{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:04Z","timestamp":1771700164718,"version":"3.50.1"},"reference-count":105,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Instituto de Telecomunica\u00e7\u00f5es through the Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","doi-asserted-by":"publisher","award":["UID\/EEA\/ 50008\/2013"],"award-info":[{"award-number":["UID\/EEA\/ 50008\/2013"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/tifs.2018.2799427","type":"journal-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T22:10:36Z","timestamp":1517263836000},"page":"1696-1709","source":"Crossref","is-referenced-by-count":40,"title":["Light Field-Based Face Presentation Attack Detection: Reviewing, Benchmarking and One Step Further"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4881-5386","authenticated-orcid":false,"given":"Alireza","family":"Sepas-Moghaddam","sequence":"first","affiliation":[]},{"given":"Fernando","family":"Pereira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6525-9572","authenticated-orcid":false,"given":"Paulo Lobato","family":"Correia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"High performance imaging using arrys of inexpensive cameras","author":"wilburn","year":"2004"},{"key":"ref38","year":"2017","journal-title":"Raytrix gmbh"},{"key":"ref33","first-page":"3","article-title":"The plenoptic function and the elements of early vision","author":"adelson","year":"1991","journal-title":"Computational Models of Visual Processing"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/sapm193918151"},{"key":"ref31","first-page":"245","article-title":"&#x00C9;preuves r&#x00E9;versibles. Photographies int&#x00E9;grales","volume":"13","author":"lippmann","year":"1908","journal-title":"Comptes Rendus Acad Sci"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref37","article-title":"Plenoptic signal processing for robust vision in field robotics","author":"dansereau","year":"2014"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02241-8","author":"zhang","year":"2006","journal-title":"Light Field Sampling"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2016.7552939"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/237170.237200"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532603"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2395951"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0095"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612980"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2013.6622829"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2013.93"},{"key":"ref24","article-title":"Ear recognition in a light field imaging framework: A new perspective","author":"sepas-moghaddam","year":"0","journal-title":"IET Biometrics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296996"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s141222471"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612981"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935086"},{"key":"ref100","year":"2015","journal-title":"Best Practice Operational Guidelines for Automated Border Control (ABC) Systems"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0009"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2012.6485156"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771438"},{"key":"ref56","first-page":"1","article-title":"Face spoofing detection from single images using micro-texture analysis","author":"m\u00e4\u00e4tt\u00e4","year":"2011","journal-title":"Proc Int Joint Conf Biometrics"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.77"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref52","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"chingovska","year":"2012","journal-title":"Proc Int Conf Biometrics Special Interest Group"},{"key":"ref40","year":"2017","journal-title":"Coding of Audio Picture Multimedia and Hypermedia Information"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2381273"},{"key":"ref3","article-title":"2D face recognition: An experimental and reproducible research survey","author":"g\u00fcnther","year":"2017"},{"key":"ref6","author":"ngo","year":"2015","journal-title":"Biometrics & Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.22"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0089"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00079-5"},{"key":"ref7","year":"2016","journal-title":"Information Technology&#x2014;Biometric Presentation Attack Detection&#x2014;Part 1 Framework"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3038924"},{"key":"ref46","first-page":"1","article-title":"Context based face anti-spoofing","author":"komulainen","year":"2014","journal-title":"Proc IEEE Conf Biometrics Theory Appl Syst"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3002-4_28"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9313-3"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref42","first-page":"65","article-title":"Fake face recognition using fusion of thermal imaging and skin elasticity","volume":"4","author":"kant","year":"2013","journal-title":"Int J Comput Sci Commun"},{"key":"ref41","year":"2017","journal-title":"Information Technology-Presentation Attack Detection&#x2014;Part 3 Testing Reporting and Classification of Attacks"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899769"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23678-5_12"},{"key":"ref73","first-page":"547","article-title":"A novel face spoofing detection method based on gaze estimation","author":"cai","year":"2014","journal-title":"Proc Asian Conf Comput Vis"},{"key":"ref72","first-page":"1","article-title":"Robust 2D\/3D face mask presentation attack detection scheme by exploring multiple features and comparison score level fusion","author":"raghavendra","year":"2014","journal-title":"Proc Int Conf Inf Fusion"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0071"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICWAPR.2014.6961297"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2458700"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/s150101537"},{"key":"ref74","author":"yang","year":"2014","journal-title":"Learn convolutional neural network for face anti-spoofing"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2437652"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398817"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2012.6317336"},{"key":"ref62","first-page":"1","article-title":"Analysis of textural features for face biometric anti-spoofing","author":"waris","year":"2013","journal-title":"Proc Eur Signal Process Conf"},{"key":"ref61","first-page":"121","article-title":"LBP-TOP based countermeasure against face spoofing attacks","author":"pereira","year":"2012","journal-title":"Proc Asian Conf Comput Vis"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612968"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613002"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2013.23"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2013.6622704"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2013.7"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.211"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"ref95","first-page":"1491","article-title":"Fast human detection using a cascade of histograms of oriented gradients","author":"zhu","year":"2006","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.03.017"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref91","author":"dansereau","year":"2016","journal-title":"Light Field Toolbox V 0 4"},{"key":"ref105","year":"2017","journal-title":"The Light L16 Camera"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935080"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2008.40"},{"key":"ref103","first-page":"1","article-title":"Implementation of high performance hardware architecture of face recognition algorithm based on local binary pattern on FPGA","author":"zhang","year":"2016","journal-title":"Proc Int Conf ASIC"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1109\/TITS.2013.2284666","article-title":"An efficient hardware implementation of HOG feature extraction for human detection","volume":"15","author":"chen","year":"2013","journal-title":"Proc IEEE Trans Intell Transp Syst"},{"key":"ref98","article-title":"A $3\\times 3$ isotropic gradient operator for image processing","author":"sobel","year":"0"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/0010-4809(71)90034-6"},{"key":"ref96","first-page":"1","article-title":"Context based face anti-spoofing","author":"komulainen","year":"2014","journal-title":"Proc IEEE Int Conf Biometrics Theory Appl Syst"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612955"},{"key":"ref10","article-title":"Software-based countermeasures to 2D facial spoofing attacks","author":"komulainen","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2343913"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_8"},{"key":"ref16","year":"2016","journal-title":"The Lytro website"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555286"},{"key":"ref17","article-title":"Light field photography with a hand-held plenoptic camera","author":"ng","year":"2005"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791171"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/237170.237199"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532388"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2512559"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2630740"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2466088"},{"key":"ref89","first-page":"87","article-title":"Anti-spoofing in face recognition with liveness detection using pupil tracking","author":"killio?lu","year":"2017","journal-title":"Proc Int Symp Appl Mach Intell Inf"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.03.019"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4780-0"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-016-1014-2"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8306323\/08271987.pdf?arnumber=8271987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T12:24:51Z","timestamp":1660393491000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8271987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":105,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2018.2799427","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}