{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:47Z","timestamp":1740099167307,"version":"3.37.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030052874"},{"type":"electronic","value":"9783030052881"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05288-1_15","type":"book-chapter","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T23:35:18Z","timestamp":1542756918000},"page":"189-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Image-Based Object Spoofing Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4769-8843","authenticated-orcid":false,"given":"Valter","family":"Costa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0317-4714","authenticated-orcid":false,"given":"Armando","family":"Sousa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0256-1488","authenticated-orcid":false,"given":"Ana","family":"Reis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,22]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Akhtar, Z., Foresti, G.L.: Face spoof attack recognition using discriminative image patches. J. Electr. Comput. Eng. 1\u201314 (2016). \nhttp:\/\/www.hindawi.com\/journals\/jece\/2016\/4721849\/","DOI":"10.1155\/2016\/4721849"},{"key":"15_CR2","unstructured":"Alotaibi, A., Mahmood, A.: Enhancing computer vision to detect face spoofing attack utilizing a single frame from a replay video attack using deep learning. In: 2016 International Conference on Optoelectronics and Image Processing (ICOIP), pp. 1\u20135. IEEE (2016). \nhttp:\/\/ieeexplore.ieee.org\/document\/7528488\/"},{"issue":"4","key":"15_CR3","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11760-016-1014-2","volume":"11","author":"A Alotaibi","year":"2017","unstructured":"Alotaibi, A., Mahmood, A.: Deep face liveness detection based on nonlinear diffusion using convolution neural network. Signal Image Video Process. 11(4), 713\u2013720 (2017). \nhttps:\/\/doi.org\/10.1007\/s11760-016-1014-2","journal-title":"Signal Image Video Process."},{"key":"15_CR4","unstructured":"Anjos, A., Marcel, S.: Counter-measures to photo attacks in face recognition: a public database and a baseline. In: 2011 International Joint Conference on Biometrics (IJCB), pp. 1\u20137. IEEE (2011). \nhttp:\/\/ieeexplore.ieee.org\/document\/6117503\/"},{"issue":"11","key":"15_CR5","doi-asserted-by":"publisher","first-page":"2396","DOI":"10.1109\/TIFS.2015.2458700","volume":"10","author":"SR Arashloo","year":"2015","unstructured":"Arashloo, S.R., Kittler, J., Christmas, W.: Face spoofing detection based on multiple descriptor fusion using multiscale dynamic binarized statistical image features. IEEE Trans. Inf. Forensics Secur. 10(11), 2396\u20132407 (2015). \nhttp:\/\/ieeexplore.ieee.org\/document\/7163625\/","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR6","unstructured":"Atoum, Y., Liu, Y., Jourabloo, A., Liu, X.: Face anti-spoofing using patch and depth-based CNNs. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 319\u2013328. IEEE (2017). \nhttp:\/\/ieeexplore.ieee.org\/document\/8272713\/"},{"issue":"4","key":"15_CR7","doi-asserted-by":"publisher","first-page":"043007","DOI":"10.1117\/1.JEI.26.4.043007","volume":"26","author":"A Benlamoudi","year":"2017","unstructured":"Benlamoudi, A., Aiadi, K.E., Ouafi, A., Samai, D., Oussalah, M.: Face antispoofing based on frame difference and multilevel representation. J. Electron. Imaging 26(4), 043007 (2017). \nhttps:\/\/doi.org\/10.1117\/1.JEI.26.4.043007","journal-title":"J. Electron. Imaging"},{"key":"15_CR8","unstructured":"Bharadwaj, S., Dhamecha, T.I., Vatsa, M., Singh, R.: Computationally efficient face spoofing detection with motion magnification. In: 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 105\u2013110. IEEE (2013). \nhttp:\/\/ieeexplore.ieee.org\/document\/6595861\/"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1002\/col.5080080421","volume":"8","author":"Fred