection. In: 2016 International conference on automatic control and dynamic optimization techniques (ICACDOT). IEEE, pp 789\u2013792","key":"10338_CR24","DOI":"10.1109\/ICACDOT.2016.7877695"},{"issue":"1","key":"10338_CR25","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1109\/TIFS.2012.2228856","volume":"8","author":"H Han","year":"2012","unstructured":"Han H, Klare B F, Bonnen K, Jain A K (2012) Matching composite sketches to face photos: a component-based approach. IEEE Trans Inf Forensics Secur 8(1):191\u2013204","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10338_CR26","volume-title":"Applied multivariate statistical analysis, vol 22007","author":"W H\u00e4rdle","year":"2007","unstructured":"H\u00e4rdle W, Simar L (2007) Applied multivariate statistical analysis, vol 22007. Springer, Berlin"},{"doi-asserted-by":"crossref","unstructured":"Hassan M A, Mustafa M N, Wahba A (2017) Automatic liveness detection for facial images. In: 2017 12th International conference on computer engineering and systems (ICCES). IEEE, pp 215\u2013220","key":"10338_CR27","DOI":"10.1109\/ICCES.2017.8275306"},{"unstructured":"Hsu C -W, Chang C -C et al (2003) A practical guide to support vector classification. Tech. rep., Department of Computer Science, National Taiwan University","key":"10338_CR28"},{"issue":"12","key":"10338_CR29","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","volume":"38","author":"A Jain","year":"2005","unstructured":"Jain A, Nandakumar K, Ross A (2005) Score normalization in multimodal biometric systems. Pattern Recognit 38(12):2270\u20132285","journal-title":"Pattern Recognit"},{"unstructured":"Jan V, Drahansky\u0300 M, Dvor R, Yanushkevich S N, et al. (2012) Thermal face recognition: a fusion approach. In: 2012 Third international conference on emerging security technologies. IEEE, pp 39\u201342","key":"10338_CR30"},{"unstructured":"Jayan T J, Aneesh R (2018) Image quality measures based face spoofing detection algorithm for online social media. In: 2018 International CET conference on control, communication, and computing (IC4). IEEE, pp 245\u2013249","key":"10338_CR31"},{"doi-asserted-by":"crossref","unstructured":"Jiang C, Chen S, Zhang B, Chen Y, Bo Y, Feng Z (2018) Effectiveness analysis of the covariance matrix for spoofing detection application. In: 2018 Ubiquitous positioning, indoor navigation and location-based services (UPINLBS). IEEE, pp 1\u20135","key":"10338_CR32","DOI":"10.1109\/UPINLBS.2018.8559759"},{"doi-asserted-by":"crossref","unstructured":"Jourabloo A, Liu Y, Liu X (2018) Face de-spoofing: anti-spoofing via noise modeling. In: Proceedings of the European conference on computer vision (ECCV), pp 290\u2013306","key":"10338_CR33","DOI":"10.1007\/978-3-030-01261-8_18"},{"issue":"2","key":"10338_CR34","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10044-009-0153-2","volume":"13","author":"HG Jung","year":"2010","unstructured":"Jung H G, Kim J (2010) Constructing a pedestrian recognition system with a public open database, without the necessity of re-training: an experimental study. Pattern Anal Appl 13(2):223\u2013233","journal-title":"Pattern Anal Appl"},{"issue":"3","key":"10338_CR35","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/42.764896","volume":"18","author":"JK Kim","year":"1999","unstructured":"Kim J K, Park H W (1999) Statistical textural features for detection of microcalcifications in digitized mammograms. IEEE Trans Med Imaging 18(3):231\u2013238","journal-title":"IEEE Trans Med Imaging"},{"doi-asserted-by":"crossref","unstructured":"Kim G, Eum S, Suhr J K, Kim D I, Park K R, Kim J (2012) Face liveness detection based on texture and frequency analyses. In: 2012 5th IAPR international conference on biometrics (ICB). IEEE, pp 67\u201372","key":"10338_CR36","DOI":"10.1109\/ICB.2012.6199760"},{"issue":"8","key":"10338_CR37","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1109\/TIP.2015.2422574","volume":"24","author":"W Kim","year":"2015","unstructured":"Kim W, Suh S, Han J -J (2015) Face liveness detection from a single image via diffusion speed model. IEEE Trans Image Process 24(8):2456\u20132465","journal-title":"IEEE Trans Image Process"},{"doi-asserted-by":"crossref","unstructured":"Kollreider K, Fronthaler H, Bigun J (2008) Verifying liveness by multiple experts in face biometrics. In: 2008 IEEE