{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:00:17Z","timestamp":1761663617169,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/iwbf.2017.7935080","type":"proceedings-article","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T16:21:59Z","timestamp":1496074919000},"page":"1-6","source":"Crossref","is-referenced-by-count":18,"title":["Non-reference image quality assessment for biometric presentation attack detection"],"prefix":"10.1109","author":[{"given":"Amrit Pal Singh","family":"Bhogal","sequence":"first","affiliation":[]},{"given":"Dominik","family":"Sollinger","sequence":"additional","affiliation":[]},{"given":"Pauline","family":"Trung","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.24.000B42"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2214050"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2147325"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2010.2043888"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.10.014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199819"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.11.024"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.09.003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25417-3_28"},{"key":"ref19","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"chingovska","year":"2012","journal-title":"Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398817"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVCS.2013.6626281"},{"key":"ref5","first-page":"146","article-title":"Face spoof detection with image distortion analysis","volume":"10","author":"wen","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2012.6489326"},{"key":"ref7","article-title":"Comparison of no-reference image quality assessment machine learning-based algorithms on compressed images","volume":"9396","author":"charrier","year":"2015","journal-title":"Image Quality and System Performance XII ser Prooceedings of SPIE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2404294"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2191563"}],"event":{"name":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2017,4,4]]},"location":"Coventry, United Kingdom","end":{"date-parts":[[2017,4,5]]}},"container-title":["2017 5th International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7933063\/7935078\/07935080.pdf?arnumber=7935080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T21:46:46Z","timestamp":1506980806000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7935080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iwbf.2017.7935080","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}