W. Billmeyer","year":"1983","unstructured":"Billmeyer, F.W.: Color Science: Concepts and Methods, Quantitative Data and Formulae, 2nd ed., by Gunter Wyszecki and W. S. Stiles, John Wiley and Sons, New York, 1982, 950 pp. Price: \\$75.00. Color Res. Appl. 8(4), 262\u2013263 (1983). \nhttps:\/\/doi.org\/10.1002\/col.5080080421","journal-title":"Color Research & Application"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process. Lett. 1 (2016). \nhttp:\/\/ieeexplore.ieee.org\/document\/7748511\/","DOI":"10.1109\/LSP.2016.2630740"},{"issue":"8","key":"15_CR11","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11(8), 1818\u20131830 (2016). \nhttp:\/\/ieeexplore.ieee.org\/document\/7454730\/","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR12","unstructured":"Boulkenafet, Z., Komulainen, J., Xiaoyi Feng, Hadid, A.: Scale space texture analysis for face anti-spoofing. In: 2016 International Conference on Biometrics (ICB), pp. 1\u20136. IEEE (2016). \nhttp:\/\/ieeexplore.ieee.org\/document\/7550078\/"},{"key":"15_CR13","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), pp. 1\u20137 (2012)"},{"key":"15_CR14","unstructured":"Chingovska, I., et al.: The 2nd competition on counter measures to 2D face spoofing attacks. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20136. IEEE (2013). \nhttp:\/\/ieeexplore.ieee.org\/document\/6613026\/"},{"issue":"4","key":"15_CR15","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1109\/TIFS.2015.2400392","volume":"10","author":"I Chingovska","year":"2015","unstructured":"Chingovska, I., dos Anjos, A.R.: On the use of client identity information for face antispoofing. IEEE Trans. Inf. Forensics Secur. 10(4), 787\u2013796 (2015). \nhttp:\/\/ieeexplore.ieee.org\/document\/7031941\/","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"15_CR16","doi-asserted-by":"publisher","first-page":"54","DOI":"10.3390\/jimaging4040054","volume":"4","author":"V Costa","year":"2018","unstructured":"Costa, V., Sousa, A., Reis, A.: Preventing wine counterfeiting by individual cork stopper recognition using image processing technologies. J. Imaging 4(4), 54 (2018). \nhttp:\/\/www.mdpi.com\/2313-433X\/4\/4\/54","journal-title":"J. Imaging"},{"issue":"4","key":"15_CR17","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015). \nhttp:\/\/ieeexplore.ieee.org\/document\/7031384\/","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR18","unstructured":"Edmunds, T., Caplier, A.: Fake face detection based on radiometric distortions. In: 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), pp. 1\u20136. IEEE (2016). \nhttp:\/\/ieeexplore.ieee.org\/document\/7820995\/"},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1049\/iet-bmt.2017.0077","volume":"7","author":"T Edmunds","year":"2018","unstructured":"Edmunds, T., Caplier, A.: Face spoofing detection based on colour distortions. IET Biom. 7(1), 27\u201338 (2018). \nhttp:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-bmt.2017.0077","journal-title":"IET Biom."},{"issue":"7","key":"15_CR20","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1007\/s11760-017-1082-y","volume":"11","author":"M Farmanbar","year":"2017","unstructured":"Farmanbar, M., Toygar, \u00d6.: Spoof detection on face and palmprint biometrics. Signal Image Video Process. 11(7), 1253\u20131260 (2017). \nhttps:\/\/doi.org\/10.1007\/s11760-017-1082-y","journal-title":"Signal Image Video Process."},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/j.jvcir.2016.03.019","volume":"38","author":"L Feng","year":"2016","unstructured":"Feng, L., et al.: Integration of image quality and motion cues for face anti-spoofing: a neural network approach. J. Vis. Commun. Image Represent. 38, 451\u2013460 (2016). \nhttp:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1047320316300244","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"1","key":"15_CR22","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/1687-5281-2014-2","volume":"2014","author":"T Freitas Pereira de","year":"2014","unstructured":"de Freitas Pereira, T., et al.: Face liveness detection using dynamic texture. EURASIP J. Image Video Process. 