{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:30:36Z","timestamp":1768350636752,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11277-017-5089-z","type":"journal-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T06:49:27Z","timestamp":1512370167000},"page":"2331-2344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Entropy with Local Binary Patterns for Efficient Iris Liveness Detection"],"prefix":"10.1007","volume":"102","author":[{"given":"Waleed S.-A.","family":"Fathy","sequence":"first","affiliation":[]},{"given":"Hanaa S.","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"5089_CR1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-89991-4_19","volume-title":"Biometrics and identity management","author":"V Ruiz-Albacete","year":"2008","unstructured":"Ruiz-Albacete, V., Tome-Gonzalez, P., Alonso-Fernandez, F., Galbally, J., Fierrez, J., & Ortega-Garcia, O. (2008). Direct attacks using fake images in iris verification. In B. Schouten, N. C. Juul, A. Drygajlo, & M. Tistarelli (Eds.), Biometrics and identity management (Vol. 5372, pp. 181\u2013190). Berlin: Springer."},{"key":"5089_CR2","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1007\/978-3-642-01793-3_114","volume-title":"Advances in biometrics","author":"X He","year":"2009","unstructured":"He, X., Lu, Y., & Shi, P. (2009). A new fake iris detection method. In M. Tistarelli & M. S. Nixon (Eds.), Advances in biometrics (Vol. 5558, pp. 1132\u20131139). Berlin: Springer."},{"issue":"4","key":"5089_CR3","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1109\/TIFS.2015.2404294","volume":"10","author":"D Gragnaniello","year":"2015","unstructured":"Gragnaniello, D., Poggi, G., Sansone, C., & Verdoliva, L. (2015). An investigation of local descriptors for biometric spoofing detection. IEEE Transactions on Information Forensics and Security, 10(4), 849\u2013863.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5089_CR4","unstructured":"Temdee, P., & Prasad R. (2017). Context-aware communication and computing: Applications for smart environment. Springer. ISBN: 3319590359, 9783319590356."},{"key":"5089_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4748-4","author":"CK Neha","year":"2017","unstructured":"Neha, C. K. (2017). An efficient biometric based remote user authentication technique for multi-server environment. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-017-4748-4 .","journal-title":"Wireless Personal Communications"},{"key":"5089_CR6","volume-title":"Biometrics in a data driven world: Trends, technologies and challenges","year":"2016","unstructured":"Mitra, S., & Gofman, M. (Eds.). (2016). Biometrics in a data driven world: Trends, technologies and challenges. London: Chapman and Hall\/CRC."},{"issue":"6","key":"5089_CR7","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1109\/TPAMI.2013.234","volume":"36","author":"Z Sun","year":"2014","unstructured":"Sun, Z., Zhang, H., Tan, T., & Wang, J. (2014). Iris image classification based on hierarchical visual codebook. IEEE Transactions on Pattern Analysis and Machine Intelligence, 36(6), 1120\u20131133.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"4","key":"5089_CR8","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1109\/TIFS.2015.2400393","volume":"10","author":"R Raghavendra","year":"2015","unstructured":"Raghavendra, R., & Busch, C. (2015). Robust scheme for iris presentation attack detection using multiscale binarized statistical image features. IEEE Transactions on Information Forensics and Security, 10(4), 703\u2013715.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5089_CR9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.patrec.2016.12.013","volume":"91","author":"MD Marsico","year":"2017","unstructured":"Marsico, M. D., Nappi, M., & Proen\u00e7a, H. (2017). Results from MICHE II\u2014Mobile iris challenge evaluation II. Pattern Recognition Letters, 91, 3\u201310.","journal-title":"Pattern Recognition Letters"},{"key":"5089_CR10","unstructured":"https:\/\/www.iso.org\/committee\/313770.html . Accessed March 2017."},{"key":"5089_CR11","unstructured":"LivDet-Liveness Detection Competitions. http:\/\/livdet.org\/ . Accessed September 2016."