Computer Society conference on computer vision and pattern recognition workshops. IEEE, pp 1\u20136","key":"10338_CR38","DOI":"10.1109\/CVPRW.2008.4563115"},{"doi-asserted-by":"crossref","unstructured":"Komulainen J, Hadid A, Pietik\u00e4inen M, Anjos A, Marcel S (2013) Complementary countermeasures for detecting scenic face spoofing attacks. In: 2013 International conference on biometrics (ICB). IEEE, pp 1\u20137","key":"10338_CR39","DOI":"10.1109\/ICB.2013.6612968"},{"issue":"2","key":"10338_CR40","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1023\/A:1022859003006","volume":"51","author":"LI Kuncheva","year":"2003","unstructured":"Kuncheva L I, Whitaker C J (2003) Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy. Mach Learn 51(2):181\u2013207","journal-title":"Mach Learn"},{"doi-asserted-by":"crossref","unstructured":"Lagorio A, Tistarelli M, Cadoni M, Fookes C, Sridharan S (2013) Liveness detection based on 3d face shape analysis. In: 2013 International workshop on biometrics and forensics (IWBF). IEEE, pp 1\u20134","key":"10338_CR41","DOI":"10.1109\/IWBF.2013.6547310"},{"unstructured":"Lai C -L, Chen J -H, Hsu J -Y, Chu C -H (2013) Spoofing face detection based on spatial and temporal features analysis. In: 2013 IEEE 2nd global conference on consumer electronics (GCCE). IEEE, pp 301\u2013302","key":"10338_CR42"},{"doi-asserted-by":"crossref","unstructured":"Lakshminarayana N N, Narayan N, Napp N, Setlur S, Govindaraju V (2017) A discriminative spatio-temporal mapping of face for liveness detection. In: 2017 IEEE international conference on identity, security and behavior analysis (ISBA). IEEE, pp 1\u20137","key":"10338_CR43","DOI":"10.1109\/ISBA.2017.7947707"},{"issue":"17","key":"10338_CR44","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan M K, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in dct domain. Int J Phys Sci 5(17):2543\u20132554","journal-title":"Int J Phys Sci"},{"doi-asserted-by":"crossref","unstructured":"Leng L, Li M, Teoh A B J (2013) Conjugate 2dpalmhash code for secure palm-print-vein verification. In: 2013 6th International congress on image and signal processing (CISP), vol 3. IEEE, pp 1705\u20131710","key":"10338_CR45","DOI":"10.1109\/CISP.2013.6743951"},{"issue":"11","key":"10338_CR46","doi-asserted-by":"publisher","first-page":"1860","DOI":"10.1002\/sec.900","volume":"7","author":"L Leng","year":"2014","unstructured":"Leng L, Teoh A B J, Li M, Khan M K (2014) A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur Commun Netw 7(11):1860\u20131871","journal-title":"Secur Commun Netw"},{"issue":"1","key":"10338_CR47","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11042-015-3058-7","volume":"76","author":"L Leng","year":"2017","unstructured":"Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333\u2013354","journal-title":"Multimed Tools Appl"},{"unstructured":"Li J, Wang Y, Tan T, Jain A K (2004) Live face detection based on the analysis of fourier spectra. In: Biometric technology for human identification, vol 5404. International Society for Optics and Photonics, pp 296\u2013303","key":"10338_CR48"},{"doi-asserted-by":"crossref","unstructured":"Li Y, Po L -M, Xu X, Feng L, Yuan F (2016) Face liveness detection and recognition using shearlet based feature descriptors. In: 2016 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 874\u2013877","key":"10338_CR49","DOI":"10.1109\/ICASSP.2016.7471800"},{"doi-asserted-by":"crossref","unstructured":"Liu W (2014) Face liveness detection using analysis of fourier spectra based on hair. In: 2014 International conference on wavelet analysis and pattern recognition. IEEE, pp 75\u201380","key":"10338_CR50","DOI":"10.1109\/ICWAPR.2014.6961294"},{"doi-asserted-by":"crossref","unstructured":"Liu X, Lu R, Liu W (2017) Face liveness detection based on enhanced local binary patterns. In: 2017 Chinese automation congress (CAC). IEEE, pp 6301\u20136305","key":"10338_CR51","DOI":"10.1109\/CAC.2017.8243913"},{"doi-asserted-by":"crossref","unstructured":"Liu Y, Stehouwer J, Jourabloo A, Liu X (2019) Deep tree learning for zero-shot face anti-spoofing. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 4680\u20134689","key":"10338_CR52","DOI":"10.1109\/CVPR.2019.00481"},{"doi-asserted-by":"crossref","unstructured":"Lowe D G (1999) Object recognition from local scale-invariant features. In: Proceedings of the seventh IEEE international conference on computer vision, vol 2. IEEE, pp 1150\u20131157","key":"10338_CR53","DOI":"10.1109\/ICCV.1999.790410"},{"doi-asserted-by":"crossref","unstructured":"Luan X, Wang H, Ou W, Liu L (2017) Face liveness detection with recaptured feature extraction. In: 2017 International conference on security, pattern analysis, and cybernetics (SPAC). IEEE, pp 429\u2013432","key":"10338_CR54","DOI":"10.1109\/SPAC.2017.8304317"},{"unstructured":"M\u00e4\u00e4tt\u00e4 J, Hadid A, Pietik\u00e4inen M (2011) Face spoofing detection from single images using micro-texture analysis. In: 2011 international joint conference on biometrics (IJCB). IEEE, pp 1\u20137","key":"10338_CR55"},{"doi-asserted-by":"crossref","unstructured":"Marsland S (2015) Machine learning: An algorithmic perspective. CRC Press","key":"10338_CR56","DOI":"10.1201\/b17476"},{"unstructured":"Marziliano P, Dufaux F, Winkler S, Ebrahimi T (2002) A no-reference perceptual blur metric. In: Proceedings. International conference on image processing, vol 3. IEEE, pp III\u2013III","key":"10338_CR57"},{"issue":"7","key":"10338_CR58","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971\u2013987","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"doi-asserted-by":"crossref","unstructured":"Okereafor K, Onime C, Osuagwu O (2017) Enhancing biometric liveness detection using trait randomization technique. In: 2017 UKSim-AMSS 19th international conference on computer modelling & simulation (UKSim). IEEE, pp 28\u201333","key":"10338_CR59","DOI":"10.1109\/UKSim.2017.44"},{"doi-asserted-by":"crossref","unstructured":"Pan G, Sun L, Wu Z, Lao S (2007) Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: 2007 IEEE 11th international conference on computer vision. IEEE, pp 1\u20138","key":"10338_CR60","DOI":"10.1109\/ICCV.2007.4409068"},{"issue":"10","key":"10338_CR61","first-page":"2268","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel K, Han H, Jain A K (2016) Secure face unlock: spoof detection on smartphones. IEEE Trans Pattern Anal Mach Intell 11(10):2268\u20132283","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"doi-asserted-by":"crossref","unstructured":"Peixoto B, Michelassi C, Rocha A (2011) Face liveness detection under bad illumination conditions. In: 2011 18th IEEE international conference on image processing. IEEE, pp 3557\u20133560","key":"10338_CR62","DOI":"10.1109\/ICIP.2011.6116484"},{"issue":"5","key":"10338_CR63","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/TIFS.2015.2395139","volume":"10","author":"A Pinto","year":"2015","unstructured":"Pinto A, Schwartz W R, Pedrini H, de Rezende Rocha A (2015) Using visual rhythms for detecting video-based facial spoof attacks. IEEE Trans Inf Forensics Secur 10(5):1025\u20131038","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"10338_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3038924","volume":"50","author":"R Ramachandra","year":"2017","unstructured":"Ramachandra R, Busch C (2017) Presentation attack detection methods for face recognition systems: a comprehensive survey. ACM Comput Surv (CSUR) 50(1):1\u201337","journal-title":"ACM Comput Surv (CSUR)"},{"key":"10338_CR65","volume-title":"Introduction to information retrieval, vol 39","author":"H Sch\u00fctze","year":"2008","unstructured":"Sch\u00fctze H, Manning C D, Raghavan P (2008) Introduction to information retrieval, vol 39. Cambridge University Press, Cambridge"},{"doi-asserted-by":"crossref","unstructured":"Schwartz W R, Rocha A, Pedrini H (2011) Face spoofing detection through partial least squares and low-level descriptors. In: 2011 International joint conference on biometrics (IJCB). IEEE, pp 1\u20138","key":"10338_CR66","DOI":"10.1109\/IJCB.2011.6117592"},{"doi-asserted-by":"crossref","unstructured":"Sun L, Pan G, Wu Z, Lao S (2007) Blinking-based live face detection using conditional random fields. In: International conference on biometrics. Springer, pp 252\u2013260","key":"10338_CR67","DOI":"10.1007\/978-3-540-74549-5_27"},{"doi-asserted-by":"crossref","unstructured":"Tan X, Li Y, Liu J, Jiang L (2010) Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: European conference on computer vision. Springer, pp 504\u2013517","key":"10338_CR68","DOI":"10.1007\/978-3-642-15567-3_37"},{"doi-asserted-by":"crossref","unstructured":"Tronci