{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:08:26Z","timestamp":1773119306417,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T00:00:00Z","timestamp":1679443200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T00:00:00Z","timestamp":1679443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11760-023-02524-z","type":"journal-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T03:40:11Z","timestamp":1679888411000},"page":"3035-3043","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Design and implementation of liveness detection system based on improved shufflenet V2"],"prefix":"10.1007","volume":"17","author":[{"given":"Yongxing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wei","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Xiaoyuan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,22]]},"reference":[{"key":"2524_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.: A face antispoofing database with diverse attacks. Paper presented at the 2012 5th IAPR International Conference on Biometrics, New Delhi, India, 29 March\u201301 April 2012 (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"key":"2524_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yin, Z., Yin, G., Yan, J., Shao, J., Liu, Z.: Celeba-spoof: large-scale face anti-spoofing dataset with rich annotations. Paper presented at the 16th European Conference on Computer Vision, Glasgow, UK, 23\u201328 August 2020 (2020)","DOI":"10.1007\/978-3-030-58610-2_5"},{"key":"2524_CR3","doi-asserted-by":"publisher","first-page":"1440","DOI":"10.1109\/TIFS.2020.3035879","volume":"16","author":"X Wu","year":"2021","unstructured":"Wu, X., Zhou, J., Liu, J., Ni, F., Fan, H.: Single-shot face antispoofing for dual pixel camera. IEEE Trans. Inf. Forensics Secur. 16, 1440\u20131451 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2524_CR4","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. Paper presented at the IEEE International Conference on Image Processing, Quebec City, Canada, 27\u201330 September 2015 (2015)","DOI":"10.1109\/ICIP.2015.7351280"},{"issue":"2","key":"2524_CR5","first-page":"141","volume":"24","author":"Z Boulkenafet","year":"2017","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process. Lett. 24(2), 141\u2013145 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"2524_CR6","doi-asserted-by":"crossref","unstructured":"Xu, Y., Wu, L., Liu, Y., Wang, Z.: Embedding fast temporal information model to improve face anti-spoofing. Paper presented at the 15th Chinese Conference on Biometric Recognition, Shanghai, China, 10\u201312 September 2021 (2021)","DOI":"10.1007\/978-3-030-86608-2_48"},{"key":"2524_CR7","doi-asserted-by":"crossref","unstructured":"Ma, N., Zhang, X., Zheng, H., Sun, J.: ShuffleNet V2: practical guidelines for efficient CNN architecture design. Paper presented at the 15th European Conference on Computer Vision, Munich, Germany, 08\u201314 September 2018 (2018)","DOI":"10.1007\/978-3-030-01264-9_8"},{"key":"2524_CR8","unstructured":"Tan, M., Le, Q.V.: EfficientNet: rethinking model scaling for convolutional neural networks. Paper presented at the 36th International Conference on Machine Learning, Long Beach, CA, 09\u201315 June 2019 (2019)"},{"key":"2524_CR9","doi-asserted-by":"crossref","unstructured":"Woo, S., Park, J., Lee, J.Y., Kweon, I.S.: Cbam: Convolutional block attention module. Paper presented at the 15th European Conference on Computer Vision, Munich, Germany, 08\u201314 September 2018 (2018)","DOI":"10.1007\/978-3-030-01234-2_1"},{"issue":"10","key":"2524_CR10","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"2524_CR11","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2524_CR12","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., Pietik\u00e4inen, M.: Context based face anti-spoofing. Paper presented at the IEEE 6th International Conference on Biometrics - Theory, Applications and Systems, Washington, DC, 29 Sept\u201302 Oct 2013 (2013)","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"2524_CR13","doi-asserted-by":"crossref","unstructured":"Peixoto, B., Michelassi, C., Rocha, A.: Face liveness detection under bad illumination conditions. Paper presented at the 18th IEEE International Conference on Image Processing, Brussels, Belgium, 11\u201314 Sept 2011 (2011)","DOI":"10.1109\/ICIP.2011.6116484"},{"issue":"2","key":"2524_CR14","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1109\/TCDS.2021.3064679","volume":"14","author":"W Liu","year":"2022","unstructured":"Liu, W., Wei, X., Lei, T., Wang, X., Meng, H., Nandi, A.K.: Data-fusion-based two-stage cascade framework for multimodality face anti-spoofing. IEEE Trans. Cognitive Develop. Syst. 14(2), 672\u2013683 (2022)","journal-title":"IEEE Trans. Cognitive Develop. Syst."},{"issue":"7","key":"2524_CR15","doi-asserted-by":"publisher","first-page":"4626","DOI":"10.1109\/TCSVT.2021.3133620","volume":"32","author":"H Wu","year":"2022","unstructured":"Wu, H., Zeng, D., Hu, Y., Shi, H., Mei, T.: Dual spoof disentanglement generation for face anti-spoofing with depth uncertainty learning. IEEE Trans. Circuits Syst. Video Technol. 