{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T17:56:48Z","timestamp":1774893408406,"version":"3.50.1"},"reference-count":97,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s11263-024-02240-2","type":"journal-article","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T17:02:11Z","timestamp":1729184531000},"page":"1689-1710","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Towards Data-Centric Face Anti-spoofing: Improving Cross-Domain Generalization via Physics-Based Data Synthesis"],"prefix":"10.1007","volume":"133","author":[{"given":"Rizhao","family":"Cai","sequence":"first","affiliation":[]},{"given":"Cecelia","family":"Soh","sequence":"additional","affiliation":[]},{"given":"Zitong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Haoliang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wenhan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Alex C.","family":"Kot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,17]]},"reference":[{"issue":"8","key":"2240_CR1","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet, Z., Komulainen, J., & Hadid, A. (2016). Face spoofing detection using colour texture analysis. IEEE Transactions on Information Forensics and Security, 11(8), 1818\u20131830. https:\/\/doi.org\/10.1109\/TIFS.2016.2555286","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR2","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., Hadid, A. (2017). OULU-NPU: A mobile face presentation attack database with real-world variations. IEEE International Conference on Automatic Face and Gesture Recognition.","DOI":"10.1109\/FG.2017.77"},{"key":"2240_CR3","unstructured":"Cai, R., & Chen, C. (2019). Learning deep forest with multi-scale local binary pattern features for face anti-spoofing. arXiv preprint arXiv:1910.03850. ,"},{"key":"2240_CR4","doi-asserted-by":"crossref","unstructured":"Cai, R., Cui, Y., Li, Z., Yu, Z., Li, H., Hu, Y., Kot, A. (2023). Rehearsal-Free Domain Continual Face Anti-Spoofing: Generalize More and Forget Less. Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (p.8037-8048).","DOI":"10.1109\/ICCV51070.2023.00738"},{"key":"2240_CR5","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1109\/TIFS.2020.3026553","volume":"16","author":"R Cai","year":"2020","unstructured":"Cai, R., Li, H., Wang, S., Chen, C., & Kot, A. C. (2020). DRL-FAS: A novel framework based on deep reinforcement learning for face anti-spoofing. IEEE Transactions on Information Forensics and Security, 16, 937\u2013951.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR6","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1109\/TIFS.2022.3158551","volume":"17","author":"R Cai","year":"2022","unstructured":"Cai, R., Li, Z., Wan, R., Li, H., Hu, Y., & Kot, A. C. (2022). Learning Meta Pattern for Face Anti-Spoofing. IEEE Transactions on Information Forensics and Security, 17, 1201\u20131213. https:\/\/doi.org\/10.1109\/TIFS.2022.3158551","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR7","doi-asserted-by":"crossref","unstructured":"Cai, R., Song, Z., Guan, D., Chen, Z., Luo, X., Yi, C., Kot, A. (2024). Benchlmm: Benchmarking cross-style visual capability of large multimodal models. European Conference on Computer Vision (ECCV).","DOI":"10.1007\/978-3-031-72973-7_20"},{"key":"2240_CR8","doi-asserted-by":"crossref","unstructured":"Cai, R., Yu, Z., Kong, C., Li, H., Chen, C., Hu, Y.H., Kot, A. (2024). S-adapter: Generalizing vision transformer for face anti-spoofing with statistical tokens. IEEE Transactions on Information Forensics Security.","DOI":"10.1109\/TIFS.2024.3420699"},{"issue":"4","key":"2240_CR9","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TCE.2017.015103","volume":"63","author":"S-H Chae","year":"2017","unstructured":"Chae, S.-H., Yoo, C.-H., Sun, J.-Y., Kang, M.-C., & Ko, S.-J. (2017). Subpixel rendering for the pentile display based on the human visual system. IEEE Transactions on Consumer Electronics, 63(4), 401\u2013409.