{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:55:13Z","timestamp":1761630913221,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:00:00Z","timestamp":1592870400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:00:00Z","timestamp":1592870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07601-x","type":"journal-article","created":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T18:12:18Z","timestamp":1592935938000},"page":"859-876","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A Novel Approach for Improving Dynamic Biometric Authentication and Verification of Human Using Eye Blinking Movement"],"prefix":"10.1007","volume":"115","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9493-1348","authenticated-orcid":false,"given":"Marwa","family":"Saied","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1309-6449","authenticated-orcid":false,"given":"Ayman","family":"Elshenawy","sequence":"additional","affiliation":[]},{"given":"Mohamed M.","family":"Ezz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,23]]},"reference":[{"issue":"2","key":"7601_CR1","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2006.873653","volume":"1","author":"AK Jain","year":"2006","unstructured":"Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: A tool for information security. IEEE Transactions on Information Forensics and Security, 1(2), 125\u2013143.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7601_CR2","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-45344-X_32","volume":"2091","author":"NK Ratha","year":"2001","unstructured":"Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). An analysis of minutiae matching strength. Audio- and Video-Based Biometric Person Authentication (AVBPA), 2091, 223\u2013228.","journal-title":"Audio- and Video-Based Biometric Person Authentication (AVBPA)"},{"key":"7601_CR3","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1016\/j.procs.2018.10.427","volume":"143","author":"S Singh","year":"2018","unstructured":"Singh, S., & Prasad, S. V. A. V. (2018). Techniques and challenges of face recognition: A critical Review. Procedia Computer Science, 143, 536\u2013543.","journal-title":"Procedia Computer Science"},{"issue":"4","key":"7601_CR4","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1145\/954339.954342","volume":"35","author":"W Zhao","year":"2003","unstructured":"Zhao, W., Chellappa, R., Phillips, P. J., & Rosenfeld, A. (2003). Face recognition: A literature survey. ACM Computing Surveys, 35(4), 399\u2013458.","journal-title":"ACM Computing Surveys"},{"key":"7601_CR5","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., & Pietikainen, M. (2013). Context based face anti-spoofing. In IEEE 6th international conference on biometrics: theory, applications and systems (pp. 1\u20138).","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"7601_CR6","doi-asserted-by":"crossref","unstructured":"Rogmann, N., & Lee, M. K. (2015). Liveness detection in biometrics. In International conference of the biometrics special interest group (BIOSIG) (pp. 1\u201314).","DOI":"10.1109\/BIOSIG.2015.7314611"},{"key":"7601_CR7","doi-asserted-by":"crossref","unstructured":"Maatta, J., Hadid, A., & Pietiktiinen, M. (2011). Face spoofing detection from single images using micro-texture analysis. In International joint conference on biometrics (IJCB) (pp. 1\u20137).","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"7601_CR8","doi-asserted-by":"crossref","unstructured":"Tang, D., Zhou, Z., Zhang, Y., & Zhang, K. (2018). Face flashing: A secure liveness detection protocol based on light reflections. In Network and distributed systems security (NDSS) symposium.","DOI":"10.14722\/ndss.2018.23176"},{"key":"7601_CR9","first-page":"1","volume-title":"Anti-spoofing using challenge-response user interaction","author":"AMK Saad","year":"2015","unstructured":"Saad, A. M. K. (2015). Anti-spoofing using challenge-response user interaction (pp. 1\u201372). New York: American University in Cairo School of Sciences and Engineering."},{"issue":"3","key":"7601_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics8030292","volume":"8","author":"MZ Alom","year":"2019","unstructured":"Alom, M. Z., Taha, T. M., Yakopcic, C., Westberg, S., Sidike, P., Nasrin, M. S., et al. (2019). A state-of-the-art survey on deep learning theory and architectures. Electronics, 8(3), 1\u201366.","journal-title":"Electronics"},{"issue":"7","key":"7601_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSEN.2017.2671238","volume":"17","author":"KW Kim","year":"2017","unstructured":"Kim, K. W., Hong, H. G., Nam, G. P., & Park, K. R. (2017). A study of deep cnn-based classification of open and closed eyes using a visible light camera sensor. Sensors, 17(7), 1\u201321.","journal-title":"Sensors"},{"key":"7601_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6929762","volume":"2018","author":"YJ Han","year":"2018","unstructured":"Han, Y. J., Kim, W., & Park, J. S. (2018). Efficient eye-blinking detection on smartphones: A hybrid approach based on deep learning. Mobile Information Systems, 2018, 1\u20138.","journal-title":"Mobile Information Systems"},{"key":"7601_CR13","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D. E. (2009). Dlib-ml: A machine learning toolkit. Journal of Machine Learning Research, 10, 1755\u20131758.","journal-title":"Journal of Machine Learning Research"},{"issue":"5","key":"7601_CR14","first-page":"4794","volume":"13","author":"A Alhaq","year":"2018","unstructured":"Alhaq, A., & Al-Shamery, E. (2018). A new deep neural network regression predictor based stock market. Journal of Engineering and Applied Sciences, 13(5), 4794\u20134801.","journal-title":"Journal of Engineering and Applied Sciences"},{"issue":"6","key":"7601_CR15","doi-asserted-by":"publisher","first-page":"242","DOI":"10.3390\/e19060242","volume":"19","author":"S Albelwi","year":"2017","unstructured":"Albelwi, S., & Mahmood, A. (2017). A framework for designing the architectures of deep convolutional neural networks. Entropy, 19(6), 242.","journal-title":"Entropy"},{"key":"7601_CR16","unstructured":"https:\/\/ujjwalkarn.me\/2016\/08\/11\/intuitive-explanationconvnets."