{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:11:01Z","timestamp":1729635061971,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/icmcs.2014.6911332","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T20:49:12Z","timestamp":1412801352000},"page":"1248-1255","source":"Crossref","is-referenced-by-count":0,"title":["Introduction to identity usurpation applied to biometric modalities"],"prefix":"10.1109","author":[{"given":"My Youssef","family":"Ichahane","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Chiny","sequence":"additional","affiliation":[]},{"given":"Anas","family":"Abou Elkalam","sequence":"additional","affiliation":[]},{"given":"Abdellah","family":"Ait Ouahman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IEEE International Conference on Automatic Face and Gesture Recognition","first-page":"436","year":"2011","key":"ref30"},{"year":"0","author":"akhtar","key":"ref10"},{"journal-title":"Score normalization in multimodal biometric systems","year":"0","author":"jaina","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00079-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.012"},{"journal-title":"Advances in Distributed Sensor Technology","year":"1995","author":"iyengar","key":"ref14"},{"year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45344-X_32"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1520\/JFS12024J"},{"key":"ref18","first-page":"275","article-title":"Impact of artificial &#x201C;gummy&#x201D; fingers on fingerprint systems","author":"matsumoto","year":"2002","journal-title":"SPIE Proceedings vol 4677 Optical Security and Counterfeit Deterrence Techniques"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117509"},{"journal-title":"AFaceAntispoofing Database with Diverse Attacks","year":"0","author":"zhang","key":"ref28"},{"article-title":"Developpement d'un module de segmentation pour un systeme de reconnaissance biometrique base sur I&#x2019; iris","year":"0","author":"anh","key":"ref4"},{"journal-title":"A Study on Performance Evaluation of the Liveness Detection for Various Fingerprint Sensor Modules","year":"2003","author":"kang","key":"ref27"},{"key":"ref3","article-title":"Introduction a la Biometrie Authentification des individus par Traitement Audio-Video","volume":"19","author":"florent","year":"2002","journal-title":"Traitement du Signal"},{"key":"ref6","article-title":"Matching performance for the US-Visit IDENT system using flat fingerprints","author":"garris","year":"2004","journal-title":"Technical report 7110 National Institute of Standards and Technology (NIST)"},{"journal-title":"Face Liveness Detection","year":"0","author":"zhiwei","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/962081.962102"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJBM.2010.030415"},{"year":"0","key":"ref7"},{"key":"ref2","first-page":"5","article-title":"Foiling the cracker; a survey of, and improvements to unix password security","author":"klien","year":"1990","journal-title":"Proc Second USENIX Workshop Security"},{"year":"0","key":"ref1"},{"key":"ref9","first-page":"xiv","article-title":"Face Detection and Modeling for Recognition","volume":"191","author":"hsu","year":"2002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89991-4_19"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45226-3_169"},{"article-title":"Adversarial Pattern Classification","year":"2010","author":"biggio","key":"ref21"},{"key":"ref24","first-page":"258","article-title":"Raffaele Cappelli","volume":"27","year":"2009","journal-title":"Image and Vision Computing"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00038-9"},{"key":"ref26","first-page":"114","article-title":"Body check: biometric access protection devices and their programs put to the test","author":"thalheim","year":"2002","journal-title":"Computer Magazine"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.4159\/9780674029682","author":"cole","year":"2001","journal-title":"Suspect Identities A History of Fingerprint and Criminal Identification"}],"event":{"name":"2014 International Conference on Multimedia Computing and Systems (ICMCS)","start":{"date-parts":[[2014,4,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2014,4,16]]}},"container-title":["2014 International Conference on Multimedia Computing and Systems (ICMCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6900112\/6911126\/06911332.pdf?arnumber=6911332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T15:22:07Z","timestamp":1650381727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6911332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icmcs.2014.6911332","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}