2014(1), 2 (2014). \nhttps:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-5281-2014-2","journal-title":"EURASIP J. Image Video Process."},{"key":"15_CR23","unstructured":"Galbally, J., Marcel, S.: Face anti-spoofing based on general image quality assessment. In: 2014 22nd International Conference on Pattern Recognition, pp. 1173\u20131178. IEEE (2014). \nhttp:\/\/ieeexplore.ieee.org\/document\/6976921\/"},{"key":"15_CR24","unstructured":"Gan, J., Li, S., Zhai, Y., Liu, C.: 3D convolutional neural network based on face anti-spoofing. In: 2017 2nd International Conference on Multimedia and Image Processing (ICMIP), pp. 1\u20135. IEEE (2017). \nhttp:\/\/ieeexplore.ieee.org\/document\/8221060\/"},{"key":"15_CR25","unstructured":"Gragnaniello, D., Sansone, C., Poggi, G., Verdoliva, L.: Biometric spoofing detection by a domain-aware convolutional neural network. In: 2016 12th International Conference on Signal-Image Technology and Internet-Based Systems (SITIS), pp. 193\u2013198. IEEE (2016). \nhttp:\/\/ieeexplore.ieee.org\/document\/7907465\/"},{"key":"15_CR26","unstructured":"Kim, I., Ahn, J.., Kim,D.: Face spoofing detection with highlight removal effect and distortions. In: 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 004299\u2013004304. IEEE (2016). \nhttp:\/\/ieeexplore.ieee.org\/document\/7844907\/"},{"key":"15_CR27","unstructured":"ITU: ITU-R Recommendation BT.601-5: Studio encoding parameters of digital television for standard 4:3 and wide-screen 16:9 aspect ratios. Technical report, ITU, Geneva, Switzerland (1995)"},{"issue":"4","key":"15_CR28","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1109\/TIFS.2015.2403306","volume":"10","author":"J Yang","year":"2015","unstructured":"Yang, J., Lei, Z., Yi, D., Li, S.Z.: Person-specific face antispoofing with subject domain adaptation. IEEE Trans. Inf. Forensics Secur. 10(4), 797\u2013809 (2015). \nhttp:\/\/ieeexplore.ieee.org\/document\/7041231\/","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59876-5","volume-title":"Image Analysis and Recognition","year":"2017","unstructured":"Karray, F., Campilho, A., Cheriet, F. (eds.): Image Analysis and Recognition. LNCS, vol. 10317. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-59876-5"},{"key":"15_CR30","unstructured":"Komulainen, J., Hadid, A., Pietikainen, M., Anjos, A., Marcel, S.: Complementary countermeasures for detecting scenic face spoofing attacks. In: 2013 International Conference on Biometrics (ICB), pp. 1\u20137. IEEE (2013). \nhttp:\/\/ieeexplore.ieee.org\/document\/6612968\/"},{"issue":"1","key":"15_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/iet-bmt.2017.0089","volume":"7","author":"L Li","year":"2018","unstructured":"Li, L., Correia, P.L., Hadid, A.: Face recognition under spoofing attacks: countermeasures and research directions. IET Biom. 7(1), 3\u201314 (2018). \nhttp:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-bmt.2017.0089","journal-title":"IET Biom."},{"key":"15_CR32","unstructured":"Li, L., Feng, X., Boulkenafet, Z., Xia, Z., Li, M., Hadid, A.: An original face anti-spoofing approach using partial convolutional neural network. In: 2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), pp. 1\u20136. IEEE (2016). \nhttp:\/\/ieeexplore.ieee.org\/document\/7821013\/"},{"key":"15_CR33","unstructured":"Maatta, J., Hadid, A., Pietikainen, M.: Face spoofing detection from single images using micro-texture analysis. In: 2011 International Joint Conference on Biometrics (IJCB). pp. 1\u20137. IEEE (2011). \nhttp:\/\/ieeexplore.ieee.org\/document\/6117510\/"},{"issue":"7","key":"15_CR34","doi-asserted-by":"publisher","first-page":"1713","DOI":"10.1109\/TIFS.2017.2676720","volume":"12","author":"I Manjani","year":"2017","unstructured":"Manjani, I., Tariyal, S., Vatsa, M., Singh, R., Majumdar, A.: Detecting silicone mask-based presentation attack via deep dictionary learning. IEEE Trans. Inf. Forensics Secur. 