},{"key":"5089_CR12","doi-asserted-by":"crossref","unstructured":"Sequeira, A. F., Oliveira, H. P., Monteiro, J. C., Monteiro, J. P., & Cardoso, J. S. (2014). MobILive 2014\u2014Mobile iris liveness detection competition. In 2014 IEEE international joint conference on biometrics (IJCB).","DOI":"10.1109\/BTAS.2014.6996290"},{"issue":"9","key":"5089_CR13","doi-asserted-by":"crossref","first-page":"2184","DOI":"10.1109\/TIFS.2017.2701332","volume":"12","author":"A Czajka","year":"2017","unstructured":"Czajka, A., Bowyer, K. W., Krumdick, M., & Vidal Mata, R. G. (2017). Recognition of image-orientation-based iris spoofing. IEEE Transactions on Information Forensics and Security, 12(9), 2184\u20132196.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5089_CR14","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.cviu.2016.01.003","volume":"145","author":"S Bianco","year":"2016","unstructured":"Bianco, S., Ciocca, G., & Cusano, C. (2016). CURL: Image classification using co-training and unsupervised representation learning. Computer Vision and Image Understanding, 145, 15\u201329.","journal-title":"Computer Vision and Image Understanding"},{"issue":"4","key":"5089_CR15","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1109\/TPAMI.2014.2353639","volume":"37","author":"Z Ma","year":"2015","unstructured":"Ma, Z., Teschendorff, A. E., Leijon, A., Qiao, Y., Zhang, H., & Guo, J. (2015). Variational Bayesian matrix factorization for bounded support data. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(4), 876\u2013889.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"5089_CR16","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/11608288_53","volume-title":"Advances in biometrics","author":"EC Lee","year":"2005","unstructured":"Lee, E. C., Park, K. R., & Kim, J. (2005). Fake iris detection by using purkinje image. In D. Zhang & A. K. Jain (Eds.), Advances in biometrics (Vol. 3832, pp. 397\u2013403). Berlin: Springer."},{"key":"5089_CR17","doi-asserted-by":"crossref","unstructured":"He, X., Lu, Y., & Shi, P. (2008). A fake iris detection method based on FFT and quality assessment. In CCPR \u201808 Chinese conference on pattern recognition.","DOI":"10.1109\/CCPR.2008.68"},{"issue":"12","key":"5089_CR18","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1109\/TPAMI.2003.1251145","volume":"25","author":"L Ma","year":"2003","unstructured":"Ma, L., Tan, T., Wang, Y., & Zhang, D. (2003). Personal identification based on iris texture analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(12), 1519\u20131533.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"5089_CR19","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"Daugman, J. (2004). How iris recognition works. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 21\u201330.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"2","key":"5089_CR20","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","volume":"23","author":"J Galbally","year":"2014","unstructured":"Galbally, J., Marcel, S., & Fierrez, J. (2014). Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE Transactions on Image Processing, 23(2), 710\u2013724.","journal-title":"IEEE Transactions on Image Processing"},{"key":"5089_CR21","doi-asserted-by":"crossref","first-page":"1080","DOI":"10.1007\/978-3-642-01793-3_109","volume-title":"Advances in biometrics","author":"Z He","year":"2009","unstructured":"He, Z., Sun, Z., Tan, T., & Wei, Z. (2009). Efficient iris spoof detection via boosted local binary patterns. In M. Tistarelli & M. S. Nixon (Eds.), Advances in biometrics (Vol. 5558, pp. 1080\u20131090). Berlin: Springer."},{"issue":"5","key":"5089_CR22","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/TIFS.2014.2313025","volume":"9","author":"D Yadav","year":"2014","unstructured":"Yadav, D., Kohli, N., Doyle, J. S., Singh, R., Vatsa, M., & Bowyer, K. W. (2014). Unraveling the effect of textured contact lenses on iris recognition. IEEE Transactions on Information Forensics and Security, 9(5), 851\u2013862.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5089_CR23","doi-asserted-by":"crossref","unstructured":"Pacut, A., & Czajka, A. (2006). Aliveness detection for iris biometrics. In 40th annual IEEE international Carnahan conference on security technology, Lexington, Kentucky.","DOI":"10.1109\/CCST.2006.313440"},{"key":"5089_CR24","doi-asserted-by":"crossref","unstructured":"Tan, C.