{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:11:50Z","timestamp":1761581510178,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/ipta.2016.7820995","type":"proceedings-article","created":{"date-parts":[[2017,1,19]],"date-time":"2017-01-19T22:23:17Z","timestamp":1484864597000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Fake face detection based on radiometric distortions"],"prefix":"10.1109","author":[{"given":"Taiamiti","family":"Edmunds","sequence":"first","affiliation":[]},{"given":"Alice","family":"Caplier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Can face anti-spoofing countermeasures work in a real worldscenario?","author":"freitas pereira","year":"2013","journal-title":"ICB2013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.211"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613026"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.05.004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2013.6553761"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1201\/9781420054538.ch10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s11235-010-9313-3","article-title":"Monocular camera-based face liveness detection by combining eyeblink and scene context","volume":"47","author":"pan","year":"2010","journal-title":"Telecommunication Systems"},{"key":"ref4","first-page":"1","article-title":"Competition on counter measures to 2-d facial spoofing attacks","author":"murali mohan","year":"2011","journal-title":"Biometrics (IJCB) 2011 InternationalJoint Conference on"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IASP.2009.5054589"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400392"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206821"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199761"},{"key":"ref7","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"chingovska","year":"0","journal-title":"Biometrics Special Interest Group (BIOSIG) 2012 BIOSIG-Proceedings of the International Conference of the"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"ref9","article-title":"Your face is NOT your password Face Authentication ByPassing LenovoAsusToshiba","author":"minh duc","year":"2009","journal-title":"Black Hat Briefings"},{"key":"ref1","article-title":"Motion-Based Counter-Measures to Photo Attacks in Face Recognition","author":"andr","year":"2013","journal-title":"Biometrics Idiap ResearchInstitute"},{"article-title":"measuring luminance with a digital camera","year":"2011","author":"hiscocks","key":"ref20"},{"key":"ref22","first-page":"1","article-title":"Face spoofing detection through partial least squares and low-level descriptors","author":"robson schwartz","year":"0","journal-title":"Biometrics (IJCB) 2011 InternationalJoint Conference on"},{"key":"ref21","first-page":"1434","article-title":"N-dimensional probability density function transfer and its application to color transfer","volume":"2","author":"francois","year":"0","journal-title":"Computer Vision 2005 ICCV 2005 Tenth IEEE International Conference on"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612957"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117522"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2403306"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"}],"event":{"name":"2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA)","start":{"date-parts":[[2016,12,12]]},"location":"Oulu, Finland","end":{"date-parts":[[2016,12,15]]}},"container-title":["2016 Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7799452\/7820922\/07820995.pdf?arnumber=7820995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T15:50:21Z","timestamp":1568735421000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7820995\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ipta.2016.7820995","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}