{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:02:24Z","timestamp":1773655344607,"version":"3.50.1"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100011039","name":"Intelligence Advanced Research Projects Activity (IARPA)","doi-asserted-by":"publisher","award":["17020200004"],"award-info":[{"award-number":["17020200004"]}],"id":[{"id":"10.13039\/100011039","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1109\/ijcb48548.2020.9304863","type":"proceedings-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T16:58:35Z","timestamp":1610038715000},"page":"1-10","source":"Crossref","is-referenced-by-count":25,"title":["Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach"],"prefix":"10.1109","author":[{"given":"Steven A.","family":"Grosz","sequence":"first","affiliation":[]},{"given":"Tarang","family":"Chugh","sequence":"additional","affiliation":[]},{"given":"Anil K.","family":"Jain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2520880"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00052"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.01.009"},{"key":"ref32","first-page":"553","article-title":"On the robustness of fingerprint liveness detection algorithms against new materials used for spoofing","volume":"8","author":"marasco","year":"2011","journal-title":"Biosignals"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2617756"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358776"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1117\/12.462719","article-title":"Impact of artificial&#x201D; gummy&#x201D; fingers on fingerprint systems","volume":"4677","author":"matsumoto","year":"2002","journal-title":"Optical Security and Counterfeit Deterrence Techniques IV"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.321"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04146-4_4"},{"key":"ref28","article-title":"Anti-fraud biometric scanner that accurately detects blood flow","author":"lapsley","year":"1998","journal-title":"US Patent"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2016.7515971"},{"key":"ref29","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_36"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1364\/TRANSLATIONAL.2016.TTh1B.4"},{"key":"ref20","first-page":"537","article-title":"Fingerprint liveness detection by local phase quantization","author":"ghiani","year":"0","journal-title":"Proceedings of the 21st International Conference on Pattern Recognition"},{"key":"ref22","article-title":"Fingerprint presentation attack detection based on local features encoding for unknown attacks","author":"gonz\u00e1lez-soler","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613027"},{"key":"ref24","first-page":"770","article-title":"Deep residual leaming for image recognition","author":"he","year":"0","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref23","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref26","year":"0","journal-title":"iso\/iec 30107-1 2016 Information Technology - Biometric Presentation Attack Detection - Part 1 Framework"},{"key":"ref25","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"howard","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref50","first-page":"585","article-title":"Controllable invariance through adversarial feature learning","author":"xie","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199810"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278779"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.161"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58347-1_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823572"},{"key":"ref40","year":"0","journal-title":"IARPA-BAA-16-04"},{"key":"ref12","article-title":"Censoring representations with an adversary","author":"edwards","year":"2015","journal-title":"ArXiv Preprint"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2797000"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2858764"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987319"},{"key":"ref16","author":"evans","year":"2019","journal-title":"Handbook of Biometric Anti-Spoofing Presentation Attack Detection"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987320"},{"key":"ref18","first-page":"2096","article-title":"Domain-adversarial training of neural networks","volume":"17","author":"ganin","year":"2016","journal-title":"The Journal of Machine Learning Research"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712708"},{"key":"ref4","author":"cao","year":"2016","journal-title":"Hacking mobile phones using 2d printed fingerprints"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812193"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1364\/AO.45.009238"},{"key":"ref8","article-title":"Fingerprint spoof generalization","author":"chugh","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref7","article-title":"Fingerprint presentation attack detection: Generalization and efficiency","author":"chugh","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.05.083"},{"key":"ref9","article-title":"OCT fingerprints: Resilience to presentation attacks","author":"chugh","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711436"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996294"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.316"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2934867"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61657-5_12"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987281"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00269"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2464772"}],"event":{"name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","location":"Houston, TX, USA","start":{"date-parts":[[2020,9,28]]},"end":{"date-parts":[[2020,10,1]]}},"container-title":["2020 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9304574\/9304852\/09304863.pdf?arnumber=9304863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:58:09Z","timestamp":1656453489000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9304863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/ijcb48548.2020.9304863","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}