32(7), 4626\u20134638 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"10","key":"2524_CR16","doi-asserted-by":"publisher","first-page":"6311","DOI":"10.1109\/TPAMI.2021.3091167","volume":"44","author":"Y Qin","year":"2022","unstructured":"Qin, Y., Yu, Z., Yan, L., Wang, Z., Zhao, C., Lei, Z.: Meta-teacher for face anti-spoofing. IEEE Trans. Pattern Anal. Mach. Intell. 44(10), 6311\u20136326 (2022)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2524_CR17","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIFS.2022.3183398","volume":"17","author":"W Wang","year":"2022","unstructured":"Wang, W., Wen, F., Zheng, H., Ying, R., Liu, P.: Conv-mlp: a convolution and mlp mixed model for multimodal face anti-spoofing. IEEE Trans. Inf. Forensics Secur. 17, 2284\u20132297 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"2524_CR18","doi-asserted-by":"publisher","first-page":"7033","DOI":"10.1109\/TCSVT.2022.3178723","volume":"32","author":"W Yan","year":"2022","unstructured":"Yan, W., Zeng, Y., Hu, H.: Domain adversarial disentanglement network with cross-domain synthesis for generalized face anti-spoofing. IEEE Trans. Circuits Syst. Video Technol. 32(10), 7033\u20137046 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2524_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3176387","volume-title":"Spoof trace disentanglement for generic face anti-spoofing","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Liu, X.: Spoof trace disentanglement for generic face anti-spoofing. IEEE Trans, Pattern Analys Machine Intell (2022)"},{"issue":"5","key":"2524_CR20","doi-asserted-by":"publisher","first-page":"1987","DOI":"10.1109\/JBHI.2021.3107735","volume":"26","author":"JD Lin","year":"2021","unstructured":"Lin, J.D., Lin, H.H., Dy, J., Chen, J.C., Tanveer, M., Razzak, I., Hua, K.L.: Lightweight face anti-spoofing network for telehealth applications. IEEE J. Biomed. Health Inform. 26(5), 1987\u20131996 (2021)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"2524_CR21","doi-asserted-by":"crossref","unstructured":"He, D., He, X., Yuan, R., Li, Y., Shen, C.: Lightweight network-based multi-modal feature fusion for face anti-spoofing. Vis. Comput., 1\u201313 (2022)","DOI":"10.1007\/s00371-022-02420-6"},{"issue":"8","key":"2524_CR22","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1109\/TPAMI.2019.2913372","volume":"42","author":"J Hu","year":"2020","unstructured":"Hu, J., Shen, L., Albanie, S., Sun, G., Wu, E.: Squeeze-and-excitation networks. IEEE Trans. Pattern Anal. Mach. Intell. 42(8), 2011\u20132023 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"2524_CR23","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/TPAMI.2007.1014","volume":"29","author":"S Li","year":"2007","unstructured":"Li, S., Chu, R., Liao, S., Zhang, L.: Illumination invariant face recognition using near-infrared images. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 627\u2013639 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2524_CR24","doi-asserted-by":"crossref","unstructured":"Li, S., Yi, D., Lei, Z., Liao, S.: The CASIA NIR-VIS 2.0 face database. Paper presented at the 26th IEEE Conference on Computer Vision and Pattern Recognition, Portland, OR, 23\u201328 June 2013 (2013)","DOI":"10.1109\/CVPRW.2013.59"},{"issue":"9","key":"2524_CR25","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1016\/j.imavis.2011.07.002","volume":"29","author":"G Zhao","year":"2011","unstructured":"Zhao, G., Huang, X., Taini, M., Li, S.Z., Pietik\u00e4Inen, M.: Facial expression recognition from near-infrared videos. Image Vis. Comput. 29(9), 607\u2013619 (2011)","journal-title":"Image Vis. Comput."},{"key":"2524_CR26","volume-title":"Very deep convolutional networks for large-scale image recognition","author":"K Simonyan","year":"2014","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. Comput, Sci (2014)"},{"key":"2524_CR27","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. Paper presented at the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27\u201330 June 2016 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"2524_CR28","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.A.: Inception-v4, Inception-ResNet and the impact of residual connections on learning. Paper presented at the 31st AAAI Conference on Artificial Intelligence, San Francisco, CA, 04\u201309 Feb 2017 (2017)","DOI":"10.1609\/aaai.v31i1.11231"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02524-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02524-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02524-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T10:40:18Z","timestamp":1686912018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02524-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,22]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["2524"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02524-z","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,22]]},"assertion":[{"value":"28 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}