12(7), 1713\u20131723 (2017). \nhttp:\/\/ieeexplore.ieee.org\/document\/7867821\/","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"15_CR35","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/iet-bmt.2011.0009","volume":"1","author":"J M\u00e4\u00e4tt\u00e4","year":"2012","unstructured":"M\u00e4\u00e4tt\u00e4, J., Hadid, A., Pietik\u00e4inen, M.: Face spoofing detection from single images using texture and local shape analysis. IET Biom. 1(1), 3 (2012). \nhttp:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-bmt.2011.0009","journal-title":"IET Biom."},{"issue":"4","key":"15_CR36","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TIFS.2015.2398817","volume":"10","author":"D Menotti","year":"2015","unstructured":"Menotti, D., et al.: Deep Representations for iris, face, and fingerprint spoofing detection. IEEE Trans. Inf. Forensics Secur. 10(4), 864\u2013879 (2015). \nhttp:\/\/ieeexplore.ieee.org\/document\/7029061\/","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR37","unstructured":"Asim, M., Ming, Z., Javed, M.Y.: CNN based spatio-temporal feature extraction for face anti-spoofing. In: 2017 2nd International Conference on Image, Vision and Computing (ICIVC), pp. 234\u2013238. IEEE (2017). \nhttp:\/\/ieeexplore.ieee.org\/document\/7984552\/"},{"key":"15_CR38","unstructured":"Pan, S., Deravi, F.: Facial action units for presentation attack detection. In: 2017 Seventh International Conference on Emerging Security Technologies (EST), pp. 62\u201367. IEEE (2017). \nhttp:\/\/ieeexplore.ieee.org\/document\/8090400\/"},{"key":"15_CR39","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"15_CR40","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1007\/978-3-319-59608-2_49","volume-title":"Security and Privacy in Communication Networks","author":"F Peng","year":"2017","unstructured":"Peng, F., Qin, L., Long, M.: POSTER: non-intrusive face spoofing detection based on guided filtering and image quality analysis. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds.) SecureComm 2016. LNICST, vol. 198, pp. 774\u2013777. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-59608-2_49"},{"issue":"7","key":"15_CR41","doi-asserted-by":"publisher","first-page":"8883","DOI":"10.1007\/s11042-017-4780-0","volume":"77","author":"F Peng","year":"2018","unstructured":"Peng, F., Qin, L., Long, M.: Face presentation attack detection using guided scale texture. Multimed. Tools Appl. 77(7), 8883\u20138909 (2018). \nhttps:\/\/doi.org\/10.1007\/s11042-017-4780-0","journal-title":"Multimed. Tools Appl."},{"issue":"12","key":"15_CR42","doi-asserted-by":"publisher","first-page":"4726","DOI":"10.1109\/TIP.2015.2466088","volume":"24","author":"A Pinto","year":"2015","unstructured":"Pinto, A., Pedrini, H., Schwartz, W.R., Rocha, A.: Face spoofing detection through visual codebooks of spectral temporal cubes. IEEE Trans. Image Process. 24(12), 4726\u20134740 (2015). \nhttp:\/\/ieeexplore.ieee.org\/document\/7185398\/","journal-title":"IEEE Trans. Image Process."},{"key":"15_CR43","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.eswa.2018.05.004","volume":"108","author":"YAU Rehman","year":"2018","unstructured":"Rehman, Y.A.U., Po, L.M., Liu, M.: LiveNet: Improving features generalization for face liveness detection using convolution neural networks. Expert Syst. Appl. 108, 159\u2013169 (2018). \nhttp:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417418302811","journal-title":"Expert Syst. Appl."