{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T01:56:37Z","timestamp":1771898197471,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"FP7 European TABULA RASA Project","award":["257289"],"award-info":[{"award-number":["257289"]}]},{"name":"BEAT Project","award":["284989"],"award-info":[{"award-number":["284989"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/tifs.2015.2400392","type":"journal-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T19:40:31Z","timestamp":1423165231000},"page":"787-796","source":"Crossref","is-referenced-by-count":56,"title":["On the Use of Client Identity Information for Face Antispoofing"],"prefix":"10.1109","volume":"10","author":[{"given":"Ivana","family":"Chingovska","sequence":"first","affiliation":[]},{"given":"Andre","family":"Rabello dos Anjos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6393(95)00009-D"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0360"},{"key":"ref33","first-page":"1","article-title":"SHEEP, GOATS, LAMBS and WOLVES: A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation","author":"doddington","year":"1998","journal-title":"Proc Int Conf Spoken Lang Process"},{"key":"ref32","article-title":"On the recent use of local binary patterns for face authentication","author":"marcel","year":"2006"},{"key":"ref31","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613026"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1999.0361"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1007\/978-3-540-74549-5_65","article-title":"On the use of log-likelihood ratio based modelspecific score normalisation in biometric authentication","volume":"4642","author":"poh","year":"2007","journal-title":"Advances in Biometrics"},{"key":"ref35","volume":"65","author":"gibbons","year":"1985","journal-title":"Nonparametric Statistical Inference"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2012.6239226"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0009"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44887-X_26"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1117\/12.541955"},{"key":"ref12","first-page":"26","article-title":"A face antispoofing database with diverse attacks","author":"zhiwei","year":"2012","journal-title":"Proc 5th IAPR Int Conf Biometrics (ICB)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537866"},{"key":"ref14","first-page":"504","article-title":"Face liveness detection from a single image with sparse low rank bilinear discriminative model","author":"tan","year":"2010","journal-title":"Proc 11th ECCV"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"ref16","first-page":"1","article-title":"Face spoofing detection from single images using micro-texture analysis","author":"m\u00e4\u00e4tt\u00e4","year":"2011","journal-title":"Proc Int Joint Conf Biometrics"},{"key":"ref17","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"chingovska","year":"2012","journal-title":"Proc Int Conf Biometrics Special Interest Group (BIOSIG)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.23"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117522"},{"key":"ref4","author":"jain","year":"2007","journal-title":"Handbook of Biometrics"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.5772\/6397"},{"key":"ref3","article-title":"Why I love biometrics: It is &#x2018;liveness,&#x2019; not secrecy, that counts","author":"denning","year":"2001","journal-title":"Inf Secur Mag"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771438"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612968"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1007\/978-0-387-73003-5_68","article-title":"Liveness detection: Fingerprint","author":"schuckers","year":"2009","journal-title":"Encyclopedia of Biometrics"},{"key":"ref8","article-title":"Analysis and evaluation of alternatives and advanced solutions for system elements","author":"parziale","year":"2005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902037"},{"key":"ref2","author":"arthur","year":"2013","journal-title":"iPhone 5S Fingerprint Spoof Could Lead to ID Theft"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612955"},{"key":"ref1","first-page":"413","article-title":"Understanding OSN-based facial disclosure against face authentication systems","author":"li","year":"2014","journal-title":"Proc 9th ACM Symp Inf Comput Commun Secur"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2014-2"},{"key":"ref45","first-page":"1","article-title":"Can face anti-spoofing countermeasures work in a real world scenario?","author":"de freitas pereira","year":"2013","journal-title":"Proc Int Conf Biometrics"},{"key":"ref22","first-page":"221","article-title":"Video-based face spoofing detection through visual rhythm analysis","author":"da silva pinto","year":"2012","journal-title":"Proc 25th SIBGRAPI Conf Graph"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1110"},{"key":"ref42","article-title":"Improving automatic speaker verification using SVM techniques","author":"mclaren","year":"2009"},{"key":"ref24","first-page":"233","article-title":"A liveness detection method for face recognition based on optical flow field","author":"bao","year":"2009","journal-title":"Proc Int Conf Image Anal Process"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.45"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.05.004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2009.2035786"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2012.6485156"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.366896"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7059276\/07031941.pdf?arnumber=7031941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:47:59Z","timestamp":1642006079000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7031941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":45,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2015.2400392","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4]]}}}