{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T14:10:24Z","timestamp":1756995024141,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/icassp40776.2020.9053946","type":"proceedings-article","created":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T16:21:13Z","timestamp":1586449273000},"page":"986-990","source":"Crossref","is-referenced-by-count":6,"title":["The Swax Benchmark: Attacking Biometric Systems with Wax Figures"],"prefix":"10.1109","author":[{"given":"Rafael Henrique","family":"Vareto","sequence":"first","affiliation":[]},{"given":"Araceli","family":"Marcia Saldanha","sequence":"additional","affiliation":[]},{"given":"William Robson","family":"Schwartz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.254"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2321392"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.25.6.061404"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2676720"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2395139"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"ref16","first-page":"187","article-title":"Face spoofing detection on low-power devices using em-beddings with spatial and frequency-based descriptors","author":"vareto","year":"2019","journal-title":"Iberoamerican Congress on Pattern Recognition"},{"key":"ref17","article-title":"Transfer learning using convolutional neural networks for face anti-spoofing","author":"valle","year":"2017","journal-title":"Proceedings of the International Conference on Image Analysis and Recognition"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/9682453"},{"key":"ref28","article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","author":"huang","year":"2008","journal-title":"Proc Workshop Faces in &#x2018;Real-Life&#x2019; Images Detection Alignment and Recognition"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229961"},{"key":"ref27","article-title":"The det curve in assessment of detection task performance","author":"martin","year":"1997","journal-title":"Tech Rep National Inst of Standards and Technology Gaithersburg MD"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698550"},{"key":"ref6","article-title":"Face spoof detection with image distortion analysis","volume":"10","author":"wen","year":"2015","journal-title":"Transactions on Information Forensics and Security"},{"article-title":"6 arrested for pyramid sales scam","year":"2012","author":"daily","key":"ref5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.4309314"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2466088"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.193"},{"key":"ref1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"chingovska","year":"2012","journal-title":"International Conference of Biometrics Special Interest Group"},{"key":"ref20","article-title":"What you can&#x2019;t see can help you-extended-range imaging for 3d-mask pad","author":"bhattacharjee","year":"2017","journal-title":"International Conference of Biometrics Special Interest Group"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555286"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6515-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272758"},{"journal-title":"Tech Rep ISO\/IEC JTC 1\/SC 37 Biometrics","article-title":"Information technology - biometric presentation attack detection","year":"2017","key":"ref25"}],"event":{"name":"ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2020,5,4]]},"location":"Barcelona, Spain","end":{"date-parts":[[2020,5,8]]}},"container-title":["ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040208\/9052899\/09053946.pdf?arnumber=9053946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:26:08Z","timestamp":1656361568000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9053946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icassp40776.2020.9053946","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}