{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T21:23:12Z","timestamp":1745097792577},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/iwbf.2014.6914251","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T20:57:46Z","timestamp":1412801866000},"page":"1-4","source":"Crossref","is-referenced-by-count":11,"title":["Integrating ocular and iris descriptors for fake iris image detection"],"prefix":"10.1109","author":[{"given":"Chun-Wei","family":"Tan","sequence":"first","affiliation":[]},{"given":"Ajay","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Counterfeit iris detection based on texture analysis","author":"wei","year":"2008","journal-title":"Proc of ICPR"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612954"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2008.2003432"},{"key":"ref13","first-page":"181","article-title":"Direct attacks using fake images in iris verification","author":"ruiz-albacete","year":"2008","journal-title":"Proc COST 2101 Workshop on Biometrics and Identity Management BioID"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902037"},{"key":"ref4","first-page":"181","article-title":"Direct attacks using fake images in iris verification","author":"ruiz-albacete","year":"2008","journal-title":"Proc BIOID"},{"year":"0","key":"ref3"},{"journal-title":"Fake Iris Images Database ATVS-FIr DB","year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.08.016"},{"journal-title":"Vlfeat An Open and Portable Library of Computer Vision Algorithms","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"year":"2012","key":"ref2","article-title":"Role of biometric technology in Aadhaar enrollments, UID Authority of India"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.08.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199819"}],"event":{"name":"2014 2nd International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2014,3,27]]},"location":"Valletta, Malta","end":{"date-parts":[[2014,3,28]]}},"container-title":["2nd International Workshop on Biometrics and Forensics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6903649\/6914235\/06914251.pdf?arnumber=6914251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:37:31Z","timestamp":1490308651000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6914251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iwbf.2014.6914251","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}