{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:53:22Z","timestamp":1772502802011,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/isba.2017.7947686","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:35:15Z","timestamp":1497566115000},"page":"1-8","source":"Crossref","is-referenced-by-count":57,"title":["Spoofing faces using makeup: An investigative study"],"prefix":"10.1109","author":[{"given":"Cunjian","family":"Chen","sequence":"first","affiliation":[]},{"given":"Antitza","family":"Dantcheva","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Swearingen","sequence":"additional","affiliation":[]},{"given":"Arun","family":"Ross","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"huang","year":"2007","journal-title":"University of Massachusetts Amherst Technical Report"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77326-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2015.7163104"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2013.6553761"},{"key":"ref14","article-title":"Live face detection based on the analysis of fourier spectra","author":"li","year":"2004","journal-title":"Proc of SPIE 5404"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996301"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0009"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-6524-8","author":"marcel","year":"2014","journal-title":"Handbook of Biometric Anti-Spoofing Trusted Biometrics Under Spoofing Attacks"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1055\/s-0032-1325647"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"ref4","article-title":"Impact of facial cosmetics on automatic gender and age estimation algorithms","author":"chen","year":"2014","journal-title":"Proc of VISAPP"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612994"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374605"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.09.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2013.6659328"},{"key":"ref7","article-title":"Female facial aesthetics based on soft biometrics and photo-quality","author":"dantcheva","year":"2011","journal-title":"Proc of ICME"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117509"},{"key":"ref9","first-page":"1","article-title":"Face authentication with makeup changes","author":"guo","year":"2013","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"ref20","article-title":"Deep face recognition","author":"parkhi","year":"2015","journal-title":"Proc of BMVC"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1364\/AO.55.005226"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref24","article-title":"Counterfeit iris detection based on texture analysis","author":"wei","year":"2008","journal-title":"Proc of ICPR"},{"key":"ref23","article-title":"Face liveness detection from a single image with sparse low rank bilinear discriminative model","author":"tan","year":"2010","journal-title":"Proc of ECCV"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.161"}],"event":{"name":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","location":"New Delhi, India","start":{"date-parts":[[2017,2,22]]},"end":{"date-parts":[[2017,2,24]]}},"container-title":["2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938565\/7947678\/07947686.pdf?arnumber=7947686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T17:30:59Z","timestamp":1750354259000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7947686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isba.2017.7947686","relation":{},"subject":[],"published":{"date-parts":[[2017,2]]}}}