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"2240_CR10","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1109\/TIFS.2023.3333548","volume":"19","author":"C Chen","year":"2023","unstructured":"Chen, C., Li, B., Cai, R., Zeng, J., & Huang, J. (2023). Distortion model-based spectral augmentation for generalized recaptured document detection. IEEE Transactions on Information Forensics and Security, 19, 1283\u20131298.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR11","unstructured":"Chingovska, I., Anjos, A., Marcel, S. (2012). On the effectiveness of local binary patterns in face anti-spoofing. 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG) (p.1-7)."},{"key":"2240_CR12","unstructured":"ChromaSoft (n.d.). ICM Profiles.[SPACE]https:\/\/sites.google.com\/site\/chromasoft\/icmprofiles."},{"key":"2240_CR13","unstructured":"Consortium, I.C., et\u00a0al. (2004). The role of icc profiles in a colour reproduction system. ICC White Paper: http:\/\/www. color. org\/ICC_white_paper_7_role_of_ICC_profiles. pdf, , ,"},{"key":"2240_CR14","doi-asserted-by":"crossref","unstructured":"Cubuk, E.D., Zoph, B., Mane, D., Vasudevan, V., Le, Q.V. (2019). AutoAugment: Learning augmentation strategies from data. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (pp. 113\u2013123).","DOI":"10.1109\/CVPR.2019.00020"},{"key":"2240_CR15","doi-asserted-by":"crossref","unstructured":"Cubuk, E.D., Zoph, B., Shlens, J., Le, Q.V. (2020). Randaugment: Practical automated data augmentation with a reduced search space. Proceedings of the ieee\/cvf conference on computer vision and pattern recognition workshops (pp. 702\u2013703).","DOI":"10.1109\/CVPRW50498.2020.00359"},{"issue":"1","key":"2240_CR16","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1186\/1687-5281-2014-2","volume":"2014","author":"T de Freitas Pereira","year":"2014","unstructured":"de Freitas Pereira, T., Komulainen, J., Anjos, A., De Martino, J. M., Hadid, A., Pietik\u00e4inen, M., & Marcel, S. (2014). Face liveness detection using dynamic texture. EURASIP Journal on Image and Video Processing, 2014(1), 2.","journal-title":"EURASIP Journal on Image and Video Processing"},{"key":"2240_CR17","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., others (2020). An image is worth 16x16 words: Transformers for image recognition at scale. International Conference on Learning Representations (ICLR)."},{"key":"2240_CR18","unstructured":"Eck, D.J. (2021). Introduction to computer graphics. In (pp. 212\u2013215). Hobart and William Smith College."},{"key":"2240_CR19","doi-asserted-by":"crossref","unstructured":"Elliott, C.H.B., Han, S., Im, M.H., Higgins, M., Higgins, P., Hong, M., Chung, K. (2002). 13.3 co-optimization of color amlcd subpixel architecture and rendering algorithms. SID Symposium Digest of Technical Papers (Vol.\u00a033, pp. 172\u2013175).","DOI":"10.1889\/1.1830224"},{"issue":"3","key":"2240_CR20","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1109\/MSP.2013.2241311","volume":"30","author":"L Fang","year":"2013","unstructured":"Fang, L., Au, O. C., & Cheung, N.-M. (2013). Subpixel rendering: from font rendering to image subsampling [applications corner]. IEEE Signal Processing Magazine, 30(3), 177\u2013189.","journal-title":"IEEE Signal Processing Magazine"},{"key":"2240_CR21","unstructured":"Ford, A., & Roberts, A. (1998). Colour space conversions. Westminster University, London,1998, 1\u201331."},{"key":"2240_CR22","doi-asserted-by":"crossref","unstructured":"Galbally, J., & Marcel, S. (2014). Face Anti-spoofing Based on General Image Quality Assessment. 2014 22nd International Conference on Pattern Recognition (p.1173-1178).","DOI":"10.1109\/ICPR.2014.211"},{"issue":"4","key":"2240_CR23","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/TIFS.2015.2411394","volume":"10","author":"DC Garcia","year":"2015","unstructured":"Garcia, D. C., & de Queiroz, R. L. (2015). Face-spoofing 2d-detection based on moir\u00e9-pattern analysis. IEEE Transactions on Information Forensics and Security, 10(4), 778\u2013786.