-W., & Kumar, A. (2014). Integrating ocular and iris descriptors for fake iris image detection. In 2014 international workshop on biometrics and forensics (IWBF).","DOI":"10.1109\/IWBF.2014.6914251"},{"key":"5089_CR25","first-page":"5","volume-title":"Advances in biometric person authentication","author":"J Daugman","year":"2005","unstructured":"Daugman, J. (2005). Recognising persons by their iris patterns. In S. Z. Li, J. Lai, T. Tan, G. Feng, & Y. Wang (Eds.), Advances in biometric person authentication (Vol. 3338, pp. 5\u201325). Berlin: Springer."},{"key":"5089_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-1-4419-1570-2","volume-title":"Information theoretic learning","author":"JC Principe","year":"2010","unstructured":"Principe, J. C. (2010). Information theory, machine learning, and reproducing kernel Hilbert spaces. In J. C. Principe (Ed.), Information theoretic learning (pp. 1\u201345). New York, NY: Springer."},{"key":"5089_CR27","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1007\/3-540-45054-8_27","volume-title":"Computer vision\u2014ECCV 2000","author":"T Ojala","year":"2000","unstructured":"Ojala, T., Pietik\u00e4inen, M., & M\u00e4enp\u00e4\u00e4, T. (2000). Gray scale and rotation invariant texture classification with local binary patterns. In D. Vernon (Ed.), Computer vision\u2014ECCV 2000 (Vol. 1842, pp. 404\u2013420). Berlin: Springer."},{"key":"5089_CR28","unstructured":"Fathy, W. S-A., Ali, H. S., & Mahmoud, I. I. (2007). Statistical representation for iris anti-spoofing using wavelet-based feature extraction and selection algorithms. In Proceedings of 34th national radio science conference (NRSC 2017), Egypt (pp. 221\u2013229)."},{"key":"5089_CR29","unstructured":"Andrew, N. (2016). CS 229 Lecture notes. http:\/\/cs229.stanford.edu\/notes\/cs229-notes3.pdf . Accessed September 2016."},{"issue":"2","key":"5089_CR30","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.patrec.2016.02.001","volume":"82","author":"MD Marsico","year":"2016","unstructured":"Marsico, M. D., Petrosino, A., & Ricciardi, S. (2016). Iris recognition through machine learning techniques: A survey. Pattern Recognition Letters, 82(2), 106\u2013115.","journal-title":"Pattern Recognition Letters"},{"key":"5089_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2616445","author":"Z Ma","year":"2016","unstructured":"Ma, Z., Xue, J.-H., Leijon, A., Tan, Z.-H., Yang, Z., & Guo, J. (2016). Decorrelation of neutral vector variables: Theory and applications. IEEE Transactions on Neural Networks and Learning Systems. https:\/\/doi.org\/10.1109\/TNNLS.2016.2616445 .","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"5089_CR32","unstructured":"CASIA-IrisV4 database. http:\/\/biometrics.idealtest.org\/dbDetailForUser.do?id=4 . Accessed September 2016."},{"key":"5089_CR33","unstructured":"Wei, Z., Tan, T., & Sun, Z. (2008). Synthesis of large realistic iris databases using patch-based sampling. In 19th international conference on pattern recognition."},{"issue":"4","key":"5089_CR34","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1016\/j.patcog.2006.10.014","volume":"40","author":"J Fierrez","year":"2007","unstructured":"Fierrez, J., Ortega-Garcia, J., Torre-Toledano, D., & Gonzalez-Rodriguez, J. (2007). BioSec baseline corpus: A multimodal biometric database. Pattern Recognition, 40(4), 1389\u20131392.","journal-title":"Pattern Recognition"},{"key":"5089_CR35","unstructured":"Ali, H. S., Ismail, A. I., & Farag, F. A. (2015). Efficient enhancement and matching for iris recognition using SURF. In 2015 5th national symposium on information technology: Towards new smart world (NSITNSW), Riyadh (pp. 1\u20135)."},{"issue":"8","key":"5089_CR36","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1007\/s11760-016-0903-8","volume":"10","author":"HS Ali","year":"2016","unstructured":"Ali, H. S., Ismail, A. I., Farag, F. A., & Abd El-Samie, F. E. (2016). Speeded up robust features for efficient iris recognition. SIViP, 10(8), 1385\u20131391. https:\/\/doi.org\/10.1007\/s11760-016-0903-8 .","journal-title":"SIViP"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5089-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5089-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5089-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T05:56:09Z","timestamp":1570427769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5089-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5089"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5089-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,4]]}}}