{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:29:41Z","timestamp":1775838581513,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/icb.2012.6199754","type":"proceedings-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T17:11:43Z","timestamp":1344445903000},"page":"26-31","source":"Crossref","is-referenced-by-count":638,"title":["A face antispoofing database with diverse attacks"],"prefix":"10.1109","author":[{"given":"Zhiwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Junjie","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Sifei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Stan Z.","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"The DET curve in assessment of detection task performance","author":"martin","year":"1997","journal-title":"European Conference on Speech Communication and Technology"},{"key":"17","author":"chang","year":"0"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587834"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"16","year":"0","journal-title":"IJCB'11 Competition on Counter Measures to 2D Facial Spoofing Attacks"},{"key":"13","article-title":"Eye states detection by boosting local binary pattern histograms","author":"xu","year":"2008","journal-title":"ICIP"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.20"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/2.820041"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537866"},{"key":"2","article-title":"Face liveness detection from a single image with sparse low rank bilinear discriminative model","author":"tan","year":"2010","journal-title":"ECCV"},{"key":"1","article-title":"Your face is not your password","author":"duc","year":"2009","journal-title":"Black Hat Conference"},{"key":"10","article-title":"Liveness verification in audio-video speaker authentication","author":"chetty","year":"2004","journal-title":"10th Australian Int Conference on Speech Science and Technology"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CVBVS.2000.855246"},{"key":"6","article-title":"Face spoofing detection from single images using micro-texture analysis","author":"jukka","year":"2011","journal-title":"IJCB"},{"key":"5","article-title":"Live face detection based on the analysis of Fourier spectra","author":"li","year":"1999","journal-title":"SPIE Biometric Technology for Human Identification"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563115"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.26.000760"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771438"}],"event":{"name":"2012 5th IAPR International Conference on Biometrics (ICB)","location":"New Delhi, India","start":{"date-parts":[[2012,3,29]]},"end":{"date-parts":[[2012,4,1]]}},"container-title":["2012 5th IAPR International Conference on Biometrics (ICB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6195082\/6199747\/06199754.pdf?arnumber=6199754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T23:49:21Z","timestamp":1490140161000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6199754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icb.2012.6199754","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}