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"2240_CR24","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/TIFS.2015.2411394","volume":"10","author":"DC Garcia","year":"2015","unstructured":"Garcia, D. C., & de Queiroz, R. L. (2015). Face-spoofing 2D-detection based on Moir\u00e9-pattern analysis. IEEE Transactions on Information Forensics and Security, 10(4), 778\u2013786.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR25","doi-asserted-by":"crossref","unstructured":"Green, P. (2013). Gamut mapping for the perceptual reference medium gamut. 2013 Colour and Visual Computing Symposium (CVCS) (pp. 1\u20136).","DOI":"10.1109\/CVCS.2013.6626285"},{"key":"2240_CR26","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., Girshick, R. (2020). Momentum contrast for unsupervised visual representation learning. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (pp. 9729\u20139738).","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"2240_CR27","doi-asserted-by":"crossref","unstructured":"Huang, H-P., Sun, D., Liu, Y., Chu, W-S., Xiao, T., Yuan, J. & Yang, M-H. (2022). Adaptive transformers for robust few-shot cross-domain face anti-spoofing. European conference on computer vision.","DOI":"10.1007\/978-3-031-19778-9_3"},{"key":"2240_CR28","unstructured":"HutchColor, L. (n.d.). RGB color space profiles.[SPACE]http:\/\/www.hutchcolor.com\/profiles.html."},{"key":"2240_CR29","unstructured":"Incorporated, A.S. (n.d.). ICC profile downloads - Windows - Adobe Inc.[SPACE]https:\/\/www.adobe.com\/support\/downloads\/iccprofiles\/iccprofiles_win.html."},{"key":"2240_CR30","doi-asserted-by":"crossref","unstructured":"Jia, Y., Zhang, J., Shan, S., Chen, X. (2020). Single-Side Domain Generalization for Face Anti-Spoofing. 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (p.8481-8490).","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"2240_CR31","unstructured":"Jie, S., & Deng, Z-H. (2022). Convolutional bypasses are better vision transformer adapters. arXiv preprint arXiv:2207.07039."},{"key":"2240_CR32","unstructured":"Joshi, P. (2015). Opencv with python by example. In (p.39-40). Packt Publishing Ltd."},{"key":"2240_CR33","unstructured":"Khalid, M.J. (2021). Introduction to image processing using python.[SPACE]https:\/\/ggcarvalho.dev\/posts\/imageproc\/."},{"key":"2240_CR34","first-page":"18661","volume":"33","author":"P Khosla","year":"2020","unstructured":"Khosla, P., Teterwak, P., Wang, C., Sarna, A., Tian, Y., Isola, P., & Krishnan, D. (2020). Supervised contrastive learning. Advances in Neural Information Processing Systems, 33, 18661\u201318673.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"2240_CR35","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D. E. (2009). Dlib-ml: A machine learning toolkit. Journal of Machine Learning Research, 10, 1755\u20131758.","journal-title":"Journal of Machine Learning Research"},{"key":"2240_CR36","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., Pietik\u00e4inen, M., Anjos, A., Marcel, S. (2013). Complementary countermeasures for detecting scenic face spoofing attacks. 2013 International Conference on Biometrics (ICB) (p.1-7).","DOI":"10.1109\/ICB.2013.6612968"},{"key":"2240_CR37","volume-title":"Modern digital halftoning","author":"DL Lau","year":"2018","unstructured":"Lau, D. L., & Arce, G. R. (2018). Modern digital halftoning. Boca Raton: CRC Press."