{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T13:03:50Z","timestamp":1772715830462,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100011039","name":"Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity","doi-asserted-by":"publisher","award":["2017-17020200005"],"award-info":[{"award-number":["2017-17020200005"]}],"id":[{"id":"10.13039\/100011039","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German Federal Ministry of Education and Research"},{"name":"Hessen State Ministry for Higher Education, Research"},{"DOI":"10.13039\/501100003495","name":"Arts within their joint support of the National Research Center for Applied Cybersecurity ATHENE","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003495","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Biom. Behav. Identity Sci."],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1109\/tbiom.2021.3050036","type":"journal-article","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T22:34:36Z","timestamp":1610231676000},"page":"190-202","source":"Crossref","is-referenced-by-count":31,"title":["Anomaly Detection With Convolutional Autoencoders for Fingerprint Presentation Attack Detection"],"prefix":"10.1109","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3128-8049","authenticated-orcid":false,"given":"Jascha","family":"Kolberg","sequence":"first","affiliation":[]},{"given":"Marcel","family":"Grimmer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4581-5353","authenticated-orcid":false,"given":"Marta","family":"Gomez-Barrero","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9159-2923","authenticated-orcid":false,"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199810"},{"key":"ref38","author":"radford","year":"2015","journal-title":"Unsupervised representation learning with deep convolutional generative adversarial networks"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2016.2532598"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/RBME.2013.2243140"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2015.7110228"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987319"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987247"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00022"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823572"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5_196"},{"key":"ref61","author":"simonyan","year":"2014","journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition"},{"key":"ref28","article-title":"Multi-spectral short wave infrared sensors and convolutional neural networks for biometric presentation attack detection","author":"gomez-barrero","year":"2020","journal-title":"AI and Deep Learning in Biometric Security Trends Potential and Challenges"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2934867"},{"key":"ref29","first-page":"1","article-title":"Analysing the performance of LSTMs and CNNs on 1310 nm laser data for fingerprint presentation attack detection","author":"kolberg","year":"2020","journal-title":"Proc Int Joint Conf Biometrics (IJCB 2011)"},{"key":"ref2","year":"2016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2018.00089"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987428"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.03.053"},{"key":"ref24","first-page":"1","article-title":"Multi-algorithm benchmark for fingerprint presentation attack detection with laser speckle contrast imaging","author":"kolberg","year":"2019","journal-title":"Proc Int Conf Biometrics Special Interest Group (BIOSIG)"},{"key":"ref23","author":"chugh","year":"2019","journal-title":"OCT fingerprints Resilience to presentation attacks"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27731-4_14"},{"key":"ref25","first-page":"1","article-title":"Multi-modal fingerprint presentation attack detection: Looking at the surface and the inside","author":"gomez-barrero","year":"2019","journal-title":"Proc Int Conf Biometrics (ICB)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.27.335"},{"key":"ref51","author":"berger","year":"2013","journal-title":"Statistical Decision Theory and Bayesian Analysis"},{"key":"ref59","first-page":"34","article-title":"One-class SVM for learning in image retrieval","volume":"1","author":"chen","year":"2001","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"ref58","article-title":"Understanding RMSprop&#x2014;Faster neural network learning","author":"bushaev","year":"0","journal-title":"Towards Data Science"},{"key":"ref57","author":"chollet","year":"2015","journal-title":"Keras"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2017.8248461"},{"key":"ref55","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref54","author":"springenberg","year":"2014","journal-title":"Striving for simplicity The all convolutional net"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/widm.2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2617756"},{"key":"ref11","year":"2017","journal-title":"Information Technology&#x2014;Biometric Presentation Attack Detection&#x2014;Part 3 Testing and Reporting"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-921-7_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2011.05.014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/197925"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1364\/AO.55.003387"},{"key":"ref16","first-page":"1","article-title":"Towards fingerprint presentation attack detection based on short wave infrared imaging and spectral signatures","author":"gomez-barrero","year":"2018","journal-title":"Proc Norwegian Inf Security Conf (NISK)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2018.8553413"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2018.8552931"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630773"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2018.8401565"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_8"},{"key":"ref8","article-title":"One-class classification: Concept learning in the absence of counter-examples","author":"tax","year":"2002"},{"key":"ref7","author":"singh","year":"2020","journal-title":"A survey on unknown presentation attack detection for fingerprint"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73004-2_8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0020"},{"key":"ref46","author":"spinoulas","year":"2020","journal-title":"Multi-modal fingerprint presentation attack detection Evaluation on a new dataset"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2016.7550052"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1001\/archderm.1988.01670060015008"},{"key":"ref42","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"chingovska","year":"2012","journal-title":"Proc IEEE Int Conf Biometrics Special Interest Group (BIOSIG)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916652"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG.2016.7736936"}],"container-title":["IEEE Transactions on Biometrics, Behavior, and Identity Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8423754\/9385568\/09316670.pdf?arnumber=9316670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T20:00:27Z","timestamp":1639771227000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9316670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":61,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tbiom.2021.3050036","relation":{},"ISSN":["2637-6407"],"issn-type":[{"value":"2637-6407","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]}}}