{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:17:19Z","timestamp":1730200639872,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/bigmm.2018.8499061","type":"proceedings-article","created":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T20:35:25Z","timestamp":1540240525000},"page":"1-7","source":"Crossref","is-referenced-by-count":10,"title":["Iris Liveness Detection: A Survey"],"prefix":"10.1109","author":[{"given":"Yangyu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Weigang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400393"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398817"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.10.018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996290"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996283"},{"journal-title":"Iris liveness detection using regional features","year":"2015","author":"hu","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2313025"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712745"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2015.16"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358790"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.04.002"},{"key":"ref40","first-page":"1363","article-title":"Bsif: Binarized statistical image features","author":"kannala","year":"2012","journal-title":"ICPR"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/1.2947582"},{"key":"ref12","article-title":"Liveness iris detection method based on the eye's optical features","author":"he","year":"2010","journal-title":"SPIE Conference on Optics and Photonics for Counterterrorism and Crime Fighting VI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2011.5973786"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2011.6141226"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/ima.20227"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.05.008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639363"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2013.6475026"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612984"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199819"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-89991-4_19","article-title":"Direct attacks using fake images in iris verification","volume":"5372","author":"ruiz-","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"ref3","first-page":"1","article-title":"Learning hierarchical visual codebook for iris liveness detection","author":"zhang","year":"2011","journal-title":"International Joint Conference on Biometrics"},{"key":"ref6","first-page":"1","article-title":"From the iriscode to the iris: A new vulnerability of iris recognition systems","author":"galbally","year":"2012","journal-title":"Black Hat Briefings"},{"key":"ref29","first-page":"1387","article-title":"Presentation attack detection algorithm for face and iris biometrics","author":"raghavendra","year":"2014","journal-title":"European Signal Processing Conference"},{"key":"ref5","first-page":"355","article-title":"Iris spoofing: Reverse engineering the daugman feature encoding scheme","author":"venugopalan","year":"2012","journal-title":"Handbook of Iris Recognition"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0071"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2440188"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2016.7449676"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.1040"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/34.244676"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.172"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996282"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996226"},{"key":"ref42","first-page":"1","article-title":"Fake iris detection: A holistic approach","volume":"19","author":"bodade","year":"2011","journal-title":"International Journal of Computer Applications"},{"key":"ref24","first-page":"1","article-title":"Light field photography with a hand-held plenoptic camera","volume":"2","author":"ng","year":"2005","journal-title":"Computer Science Technical Report"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652293"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398815"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358790"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2404294"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"23","DOI":"10.4236\/jcc.2016.41003","article-title":"Integrate liveness detection with iris verification to construct support biometric system","volume":"4","author":"ahmad","year":"2016","journal-title":"Journal of Computer and Communications"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1749-6632.1969.tb14024.x"}],"event":{"name":"2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)","start":{"date-parts":[[2018,9,13]]},"location":"Xi'an","end":{"date-parts":[[2018,9,16]]}},"container-title":["2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8482104\/8499056\/08499061.pdf?arnumber=8499061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:31:45Z","timestamp":1643203905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8499061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/bigmm.2018.8499061","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}