R, Giacinto G, Roli F (2009) Dynamic score combination: a supervised and unsupervised score combination method. In: International workshop on machine learning and data mining in pattern recognition. Springer, pp 163\u2013177","key":"10338_CR69","DOI":"10.1007\/978-3-642-03070-3_13"},{"doi-asserted-by":"crossref","unstructured":"Tronci R, Muntoni D, Fadda G, Pili M, Sirena N, Murgia G, Ristori M, Ricerche S, Roli F (2011) Fusion of multiple clues for photo-attack detection in face recognition systems. In: 2011 International joint conference on biometrics (IJCB). IEEE, pp 1\u20136","key":"10338_CR70","DOI":"10.1109\/IJCB.2011.6117522"},{"unstructured":"Vu N -S, Caplier A (2010) Face recognition with patterns of oriented edge magnitudes. In: European conference on computer vision. Springer, pp 313\u2013326","key":"10338_CR71"},{"issue":"3","key":"10338_CR72","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/TPAMI.2013.145","volume":"36","author":"D Wang","year":"2013","unstructured":"Wang D, Hoi S C, He Y, Zhu J, Mei T, Luo J (2013) Retrieval-based face annotation by weak label regularized local coordinate coding. IEEE Trans Pattern Anal Mach Intell 36(3):550\u2013563","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"12","key":"10338_CR73","doi-asserted-by":"publisher","first-page":"3858","DOI":"10.1109\/TGRS.2007.898446","volume":"45","author":"B Waske","year":"2007","unstructured":"Waske B, Benediktsson J A (2007) Fusion of support vector machines for classification of multisensor data. IEEE Trans Geosci Remote Sens 45 (12):3858\u20133866","journal-title":"IEEE Trans Geosci Remote Sens"},{"issue":"4","key":"10338_CR74","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen D, Han H, Jain A K (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746\u2013761","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"10338_CR75","first-page":"1489","volume":"33","author":"J Wu","year":"2010","unstructured":"Wu J, Rehg J M (2010) Centrist: a visual descriptor for scene categorization. IEEE Trans Pattern Anal Mach Intell 33(8):1489\u20131501","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"doi-asserted-by":"crossref","unstructured":"Yan J, Zhang Z, Lei Z, Yi D, Li S Z (2012) Face liveness detection by exploring multiple scenic clues. In: 2012 12th International conference on control automation robotics & vision (ICARCV). IEEE, pp 188\u2013193","key":"10338_CR76","DOI":"10.1109\/ICARCV.2012.6485156"},{"doi-asserted-by":"crossref","unstructured":"Yang L (2014) Face liveness detection by focusing on frontal faces and image backgrounds. In: 2014 International conference on wavelet analysis and pattern recognition. IEEE, pp 93\u201397","key":"10338_CR77","DOI":"10.1109\/ICWAPR.2014.6961297"},{"unstructured":"Yeh C -H, Chang H -H (2017) Face liveness detection with feature discrimination between sharpness and blurriness. In: 2017 Fifteenth IAPR international conference on machine vision applications (MVA). IEEE, pp 398\u2013401","key":"10338_CR78"},{"unstructured":"Yeh C -H, Chang H -H (2018) Face liveness detection based on perceptual image quality assessment features with multi-scale analysis. In: 2018 IEEE Winter conference on applications of computer vision (WACV). IEEE, pp 49\u201356","key":"10338_CR79"},{"doi-asserted-by":"crossref","unstructured":"Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li S Z (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on Biometrics (ICB). IEEE, pp 26\u201331","key":"10338_CR80","DOI":"10.1109\/ICB.2012.6199754"},{"unstructured":"Ziegler A, Christiansen E, Kriegman D, Belongie S J (2012) Locally uniform comparison image descriptor. In: Advances in neural information processing systems, pp 1\u20139","key":"10338_CR81"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10338-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10338-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10338-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:57:38Z","timestamp":1619503058000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10338-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":81,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10338"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10338-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"11 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}