{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:09:42Z","timestamp":1772554182532,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tencon.2018.8650515","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T17:10:38Z","timestamp":1552929038000},"page":"0309-0314","source":"Crossref","is-referenced-by-count":9,"title":["Face Spoofing Video Detection Using Spatio-Temporal Statistical Binary Pattern"],"prefix":"10.1109","author":[{"given":"Ying","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Rohit Kumar","family":"Dubey","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Vrizlynn. L.L.","family":"Thing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612981"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2403306"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2000.903548"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.09.029"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5772\/6397"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/978-3-540-74549-5_27","article-title":"Blinking-based live face detection using conditional random fields","volume":"4642","author":"sun","year":"2007","journal-title":"Advances in Biometrics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902037"},{"key":"ref14","first-page":"72","article-title":"Xm2vtsdb: The extended m2vts database","author":"messer","year":"1999","journal-title":"Second International Conference on Audio and Video-based Biometric Person Authentication"},{"key":"ref15","author":"barron","year":"2004","journal-title":"Tutorial Computing 2D and 3D Optical Flow"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.23"},{"key":"ref17","first-page":"233","article-title":"A liveness detection method for face recognition based on optical flow field","author":"bao","year":"2009","journal-title":"International Conference on Image Analysis and Signal Processing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/AUTOID.2005.20"},{"key":"ref19","first-page":"109","article-title":"Liveness detection for face recognition","author":"fronthaler","year":"2008","journal-title":"Recent Advances in Face Recognition"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2007.4284852"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-642-37410-4_11","article-title":"Lbptop based countermeasure against face spoofing attacks","author":"de freitas pereira","year":"2013","journal-title":"Computer Vision-ACCV 2012 Workshops"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771416"},{"key":"ref3","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"chingovska","year":"2012","journal-title":"Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"ref29","first-page":"391","article-title":"Analysis of facial expression and recognition based on statistical approach","volume":"2","author":"londhe","year":"2012","journal-title":"International Journal of Soft Computing and Engineering"},{"key":"ref5","article-title":"Face spoofing detection using dynamic texture","author":"komulainen","year":"2012","journal-title":"Computer Vision-ACCV 2012 Workshops"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2458700"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2014-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537866"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5121\/ijit.2014.3202"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199760"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"ref21","first-page":"1","author":"maatta","year":"2011"},{"key":"ref24","first-page":"34","article-title":"Robust real-time object detection","volume":"4","author":"viola","year":"2001","journal-title":"International Journal of Computer Vision"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1657","DOI":"10.1109\/TIP.2010.2044957","article-title":"A completed modeling of local binary pattern operator for texture classification","volume":"19","author":"guo","year":"2010","journal-title":"IEEE Transactions on Image Processin"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/3-540-45103-X_117","article-title":"Multi-scale binary patterns for texture analysis","author":"maenpaa","year":"2003","journal-title":"Image Analysis"}],"event":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","location":"Jeju, Korea (South)","start":{"date-parts":[[2018,10,28]]},"end":{"date-parts":[[2018,10,31]]}},"container-title":["TENCON 2018 - 2018 IEEE Region 10 Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8643125\/8650051\/08650515.pdf?arnumber=8650515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T20:34:14Z","timestamp":1598214854000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8650515\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/tencon.2018.8650515","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}