},{"key":"15_CR44","unstructured":"Stuchi, J.A., et al.: Improving image classification with frequency domain layers for feature extraction. In: 2017 IEEE 27th International Workshop on Machine Learning for Signal Processing (MLSP), pp. 1\u20136. IEEE (2017). \nhttp:\/\/ieeexplore.ieee.org\/document\/8168168\/"},{"key":"15_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-319-53465-7_2","volume-title":"Digital Forensics and Watermarking","author":"Y Tian","year":"2017","unstructured":"Tian, Y., Xiang, S.: Detection of video-based face spoofing using LBP and multiscale DCT. In: Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. (eds.) IWDW 2016. LNCS, vol. 10082, pp. 16\u201328. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-53465-7_2"},{"issue":"4","key":"15_CR46","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TIFS.2015.2406533","volume":"10","author":"S Tirunagari","year":"2015","unstructured":"Tirunagari, S., Poh, N., Windridge, D., Iorliam, A., Suki, N., Ho, A.T.S.: Detection of face spoofing using visual dynamics. IEEE Trans. Inf. Forensics Secur. 10(4), 762\u2013777 (2015). \nhttp:\/\/ieeexplore.ieee.org\/document\/7047832\/","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR47","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1007\/978-3-319-70096-0_70","volume-title":"Neural Information Processing","author":"X Tu","year":"2017","unstructured":"Tu, X., Fang, Y.: Ultra-deep neural network for face anti-spoofing. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, E.S. (eds.) Neural Information Processing, vol. 10635, pp. 686\u2013695. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-70096-0_70"},{"issue":"12","key":"15_CR48","doi-asserted-by":"publisher","first-page":"305","DOI":"10.3390\/sym9120305","volume":"9","author":"SY Wang","year":"2017","unstructured":"Wang, S.Y., Yang, S.H., Chen, Y.P., Huang, J.W.: Face liveness detection based on skin blood flow analysis. Symmetry 9(12), 305 (2017). \nhttp:\/\/www.mdpi.com\/2073-8994\/9\/12\/305","journal-title":"Symmetry"},{"issue":"8","key":"15_CR49","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1109\/TIP.2015.2422574","volume":"24","author":"W Kim","year":"2015","unstructured":"Kim, W., Suh, S., Han, J.-J.: Face liveness detection from a single image via diffusion speed model. IEEE Trans. Image Process. 24(8), 2456\u20132465 (2015). \nhttp:\/\/ieeexplore.ieee.org\/document\/7084662\/","journal-title":"IEEE Trans. Image Process."},{"key":"15_CR50","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.jvcir.2018.01.001","volume":"51","author":"LB Zhang","year":"2018","unstructured":"Zhang, L.B., Peng, F., Qin, L., Long, M.: Face spoofing detection based on color texture markov feature and support vector machine recursive feature elimination. J. Vis. Commun. Image Represent. 51, 56\u201369 (2018). \nhttp:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1047320318300014","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"15_CR51","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/TMM.2017.2750415","volume":"20","author":"X Zhao","year":"2018","unstructured":"Zhao, X., Lin, Y., Heikkila, J.: Dynamic texture recognition using volume local binary count patterns with an application to 2D face spoofing detection. IEEE Trans. Multimed. 20(3), 552\u2013566 (2018). \nhttp:\/\/ieeexplore.ieee.org\/document\/8030131\/","journal-title":"IEEE Trans. Multimed."}],"container-title":["Lecture Notes in Computer Science","Combinatorial Image Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05288-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T23:40:18Z","timestamp":1542757218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05288-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030052874","9783030052881"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05288-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"IWCIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Combinatorial Image Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcia2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/iwcia18\/general","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}