{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T02:14:31Z","timestamp":1772849671832,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3274477","type":"journal-article","created":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T11:18:15Z","timestamp":1683717495000},"page":"3238-3250","source":"Crossref","is-referenced-by-count":11,"title":["Comprehensive Study in Open-Set Iris Presentation Attack Detection"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9756-0570","authenticated-orcid":false,"given":"Aidan","family":"Boyd","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, 384 Fitzpatrick Hall of Engineering, University of Notre Dame, Notre Dame, IN, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeremy","family":"Speth","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, 384 Fitzpatrick Hall of Engineering, University of Notre Dame, Notre Dame, IN, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6961-5132","authenticated-orcid":false,"given":"Lucas","family":"Parzianello","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, 384 Fitzpatrick Hall of Engineering, University of Notre Dame, Notre Dame, IN, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7562-4390","authenticated-orcid":false,"given":"Kevin W.","family":"Bowyer","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, 384 Fitzpatrick Hall of Engineering, University of Notre Dame, Notre Dame, IN, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2379-2533","authenticated-orcid":false,"given":"Adam","family":"Czajka","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, 384 Fitzpatrick Hall of Engineering, University of Notre Dame, Notre Dame, IN, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.7760965"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2292332"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304880"},{"key":"ref34","year":"2013","journal-title":"Warsaw Datasets Webpage"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1201\/b22524-11"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.10.010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272763"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2016.38"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2006.4341624"},{"key":"ref30","first-page":"1","article-title":"Synthesis of large realistic iris databases using patch-based sampling","author":"wei","year":"2008","journal-title":"Proc Int Conf Pattern Recognit (ICPR)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2017.7947701"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2313025"},{"key":"ref10","first-page":"1","article-title":"LivDet iris 2017&#x2014;Iris liveness detection competition 2017","author":"yambay","year":"2014","journal-title":"Proc IEEE Int Joint Conf Biometrics (IJCB)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2701332"},{"key":"ref2","first-page":"103","article-title":"Recognizing persons by their iris patterns","author":"daugman","year":"1996","journal-title":"Biometrics"},{"key":"ref1","first-page":"114","author":"thalheim","year":"2002","journal-title":"Biometric Access Protection Devices and their Programs Put to the Test"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00297"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB48548.2020.9304941"},{"key":"ref38","article-title":"Open source presentation attack detection baseline for iris recognition","author":"mcgrath","year":"2018","journal-title":"arXiv 1809 10172"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.04.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956718"},{"key":"ref24","year":"2021","journal-title":"Chinese Academy of Science Inst Automation"},{"key":"ref23","first-page":"1","article-title":"Multifeature-based fake iris detection method","volume":"46","author":"lee","year":"2007","journal-title":"Opt Eng"},{"key":"ref26","author":"komogortsev","year":"2014","journal-title":"Eye Tracker Print-Attack Database (ETPAD) V2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2015.7358747"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3015547"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00132"},{"key":"ref41","year":"2011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199819"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2022.3177669"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791168"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2019.103866"},{"key":"ref8","author":"schueller","year":"2017","journal-title":"Report by International Observers on the 2016 Voter Registration Process in Somaliland"},{"key":"ref7","author":"com","year":"2023","journal-title":"Banks May Use Face Recognition Iris Scan to Check Fraud Report"},{"key":"ref9","year":"2023","journal-title":"Understanding the Orb and Why Worldcoin Uses biometrics"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3232849"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698542"},{"key":"ref6","author":"cards","year":"2019","journal-title":"NEXUS Iris Scan Applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.08.018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10122228.pdf?arnumber=10122228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:30:58Z","timestamp":1687804258000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10122228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3274477","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}