{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:55:18Z","timestamp":1729626918572,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/ipta.2018.8608133","type":"proceedings-article","created":{"date-parts":[[2019,1,15]],"date-time":"2019-01-15T09:45:29Z","timestamp":1547545529000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["A Look At Non-Cooperative Presentation Attacks in Fingerprint Systems"],"prefix":"10.1109","author":[{"given":"Emanuela","family":"Marasco","sequence":"first","affiliation":[]},{"given":"Stefany","family":"Cando","sequence":"additional","affiliation":[]},{"given":"Larry","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Ghiani","sequence":"additional","affiliation":[]},{"given":"Gian Luca","family":"Marcialis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"3706","article-title":"A release induced response for the rapid recognition of latent fingerprints and formation of inkjet printed patterns","volume":"50","author":"shengyang","year":"0","journal-title":"Angewandte Chemie International Edition"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-6524-8","author":"marcel","year":"2014","journal-title":"Handbook of Biometric Anti-spoofing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-008-0098-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2016.0007"},{"key":"ref14","first-page":"1","article-title":"Fingerprint Liveness Detection by Local Phase Quantization","author":"ghiani","year":"2012","journal-title":"Proc ICPR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BIOMS.2013.6656148"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996224"},{"key":"ref17","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400393"},{"key":"ref19","first-page":"1","article-title":"Robust and interoperable fingerprint spoof detection via convolutional neural networks","author":"marasco","year":"2016","journal-title":"IEEE International Conference on Technologies for Homeland Security"},{"key":"ref4","article-title":"Spoof Detection Schemes","author":"nixon","year":"2007","journal-title":"Handbook of Biometrics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(02)00407-7"},{"key":"ref6","first-page":"22","article-title":"Evaluating software-based fingerprint liveness detection using convolutional networks and local binary patterns","author":"nogueira","year":"2014","journal-title":"Biometric Measurements and Systems for Security and Medical Applications (BIOMS)"},{"key":"ref5","article-title":"A survey on antispoofing schemes for fingerprint recognition systems","volume":"47","author":"marasco","year":"2014","journal-title":"ACM Comput Surv"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812193"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2520880"},{"article-title":"Fooling fingerprint scanners -biometric vulnerabilities of the precise biometrics 100 sc scanner","year":"2003","author":"sten","key":"ref2"},{"key":"ref9","article-title":"Diving deeper into mentee networks","author":"venkatesan","year":"2016","journal-title":"arXiv preprint arXiv 1604 08220"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.12.008"},{"key":"ref20","first-page":"1363","article-title":"BSIF: Binarized statistical image features","author":"kannala","year":"2012","journal-title":"Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00026-5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613027"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LNLA.2009.5278397"},{"article-title":"NFIQ 2.0 - Features for fingerprint quality determination","year":"2016","author":"olsen","key":"ref25"}],"event":{"name":"2018 Eighth International Conference on Image Processing Theory, Tools and Applications (IPTA)","start":{"date-parts":[[2018,11,7]]},"location":"Xi'an","end":{"date-parts":[[2018,11,10]]}},"container-title":["2018 Eighth International Conference on Image Processing Theory, Tools and Applications (IPTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8601121\/8608118\/08608133.pdf?arnumber=8608133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T22:52:19Z","timestamp":1694559139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8608133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ipta.2018.8608133","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}