{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:24:47Z","timestamp":1772033087817,"version":"3.50.1"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001807","name":"S\u00e3o Paulo Research Foundation","doi-asserted-by":"publisher","award":["2010\/05647-4"],"award-info":[{"award-number":["2010\/05647-4"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"S\u00e3o Paulo Research Foundation","doi-asserted-by":"publisher","award":["2011\/22749-8"],"award-info":[{"award-number":["2011\/22749-8"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"S\u00e3o Paulo Research Foundation","doi-asserted-by":"publisher","award":["2013\/04172-0"],"award-info":[{"award-number":["2013\/04172-0"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"S\u00e3o Paulo Research Foundation","doi-asserted-by":"publisher","award":["2013\/11359-0"],"award-info":[{"award-number":["2013\/11359-0"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Federal University of Ouro Preto through the Brazilian National Research Council","doi-asserted-by":"publisher","award":["303673\/2010-9"],"award-info":[{"award-number":["303673\/2010-9"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Federal University of Ouro Preto through the Brazilian National Research Council","doi-asserted-by":"publisher","award":["304352\/2012-8"],"award-info":[{"award-number":["304352\/2012-8"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Federal University of Ouro Preto through the Brazilian National Research Council","doi-asserted-by":"publisher","award":["307113\/2012-4"],"award-info":[{"award-number":["307113\/2012-4"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Federal University of Ouro Preto through the Brazilian National Research Council","doi-asserted-by":"publisher","award":["477662\/2013-7"],"award-info":[{"award-number":["477662\/2013-7"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Federal University of Ouro Preto through the Brazilian National Research Council","doi-asserted-by":"publisher","award":["487529\/2013-8"],"award-info":[{"award-number":["487529\/2013-8"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Federal University of Ouro Preto through the Brazilian National Research Council","doi-asserted-by":"publisher","award":["479070\/2013-0"],"award-info":[{"award-number":["479070\/2013-0"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Federal University of Ouro Preto through the Brazilian National Research Council","doi-asserted-by":"publisher","award":["477457\/2013-4"],"award-info":[{"award-number":["477457\/2013-4"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Minas Gerais Research Foundation","award":["APQ-01806-13"],"award-info":[{"award-number":["APQ-01806-13"]}]},{"name":"Coordination for the Improvement of Higher Education Personnel (CAPES) DeepEyes Project"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/tifs.2015.2398817","type":"journal-article","created":{"date-parts":[[2015,2,2]],"date-time":"2015-02-02T15:20:43Z","timestamp":1422890443000},"page":"864-879","source":"Crossref","is-referenced-by-count":456,"title":["Deep Representations for Iris, Face, and Fingerprint Spoofing Detection"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2430-2030","authenticated-orcid":false,"given":"David","family":"Menotti","sequence":"first","affiliation":[]},{"given":"Giovani","family":"Chiachia","sequence":"additional","affiliation":[]},{"given":"Allan","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"William","family":"Robson Schwartz","sequence":"additional","affiliation":[]},{"given":"Helio","family":"Pedrini","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Xavier Falcao","sequence":"additional","affiliation":[]},{"given":"Anderson","family":"Rocha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712708"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612964"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/BIOMS.2013.6656148"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199810"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117509"},{"key":"ref74","first-page":"1363","article-title":"BSIF: Binarized statistical image features","author":"kannala","year":"2012","journal-title":"Proc Int Conf Pattern Recognit (ICPR)"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(94)90127-9"},{"key":"ref75","author":"hyv\u00e4rinen","year":"2009","journal-title":"Natural Image Statistics A Probabilistic Approach to Early Computational Vision"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199819"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613026"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459469"},{"key":"ref33","first-page":"1","article-title":"Counterfeit iris detection based on texture analysis","author":"wei","year":"2008","journal-title":"Proc Int Conf Pattern Recognit (ICPR)"},{"key":"ref32","first-page":"361","article-title":"Highly reliable liveness detection method for iris recognition","author":"kanematsu","year":"2007","journal-title":"Proc Annu Conf SICE"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2006.313440"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/11608288_53","article-title":"Fake iris detection by using purkinje image","volume":"3832","author":"lee","year":"2005","journal-title":"Advances in Biometrics"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCA.2012.6179228"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2013.6475026"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712745"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613021"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638076"},{"key":"ref62","first-page":"504","article-title":"Face liveness detection from a single image with sparse low rank bilinear discriminative model","author":"tan","year":"2010","journal-title":"Proc Eur Conf Comp Vis (ECCV)"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2013.6553761"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2013.6622704"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47044-6_5"},{"key":"ref64","first-page":"1","article-title":"Can face anti-spoofing countermeasures work in a real world scenario?","author":"de freitas pereira","year":"2013","journal-title":"Proc IAPR Int Conf Biometrics (ICB)"},{"key":"ref27","first-page":"133","article-title":"MobBIO: A multimodal database captured with a portable handheld device","author":"sequeira","year":"2014","journal-title":"Proc Int Conf Comput Vis Theory Appl (VISAPP)"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2014-2"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/BIDS.2009.5507534"},{"key":"ref29","article-title":"Iris recognition and anti-spoofing countermeasures","author":"daugman","year":"2004","journal-title":"Proc 7th Int Biometrics Conf"},{"key":"ref67","first-page":"12","article-title":"First international fingerprint liveness detection competition&#x2014;LivDet 