{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:53:45Z","timestamp":1777654425650,"version":"3.51.4"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Research Grant Council (RGC) of Hong Kong through Early Career Scheme","award":["21200522"],"award-info":[{"award-number":["21200522"]}]},{"DOI":"10.13039\/501100004829","name":"Science and Technology Department of Sichuan Province","doi-asserted-by":"publisher","award":["2022NSFSC0551"],"award-info":[{"award-number":["2022NSFSC0551"]}],"id":[{"id":"10.13039\/501100004829","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010877","name":"Shenzhen Virtual University Park, Science Technology and Innovation Committee of Shenzhen Municipality","doi-asserted-by":"publisher","award":["2021Szvup128"],"award-info":[{"award-number":["2021Szvup128"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62022002"],"award-info":[{"award-number":["62022002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002920","name":"General Research Fund","doi-asserted-by":"publisher","award":["11203220"],"award-info":[{"award-number":["11203220"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CityU New Research Initiatives\/Infrastructure Support from Central","award":["APRC 9610528"],"award-info":[{"award-number":["APRC 9610528"]}]},{"DOI":"10.13039\/501100001807","name":"S\u00e3o Paulo Research Foundation","doi-asserted-by":"crossref","award":["2017\/12646-3"],"award-info":[{"award-number":["2017\/12646-3"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3202115","type":"journal-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T19:35:37Z","timestamp":1661542537000},"page":"3238-3253","source":"Crossref","is-referenced-by-count":44,"title":["Beyond the Pixel World: A Novel Acoustic-Based Face Anti-Spoofing System for Smartphones"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3958-6489","authenticated-orcid":false,"given":"Chenqi","family":"Kong","sequence":"first","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, China"}]},{"given":"Kexin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3583-959X","authenticated-orcid":false,"given":"Shiqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4236-8212","authenticated-orcid":false,"given":"Anderson","family":"Rocha","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Laboratory (Recod.ai), University of Campinas, Campinas, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8723-8112","authenticated-orcid":false,"given":"Haoliang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"ref2","first-page":"1","article-title":"Fingerphoto recognition with smartphone cameras","volume-title":"Proc. Int. Conf. Biometrics Special Interest Group (BIOSIG)","author":"Stein"},{"key":"ref3","volume-title":"Biometric personal identification system based on iris analysis","author":"Daugman","year":"1994"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2020.3002101"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37410-4_11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2630740"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6116484"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3065526"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58529-7_38"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3026553"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6873"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00333"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2916652"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3065495"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985530"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988168"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2020.102988"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987293"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM.2019.00018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2018.8397099"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081356"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3048659"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959203"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488737"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_18"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2017.16"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2021.3064679"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/sym11030360"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987247"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858580"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973764"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3191768"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3381008"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2944058"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2891733"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3411809"},{"key":"ref45","article-title":"EchoLock: Towards low effort mobile user identification","author":"Yang","year":"2020","journal-title":"arXiv:2003.09061"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1049\/ip-f-2.1992.0048"},{"key":"ref47","volume-title":"Guideline of Android Platforms","year":"2022"},{"key":"ref48","first-page":"441","article-title":"Do you hear what i hear? Fingerprinting smart devices through embedded acoustic components","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Das"},{"key":"ref49","volume-title":"Neuroscience","author":"Purves","year":"2001"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790102"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1978.10837"},{"key":"ref52","first-page":"1","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume-title":"Proc. NIPS","author":"Paszke"},{"key":"ref53","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref54","first-page":"1","article-title":"Mel frequency cepstral coefficients for music modeling","volume-title":"Proc. Int. Symp. Music Inf. Retr.","author":"Logan"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2002.1035731"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/SERIES1345"},{"key":"ref57","first-page":"1","article-title":"Linear discriminant analysis-a brief tutorial","volume":"18","author":"Balakrishnama","year":"1998","journal-title":"Inst. Signal Inf. Process."},{"key":"ref58","volume-title":"C4. 5: Programs for Machine Learning","author":"Quinlan","year":"2014"},{"issue":"22","key":"ref59","first-page":"41","article-title":"An empirical study of the naive Bayes classifier","volume-title":"Proc. Workshop Empirical Methods Artif. Intell. (IJCAI)","volume":"3","author":"Rish"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.2307\/2685209"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2825949"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241574"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2619679"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3158551"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09868051.pdf?arnumber=9868051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T03:26:02Z","timestamp":1710386762000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9868051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3202115","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}