},{"key":"7601_CR17","doi-asserted-by":"crossref","unstructured":"Dalal, N., & Triggs, B. (2005). Histograms of oriented gradients for human detection. In Proceedings of IEEE conference on computer vision and pattern recognition (CVPR).","DOI":"10.1109\/CVPR.2005.177"},{"key":"7601_CR18","unstructured":"Geitgey, A. (2016). Medium. [Online]. Available: https:\/\/medium.com\/@ageitgey\/machine-learning-is-fun-part-4-modern-face-recognition-with-deep-learning-c3cffc121d78. Accessed 4 December 2019."},{"key":"7601_CR19","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., & Philbin, J. (2015). FaceNet: A unified embedding for face recognition and clustering (pp. 815\u2013823).","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"7601_CR20","doi-asserted-by":"crossref","unstructured":"Kazemi, V., & Sullivan, J. (2014). One millisecond face alignment with an ensemble of regression trees.","DOI":"10.1109\/CVPR.2014.241"},{"issue":"5","key":"7601_CR21","first-page":"1","volume":"3","author":"T Soukupova","year":"2016","unstructured":"Soukupova, T., & Cech, J. (2016). Real-time eye blink detection using facial landmarks. Computer Vision Winter Workshop, 3(5), 1\u20138.","journal-title":"Computer Vision Winter Workshop"},{"key":"7601_CR22","first-page":"1","volume-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"GB Huang","year":"2007","unstructured":"Huang, G. B., Matta, M., Berg, T., & Learned-Miller, E. (2007). Labeled faces in the wild: A database for studying face recognition in unconstrained environments (pp. 1\u201311). Boston: University of Massachusetts."},{"issue":"2","key":"7601_CR23","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P Viola","year":"2004","unstructured":"Viola, P., & Jones, M. J. (2004). Robust real-time face detection. International Journal of Computer Vision (IJCV), 57(2), 137\u2013154.","journal-title":"International Journal of Computer Vision (IJCV)"},{"key":"7601_CR24","doi-asserted-by":"crossref","unstructured":"Tan, X., Song, F., Zhou, Z. H., & Chen, S. (2009) Enhanced pictorial structures for precise eye localization under uncontrolled conditions. In Proceedings of IEEE computer society conference on computer vision and pattern recognition (CVPR\u201909) (pp. 1621\u20131628).","DOI":"10.1109\/CVPR.2009.5206818"},{"issue":"9","key":"7601_CR25","doi-asserted-by":"publisher","first-page":"2825","DOI":"10.1016\/j.patcog.2014.03.024","volume":"47","author":"F Song","year":"2014","unstructured":"Song, F., Tan, X., Liu, X., & Chen, S. (2014). Eyes closeness detection from still images with multi-scale histograms of principal oriented gradients. Pattern Recognition, 47(9), 2825\u20132838.","journal-title":"Pattern Recognition"},{"key":"7601_CR26","doi-asserted-by":"crossref","unstructured":"Pan, G., Sun, L., Wu, Z., & Lao, S. (2007). Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In 2007 IEEE 11th international conference on computer vision (pp. 1\u20138).","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"7601_CR27","unstructured":"Ioffe, S., & Szegedy, C. (2015). Batch normalization: Accelerating deep network training by reducing internal covariate shift (Vol. 3, pp. 1\u201311). arXiv:1502.03167[cs.LG]."},{"key":"7601_CR28","unstructured":"Schilling, F. (2016). The effect of batch normalization on deep convolutional neural networks, Stockholm."},{"key":"7601_CR29","doi-asserted-by":"crossref","unstructured":"Cyril, G., & Gaussier, E. (2005). A probabilistic interpretation of precision, recall and F-score, with implication for evaluation (Vol. 3408, pp. 345\u2013359).","DOI":"10.1007\/978-3-540-31865-1_25"},{"issue":"2","key":"7601_CR30","first-page":"953","volume":"13","author":"C-H Chu","year":"2018","unstructured":"Chu, C.-H., & Feng, Y.-K. (2018). Study of eye blinking to improve face recognition for screen unlock on mobile devices. Journal of Electrical Engineering and Technology, 13(2), 953\u2013960.","journal-title":"Journal of Electrical Engineering and Technology"},{"issue":"24","key":"7601_CR31","first-page":"16907","volume":"13","author":"C Sridhathan","year":"2018","unstructured":"Sridhathan, C., Senthil Kumar, M., & Arutselvan, K. (2018). Unlocking mobile devices using improved face recognition and eye blinking technique. International Journal of Applied Engineering Research, 13(24), 16907\u201316909.","journal-title":"International Journal of Applied Engineering Research"},{"key":"7601_CR32","first-page":"4","volume":"5","author":"M Noman","year":"2018","unstructured":"Noman, M., Bin, T., Ahad, M., & Rahman, A. (2018). Mobile-based eye-blink detection performance analysis on android platform. Frontiers, 5, 4.","journal-title":"Frontiers"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07601-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07601-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07601-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T00:41:30Z","timestamp":1624408890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07601-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,23]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7601"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07601-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,6,23]]},"assertion":[{"value":"23 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}