},{"issue":"10","key":"2240_CR38","doi-asserted-by":"publisher","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., He, P., Wang, S., Rocha, A., Jiang, X., & Kot, A. C. (2018). Learning generalized deep feature representation for face anti-spoofing. IEEE Transactions on Information Forensics and Security, 13(10), 2639\u20132652. https:\/\/doi.org\/10.1109\/TIFS.2018.2825949","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"7","key":"2240_CR39","doi-asserted-by":"publisher","first-page":"1794","DOI":"10.1109\/TIFS.2018.2801312","volume":"13","author":"H Li","year":"2018","unstructured":"Li, H., Li, W., Cao, H., Wang, S., Huang, F., & Kot, A. C. (2018). Unsupervised domain adaptation for face anti-spoofing. IEEE Transactions on Information Forensics and Security, 13(7), 1794\u20131809. https:\/\/doi.org\/10.1109\/TIFS.2018.2801312","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR40","doi-asserted-by":"crossref","unstructured":"Li, H., Pan, S.J., Wang, S., Kot, A.C. (2018). Domain Generalization with Adversarial Feature Learning. Proceedings of the ieee conference on computer vision and pattern recognition (pp. 5400\u20135409).","DOI":"10.1109\/CVPR.2018.00566"},{"key":"2240_CR41","doi-asserted-by":"crossref","unstructured":"Li, H., Wang, S., Kot, A.C. (2016). Face spoofing detection with image quality regression. 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA) (p.1-6).","DOI":"10.1109\/IPTA.2016.7821027"},{"issue":"9","key":"2240_CR42","doi-asserted-by":"publisher","first-page":"2246","DOI":"10.1109\/TIFS.2019.2895212","volume":"14","author":"L Li","year":"2019","unstructured":"Li, L., Xia, Z., Hadid, A., Jiang, X., Zhang, H., & Feng, X. (2019). Replayed video attack detection based on motion blur analysis. IEEE Transactions on Information Forensics and Security, 14(9), 2246\u20132261. https:\/\/doi.org\/10.1109\/TIFS.2019.2895212","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR43","doi-asserted-by":"crossref","unstructured":"Li, Y., Hu, G., Wang, Y., Hospedales, T., Robertson, N.M., Yang, Y. (2020). Differentiable automatic data augmentation. European Conference on Computer Vision (pp. 580\u2013595).","DOI":"10.1007\/978-3-030-58542-6_35"},{"key":"2240_CR44","doi-asserted-by":"crossref","unstructured":"Li, Z., Cai, R., Li, H., Lam, K-Y., Hu, Y., Kot, A.C. (2022). One-class knowledge distillation for face presentation attack detection. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2022.3178240"},{"key":"2240_CR45","doi-asserted-by":"crossref","unstructured":"Lin, X., Wang, S., Cai, R., Liu, Y., Fu, Y., Tang, W., Kot, A. (2024). Suppress and rebalance: Towards generalized multi-modal face anti-spoofing. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (p.211-221).","DOI":"10.1109\/CVPR52733.2024.00028"},{"key":"2240_CR46","unstructured":"LingChen, T.C., Khonsari, A., Lashkari, A., Nazari, M.R., Sambee, J.S., Nascimento, M.A. (2020). UniformAugment: A search-free probabilistic data augmentation approach. arXiv preprint arXiv:2003.14348."},{"key":"2240_CR47","doi-asserted-by":"crossref","unstructured":"Liu, A., Tan, Z., Wan, J., Escalera, S., Guo, G., Li, S.Z. (2021). CASIA-SURF CeFA: A benchmark for multi-modal cross-ethnicity face anti-spoofing. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (pp. 1179\u20131187).","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"2240_CR48","doi-asserted-by":"crossref","first-page":"2497","DOI":"10.1109\/TIFS.2022.3188149","volume":"17","author":"A Liu","year":"2022","unstructured":"Liu, A., Zhao, C., Yu, Z., Wan, J., Su, A., Liu, X., et al. (2022). Contrastive context-aware learning for 3d high-fidelity mask face presentation attack detection. IEEE Transactions on Information Forensics and Security, 17, 2497\u20132507.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR49","doi-asserted-by":"crossref","unstructured":"Liu, S., Yang, B., Yuen, P.C., Zhao, G. (2016). A 3D mask face anti-spoofing database with real world variations. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (pp. 100\u2013106).","DOI":"10.1109\/CVPRW.2016.193"},{"key":"2240_CR50","doi-asserted-by":"crossref","unstructured":"Liu, Y., Chen, Y., Dai, W., Gou, M., Huang, C-T., Xiong, H. (2022). Source-free domain adaptation with contrastive domain alignment and self-supervised exploration for face anti-spoofing. European Conference on Computer Vision (pp. 511\u2013528).","DOI":"10.1007\/978-3-031-19775-8_30"},{"key":"2240_CR51","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X. (2018). Learning Deep Models for Face Anti-Spoofing: Binary or Auxiliary Supervision. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 389\u2013398). Salt Lake City, UT.","DOI":"10.1109\/CVPR.2018.00048"},{"key":"2240_CR52","doi-asserted-by":"publisher","unstructured":"Liu, Y., & Liu, X. (2022). Spoof trace disentanglement for generic face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence,1\u20131,. https:\/\/doi.org\/10.1109\/TPAMI.2022.3176387","DOI":"10.1109\/TPAMI.2022.3176387"},{"key":"2240_CR53","unstructured":"Morris, R.A. (2005). Colour management. H\u00e4user, CL, Steiner, A, Holstein, J, and Scoble M J. Digital imaging of biological type specimens. A manual for best practice. Stuttgart: European Network for Biodiversity Information, , 31\u201336,"},{"key":"2240_CR54","doi-asserted-by":"crossref","unstructured":"M\u00fcller, S.G., & Hutter, F. (2021). Trivialaugment: Tuning-free yet state-of-the-art data augmentation. Proceedings of the IEEE\/CVF International Conference on Computer Vision (pp. 774\u2013782).","DOI":"10.1109\/ICCV48922.2021.00081"},{"key":"2240_CR55","unstructured":"Pappas, T.N. (1994). Digital halftoning techniques for printing. Icps (Vol.\u00a094, p.47th)."},{"key":"2240_CR56","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Cabo, D., Jim\u00e9nez-Cabello, D., Costa-Pazo, A., L\u00f3pez-Sastre, R.J. (2020). Learning to Learn Face-PAD: a lifelong learning approach. 2020 IEEE International Joint Conference on Biometrics (IJCB) (pp. 1\u20139).","DOI":"10.1109\/IJCB48548.2020.9304920"},{"key":"2240_CR57","unstructured":"Peters, C. (2016). Free blue noise textures.[SPACE]http:\/\/momentsingraphics.de\/BlueNoise.html. Moments in Graphics."},{"key":"2240_CR58","doi-asserted-by":"crossref","unstructured":"Pfeiffer, J., Kamath, A., R\u00fcckl\u00e9, A., Cho, K., Gurevych, I. (2021). Adapterfusion: Non-destructive task composition for transfer learning. Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics.","DOI":"10.18653\/v1\/2021.eacl-main.39"},{"key":"2240_CR59","doi-asserted-by":"publisher","first-page":"3347","DOI":"10.1109\/TIFS.2020.2988168","volume":"15","author":"A Pinto","year":"2020","unstructured":"Pinto, A., Goldenstein, S., Ferreira, A., Carvalho, T., Pedrini, H., & Rocha, A. (2020). Leveraging shape, reflectance and albedo from shading for face presentation attack detection. IEEE Transactions on Information Forensics and Security, 15, 3347\u20133358. https:\/\/doi.org\/10.1109\/TIFS.2020.2988168","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR60","doi-asserted-by":"publisher","unstructured":"Qin, Y., Yu, Z., Yan, L., Wang, Z., Zhao, C., & Lei, Z. (2021). Meta-teacher for Face Anti-Spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence, Early Access,1\u20131,. https:\/\/doi.org\/10.1109\/TPAMI.2021.3091167","DOI":"10.1109\/TPAMI.2021.3091167"},{"key":"2240_CR61","doi-asserted-by":"crossref","unstructured":"Shao, R., Lan, X., Li, J., Yuen, P.C. (2019). Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection. 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (p.10015-10023).","DOI":"10.1109\/CVPR.2019.01026"},{"issue":"07","key":"2240_CR62","doi-asserted-by":"publisher","first-page":"11974","DOI":"10.1609\/aaai.v34i07.6873","volume":"34","author":"R Shao","year":"2020","unstructured":"Shao, R., Lan, X., & Yuen, P. C. (2020). Regularized fine-grained meta face anti-spoofing. Proceedings of the AAAI Conference on Artificial Intelligence, 34(07), 11974\u201311981. https:\/\/doi.org\/10.1609\/aaai.v34i07.6873","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"issue":"1","key":"2240_CR63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-019-0197-0","volume":"6","author":"C Shorten","year":"2019","unstructured":"Shorten, C., & Khoshgoftaar, T. M. (2019). A survey on image data augmentation for deep learning. Journal of Big Data, 6(1), 1\u201348.","journal-title":"Journal of Big Data"},{"issue":"1","key":"2240_CR64","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1889\/1.2166833","volume":"14","author":"JP