2009","volume":"5716","author":"marcialis","year":"2009","journal-title":"Proc 15th Int Conf Image Anal Process (ICIAP)"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.11.024"},{"key":"ref69","first-page":"537","article-title":"Fingerprint liveness detection by local phase quantization","author":"ghiani","year":"2012","journal-title":"Proc Int Conf Pattern Recognit (ICPR)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.303"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9_1"},{"key":"ref20","first-page":"1","article-title":"On random weights and unsupervised feature learning","author":"saxe","year":"2011","journal-title":"Proc 28th Int Conf Mach Learn"},{"key":"ref22","first-page":"2546","article-title":"Algorithms for hyper-parameter optimization","author":"bergstra","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771385"},{"key":"ref24","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014"},{"key":"ref23","first-page":"115","article-title":"Making a science of model search: Hyperparameter optimization in hundreds of dimensions for vision architectures","author":"bergstra","year":"2013","journal-title":"Proc 30th Int Conf Mach Learn"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MMAR.2013.6669876"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-89991-4_19","article-title":"Direct attacks using fake images in iris verification","volume":"5372","author":"ruiz-albacete","year":"2008","journal-title":"Proc 1st Eur Workshop Biometrics Identity Manage"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117592"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8_5"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/0042-6989(92)90196-P"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33269-2_52"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/34.598235"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2005.147"},{"key":"ref56","first-page":"1","article-title":"Spoofing 2D face recognition systems with 3D masks","author":"erdogmus","year":"2013","journal-title":"Proc of the Int'l Conf of the Biometrics Special Interest Group (BIOSIG'10)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2012.38"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638078"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/IJCB.2011.6117510","article-title":"Face spoofing detection from single images using micro-texture analysis","author":"m\u00e4\u00e4tt\u00e4","year":"2011","journal-title":"Proc Int Joint Conf Biometrics (IJCB 2011)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ICB.2013.6613027","article-title":"LivDet 2013&#x2014;Fingerprint liveness detection competition","author":"ghiani","year":"2013","journal-title":"Proc Int Conf Biometrics (ICB)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.10.014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00052"},{"key":"ref13","article-title":"ImageNet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2012.02.023"},{"key":"ref15","first-page":"2056","article-title":"Joint deep learning for pedestrian detection","author":"ouyang","year":"2014","journal-title":"Proc IEEE Int Conf Comput Vis (ICCV)"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref81","first-page":"818","article-title":"Visualizing and understanding convolutional networks","author":"zeiler","year":"2014","journal-title":"Proc Eur Conf Comp Vis (ECCV)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1000579"},{"key":"ref84","author":"bergstra","year":"2013","journal-title":"Hyperparameter Optimization for Convolutional Vision Architecture"},{"key":"ref18","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/0-387-33123-9_4","article-title":"Score level fusion","volume":"6","author":"ross","year":"2006","journal-title":"Handbook of Multibiometrics"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref80","author":"krizhevsky","year":"2012","journal-title":"CUDA-Convnet High-Performance C++\/CUDA Implementation of Convolutional Neural Networks"},{"key":"ref89","author":"wardern","year":"2014","journal-title":"The SDK for Jetpac&#x2019;s iOS Deep Belief Image Recognition Framework"},{"key":"ref4","first-page":"1","article-title":"Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection","volume":"1","author":"galbally","year":"2007","journal-title":"Database"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2011.5981720"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996290"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-45344-X_32","article-title":"An analysis of minutiae matching strength","author":"ratha","year":"2001","journal-title":"Audio- and Video-Based Biometric Person Authentication"},{"key":"ref85","first-page":"1","article-title":"Theano: A CPU and GPU math compiler in python","author":"bergstra","year":"2010","journal-title":"Proc 9th Python Sci Comput Conf (SciPy)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2313025"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MC.2014.118","article-title":"Cosmetic contact lenses and iris recognition spoofing","volume":"47","author":"bowyer","year":"2014","journal-title":"Computer"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.234"},{"key":"ref87","author":"chiachia","year":"2014","journal-title":"Hyperparameter Optimization Made Simple"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612968"},{"key":"ref9","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"chingovska","year":"2012","journal-title":"Proc of the Int'l Conf of the Biometrics Special Interest Group (BIOSIG'10)"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/978-3-540-69905-7_27","article-title":"Blur insensitive texture classification using local phase quantization","author":"ojansivu","year":"2008","journal-title":"Proc 3rd Int Conf Image Signal Process (ICISP)"},{"key":"ref45","author":"doyle","year":"2014","journal-title":"Notre Dame Image Dataset for Contact Lens Detection in Iris Recognition"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2012.6466800"},{"key":"ref42","author":"schuckers","year":"2013","journal-title":"LivDet 2013&#x2014;Liveness Detection-Iris Competition"},{"key":"ref41","first-page":"22","article-title":"Iris liveness detection methods in mobile applications","author":"sequeira","year":"2014","journal-title":"Proc Int Conf Comput Vis Theory Appl (VISAPP)"},{"key":"ref44","article-title":"Robust iris localisation in challenging scenarios","author":"monteiro","year":"2004","journal-title":"Computer Vision Imaging and Computer Graphics Theory and Applications"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2014.6889816"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7059276\/07029061.pdf?arnumber=7029061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:48:00Z","timestamp":1641988080000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":90,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2015.2398817","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4]]}}}