{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:49:35Z","timestamp":1729676975173,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/ccst.2011.6095949","type":"proceedings-article","created":{"date-parts":[[2011,12,15]],"date-time":"2011-12-15T17:02:53Z","timestamp":1323968573000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Predicting iris vulnerability to direct attacks based on quality related features"],"prefix":"10.1109","author":[{"given":"Jaime","family":"Ortiz-Lopez","sequence":"first","affiliation":[]},{"given":"Javier","family":"Galbally","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Fierrez","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Ortega-Garcia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.10.014"},{"key":"18","first-page":"464","article-title":"Robust and fast assessment of iris image quality","volume":"3832","author":"wei","year":"2006","journal-title":"Proc IAPR Int Conf Biometrics (ICB)"},{"key":"33","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1109\/TPAMI.2009.76","article-title":"The multiscenario multi-environment BioSecure multimodal database (BMDB","volume":"32","author":"ortega-garcia","year":"2010","journal-title":"IEEE Trans on Pattern Analysis and Machine Intelligence"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908228"},{"journal-title":"ANSI x9 84-2001 Biometric Information Management and Security","year":"2001","key":"34"},{"journal-title":"MATLAB Source Code for a Biometric Identification System Based on Iris Patterns","year":"2003","author":"masek","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9316-0"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2034885"},{"key":"11","first-page":"386","article-title":"Bayesian hillclimbing attack and its application to signature verification","volume":"4642","author":"galbally","year":"2007","journal-title":"Proc IAPR International Conference on Biometrics (ICB)"},{"key":"12","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-45344-X_32","article-title":"An analysis of minutiae matching strength","volume":"2091","author":"ratha","year":"2001","journal-title":"Proc of Audio and Video-Based Person Authentication (AVBPA)"},{"key":"21","article-title":"Image quality assessment for iris biometric","volume":"6202","author":"kalka","year":"2005","journal-title":"Proc SPIE Intl Conf on Biometric Technology for Human Identification III (BTHI III)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.01.004"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.08.005"},{"key":"23","first-page":"120","article-title":"Global and local quality measures for nir iris video","author":"zou","year":"2009","journal-title":"Proc IEEE Workshop on Computer Vision and Pattern Recognition"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1251145"},{"key":"25","first-page":"373","article-title":"Localized iris image quality using 2d wavelets","author":"chen","year":"2006","journal-title":"Proc IAPR Int Conf Biometrics (ICB)"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.10.001"},{"key":"27","article-title":"Artificial irises: Importance of vulnerability analysis","volume":"45","author":"matsumoto","year":"2004","journal-title":"Proc Asian Biometrics Workshop (AWB)"},{"journal-title":"Practical Techniques for Defeating Biometric Devices","year":"2005","author":"lane","key":"28"},{"key":"29","article-title":"Counterfeit iris detection based on texture analysis","author":"wei","year":"2008","journal-title":"IAPR Int Conf on Pattern Recognition (ICPR)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"journal-title":"Best Practices in Testing and Reporting Performance of Biometric Devices","year":"2002","author":"mansfield","key":"2"},{"key":"10","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1016\/j.patrec.2011.04.005","article-title":"An evaluation of indirect attacks and countermeasures in fingerprint verification systems","volume":"32","author":"martinez-diaz","year":"2011","journal-title":"Pattern Recognition Letters"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873653"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2003.1242384"},{"key":"7","article-title":"Countermeasures against iris spoofing with contact lenses","author":"von seelen","year":"2005","journal-title":"Technical Report Iridian Technologies"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"32","article-title":"Iris liveness detection based on quality related features","author":"galbally","year":"2011","journal-title":"Proc Int Joint Conf Biometr (IJCB)"},{"key":"5","first-page":"114","article-title":"Body check: Biometric access protection devices and their programs put to the test","author":"thalheim","year":"2002","journal-title":"CT Magazine"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(94)90127-9"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.032"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35528-3_17"},{"key":"8","first-page":"181","article-title":"Direct attacks using fake images in iris verification","author":"ruiz-albacete","year":"2008","journal-title":"Proceedings of the First COST 2101 Workshop on Biometrics and Identity Management (BIOD)"}],"event":{"name":"2011 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2011,10,18]]},"location":"Barcelona, Spain","end":{"date-parts":[[2011,10,21]]}},"container-title":["2011 Carnahan Conference on Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6088023\/6095872\/06095949.pdf?arnumber=6095949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T07:25:08Z","timestamp":1497943508000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6095949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ccst.2011.6095949","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}