Spindler","year":"2006","unstructured":"Spindler, J. P., Hatwar, T. K., Miller, M. E., Arnold, A. D., Murdoch, M. J., Kane, P.J. Van., & Slyke, S. A. (2006). System considerations for rgbw oled displays. Journal of the Society for Information Display, 14(1), 37\u201348.","journal-title":"Journal of the Society for Information Display"},{"key":"2240_CR65","doi-asserted-by":"crossref","unstructured":"Srivatsan, K., Naseer, M., Nandakumar, K. (2023). FLIP: Cross-domain face anti-spoofing with language guidance. Proceedings of the IEEE\/CVF International Conference on Computer Vision (pp. 19685\u201319696).","DOI":"10.1109\/ICCV51070.2023.01803"},{"key":"2240_CR66","doi-asserted-by":"publisher","first-page":"3181","DOI":"10.1109\/TIFS.2020.2985530","volume":"15","author":"W Sun","year":"2020","unstructured":"Sun, W., Song, Y., Chen, C., Huang, J., & Kot, A. C. (2020). Face spoofing detection based on local ternary label supervision in fully convolutional networks. IEEE Transactions on Information Forensics and Security, 15, 3181\u20133196. https:\/\/doi.org\/10.1109\/TIFS.2020.2985530","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"2240_CR67","doi-asserted-by":"crossref","first-page":"1320","DOI":"10.1111\/2041-210X.12439","volume":"6","author":"J Troscianko","year":"2015","unstructured":"Troscianko, J., & Stevens, M. (2015). Image calibration and analysis toolbox-a free software suite for objectively measuring reflectance, colour and pattern. Methods in Ecology and Evolution, 6(11), 1320\u20131331.","journal-title":"Methods in Ecology and Evolution"},{"issue":"1","key":"2240_CR68","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/5.3288","volume":"76","author":"RA Ulichney","year":"1988","unstructured":"Ulichney, R. A. (1988). Dithering with blue noise. Proceedings of the IEEE, 76(1), 56\u201379.","journal-title":"Proceedings of the IEEE"},{"key":"2240_CR69","doi-asserted-by":"crossref","unstructured":"Ulichney, R.A. (1993). Void-and-cluster method for dither array generation. Human vision, visual processing, and digital display iv (Vol. 1913, pp. 332\u2013343).","DOI":"10.1117\/12.152707"},{"key":"2240_CR70","doi-asserted-by":"crossref","unstructured":"Wan, R., Shi, B., Duan, L-Y., Tan, A-H., Kot, A.C. (2017). Benchmarking single-image reflection removal algorithms. Proceedings of the IEEE International Conference on Computer Vision (pp. 3922\u20133930).","DOI":"10.1109\/ICCV.2017.423"},{"key":"2240_CR71","doi-asserted-by":"publisher","unstructured":"Wan, R., Shi, B., Li, H., Hong, Y., Duan, L., & Kot Chichung, A. (2022). Benchmarking single-image reflection removal algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence,1\u20131,. https:\/\/doi.org\/10.1109\/TPAMI.2022.3168560","DOI":"10.1109\/TPAMI.2022.3168560"},{"key":"2240_CR72","doi-asserted-by":"crossref","unstructured":"Wang, C-Y., Lu, Y-D., Yang, S-T., Lai, S-H. (2022). PatchNet: A Simple Face Anti-Spoofing Framework via Fine-Grained Patch Recognition. Proceedings of the ieee\/cvf conference on computer vision and pattern recognition (pp. 20281\u201320290).","DOI":"10.1109\/CVPR52688.2022.01964"},{"key":"2240_CR73","doi-asserted-by":"crossref","unstructured":"Wang, G., Han, H., Shan, S., Chen, X. (2020a). Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (pp. 6678\u20136687).","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"2240_CR74","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/TIFS.2020.3002390","volume":"16","author":"G Wang","year":"2020","unstructured":"Wang, G., Han, H., Shan, S., & Chen, X. (2020). Unsupervised adversarial domain adaptation for cross-domain face presentation attack detection. IEEE Transactions on Information Forensics and Security, 16, 56\u201369.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR75","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhang, J., Bian, Y., Cai, Y., Wang, C., Pu, S. (2021). Self-domain adaptation for face anti-spoofing. Proceedings of the AAAI Conference on Artificial Intelligence (Vol.\u00a035, pp. 2746\u20132754).","DOI":"10.1609\/aaai.v35i4.16379"},{"key":"2240_CR76","doi-asserted-by":"publisher","first-page":"2333","DOI":"10.1109\/TIFS.2023.3266138","volume":"18","author":"W Wang","year":"2023","unstructured":"Wang, W., Liu, P., Zheng, H., Ying, R., & Wen, F. (2023). Domain generalization for face anti-spoofing via negative data augmentation. IEEE Transactions on Information Forensics and Security, 18, 2333\u20132344. https:\/\/doi.org\/10.1109\/TIFS.2023.3266138","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR77","doi-asserted-by":"crossref","unstructured":"Wang, W., Luo, W., Bao, L., Gao, Y., Gong, D., Zheng, S., Overwijk, A. (2019). Face Anti-Spoofing: Model Matters, so Does Data. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","DOI":"10.1109\/CVPR.2019.00362"},{"key":"2240_CR78","doi-asserted-by":"crossref","unstructured":"Wang, Z., Wang, Z., Yu, Z., Deng, W., Li, J., Gao, T., Wang, Z. (2022). Domain Generalization via Shuffled Style Assembly for Face Anti-Spoofing. Proceedings of the ieee\/cvf conference on computer vision and pattern recognition (pp. 4123\u20134133).","DOI":"10.1109\/CVPR52688.2022.00409"},{"issue":"4","key":"2240_CR79","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., & Jain, A. K. (2015). Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security, 10(4), 746\u2013761. https:\/\/doi.org\/10.1109\/TIFS.2015.2400395","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2240_CR80","doi-asserted-by":"crossref","unstructured":"Wu, H., Zeng, D., Hu, Y., Shi, H., Mei, T. (2021). Dual spoof disentanglement generation for face anti-spoofing with depth uncertainty learning. IEEE Transactions on Circuits and Systems for Video Technology","DOI":"10.1109\/TCSVT.2021.3133620"},{"key":"2240_CR81","doi-asserted-by":"crossref","unstructured":"Xiao, F., Farrell, J.E., Catrysse, P.B., Wandell, B. (2009). Mobile imaging: The big challenge of the small pixel. Digital photography v (Vol. 7250, pp. 173\u2013181).","DOI":"10.1117\/12.806616"},{"issue":"5","key":"2240_CR82","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1016\/j.orgel.2009.04.009","volume":"10","author":"Y Xiong","year":"2009","unstructured":"Xiong, Y., Wang, L., Xu, W., Zou, J., Wu, H., Xu, Y., & Yu, G. (2009). Performance analysis of pled based flat panel display with rgbw sub-pixel layout. Organic Electronics, 10(5), 857\u2013862.","journal-title":"Organic Electronics"},{"key":"2240_CR83","doi-asserted-by":"publisher","unstructured":"Yang, W., Cai, R., Kot, A. (2022). Image inpainting detection via enriched attentive pattern with near original image augmentation. Proceedings of the 30th acm international conference on multimedia (p.2816-2824). New York, NY, USA: Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3503161.3547921","DOI":"10.1145\/3503161.3547921"},{"key":"2240_CR84","doi-asserted-by":"crossref","unstructured":"Yu, Z., Cai, R., Li, Z., Yang, W., Shi, J., Kot, A.C. (2024). Benchmarking Joint Face Spoofing and Forgery Detection with Visual and Physiological Cues. IEEE Transactions on Dependable and Secure Computing (TDSC).","DOI":"10.1109\/TDSC.2024.3352049"},{"issue":"3","key":"2240_CR85","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/TBIOM.2021.3065526","volume":"3","author":"Z Yu","year":"2021","unstructured":"Yu, Z., Li, X., Shi, J., Xia, Z., & Zhao, G. (2021). Revisiting pixel-wise supervision for face anti-spoofing. IEEE Transactions on Biometrics, Behavior, and Identity Science, 3(3), 285\u2013295. https:\/\/doi.org\/10.1109\/TBIOM.2021.3065526","journal-title":"IEEE Transactions on Biometrics, Behavior, and Identity Science"},{"key":"2240_CR86","doi-asserted-by":"crossref","unstructured":"Yu, Z., Qin, Y., Li, X., Zhao, C., Lei, Z., Zhao, G. (2022). Deep learning for face anti-spoofing: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence","DOI":"10.1109\/TPAMI.2022.3215850"},{"key":"2240_CR87","doi-asserted-by":"crossref","unstructured":"Yu, Z., Qin, Y., Zhao, H., Li, X., Zhao, G. (2021). Dual-Cross Central Difference Network for Face Anti-Spoofing. International Joint Conference on Artificial Intelligence (IJCAI).","DOI":"10.24963\/ijcai.2021\/177"},{"issue":"9","key":"2240_CR88","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1109\/TPAMI.2020.3036338","volume":"43","author":"Z Yu","year":"2021","unstructured":"Yu, Z., Wan, J., Qin, Y., Li, X., Li, S. Z., & Zhao, G. (2021). NAS-FAS: static-dynamic central difference network search for face anti-spoofing. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(9), 3005\u20133023. https:\/\/doi.org\/10.1109\/TPAMI.2020.3036338","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2240_CR89","doi-asserted-by":"crossref","unstructured":"Yu, Z., Zhao, C., Wang, Z., Qin, Y., Su, Z., Li, X., Zhao, G. (2020). Searching Central Difference Convolutional Networks for Face Anti-Spoofing. 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (p.5294-5304).","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"2240_CR90","doi-asserted-by":"crossref","unstructured":"Yuan, S., Timofte, R., Slabaugh, G., Leonardis, A. (2019). Aim 2019 challenge on image demoireing: Dataset and study. 2019 IEEE\/CVF International Conference on Computer Vision Workshop (ICCVW) (pp. 3526\u20133533).","DOI":"10.1109\/ICCVW.2019.00437"},{"key":"2240_CR91","unstructured":"Zha, D., Bhat, Z.P., Lai, K-H., Yang, F., Jiang, Z., Zhong, S., Hu, X. (2023). Data-centric artificial intelligence: A survey. arXiv preprint arXiv:2303.10158"},{"key":"2240_CR92","doi-asserted-by":"crossref","unstructured":"Zhang, K-Y., Yao, T., Zhang, J., Liu, S., Yin, B., Ding, S., Li, J. (2021). Structure destruction and content combination for face anti-spoofing. 2021 IEEE International Joint Conference on Biometrics (IJCB) (pp. 1\u20136).","DOI":"10.1109\/IJCB52358.2021.9484395"},{"issue":"2","key":"2240_CR93","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/TBIOM.2020.2973001","volume":"2","author":"S Zhang","year":"2020","unstructured":"Zhang, S., Liu, A., Wan, J., Liang, Y., Guo, G., Escalera, S., & Li, S. Z. (2020). Casia-surf: A large-scale multi-modal benchmark for face anti-spoofing. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2(2), 182\u2013193.","journal-title":"IEEE Transactions on Biometrics, Behavior, and Identity Science"},{"key":"2240_CR94","unstructured":"Zhang, X., Wang, Q., Zhang, J., Zhong, Z. (2020). Adversarial AutoAugment. 2020 International Conference on Learning Representations, ICLR."},{"issue":"4","key":"2240_CR95","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1016\/S0097-8493(98)00043-0","volume":"22","author":"Y Zhang","year":"1998","unstructured":"Zhang, Y. (1998). Space-filling curve ordered dither. Computers & Graphics, 22(4), 559\u2013563.","journal-title":"Computers & Graphics"},{"key":"2240_CR96","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z. (2012). A face anti-spoofing database with diverse attacks. IAPR International Conference on Biometrics (p.26-31).","DOI":"10.1109\/ICB.2012.6199754"},{"key":"2240_CR97","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Zhang, K-Y., Yao, T., Yi, R., Ding, S., Ma, L. (2022). Adaptive mixture of experts learning for generalizable face anti-spoofing. Proceedings of the 30th ACM International Conference on Multimedia (pp. 6009\u20136018).","DOI":"10.1145\/3503161.3547769"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02240-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-024-02240-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-024-02240-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T22:02:34Z","timestamp":1743372154000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-024-02240-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":97,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["2240"],"URL":"https:\/\/doi.org\/10.1007\/s11263-024-02240-2","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"17 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}