{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T06:17:51Z","timestamp":1777097871868,"version":"3.51.4"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tifs.2025.3650391","type":"journal-article","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T18:16:02Z","timestamp":1767377762000},"page":"945-959","source":"Crossref","is-referenced-by-count":1,"title":["A Comprehensive Framework for Palm Vein Anti-Spoofing With Preprocessing Pipeline, Dataset, and Benchmark"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5559-258X","authenticated-orcid":false,"given":"Caiping","family":"Yan","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Hangzhou Normal University, Hangzhou, China"}]},{"given":"Zhi","family":"Lan","sequence":"additional","affiliation":[{"name":"Hangzhou Insvision Technology Company Ltd., Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8149-9047","authenticated-orcid":false,"given":"Hong","family":"Li","sequence":"additional","affiliation":[{"name":"Hangzhou Insvision Technology Company Ltd., Hangzhou, China"}]},{"given":"Yuqi","family":"Li","sequence":"additional","affiliation":[{"name":"Hangzhou Insvision Technology Company Ltd., Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0592-0135","authenticated-orcid":false,"given":"Zonglin","family":"Meng","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, California, U.S."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3378427"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3544029"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3112513"},{"issue":"8","key":"ref4","doi-asserted-by":"crossref","first-page":"4375","DOI":"10.1007\/s11760-023-02671-3","article-title":"Boosting hand vein recognition performance with the fusion of different color spaces in deep learning architectures","volume":"17","author":"Babalola","year":"2023","journal-title":"Signal, Image Video Process."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3559791"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-021-02253-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-020-01765-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2015.7139056"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2022.3212836"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2019.0034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119546"},{"issue":"8","key":"ref12","doi-asserted-by":"crossref","first-page":"2799","DOI":"10.3390\/s21082799","article-title":"Bi-FPNFAS: Bi-directional feature pyramid network for pixel-wise face anti-spoofing by leveraging Fourier spectra","volume":"21","author":"Roy","year":"2021","journal-title":"Sensors"},{"key":"ref13","article-title":"Generalizable method for face anti-spoofing with semi-supervised learning","author":"Sergievskiy","year":"2022","journal-title":"arXiv:2206.06510"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3486098"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3183398"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00679"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199754"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00122"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2020.2973001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00675"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00101"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2158423"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-013-0425-6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1852611.1852630"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2361020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.04.007"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634470"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/YAC.2017.7967579"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1049\/el.2011.1441"},{"key":"ref33","volume-title":"CASIA Multi-Spectral Palmprint Database (CASIA-MS-PalmPrintV1)","year":"2019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2028772"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG.2015.7314614"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991475"},{"key":"ref37","article-title":"MediaPipe: A framework for building perception pipelines","author":"Lugaresi","year":"2019","journal-title":"arXiv:1906.08172"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref40","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref41","first-page":"10096","article-title":"EfficientNetv2: Smaller models and faster training","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00140"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01044"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref45","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref46","article-title":"Explainable deep few-shot anomaly detection with deviation networks","author":"Pang","year":"2021","journal-title":"arXiv:2108.00462"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3038924"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2025.3559891"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3319330"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2867733"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-336156-1.50061-6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i7.32726"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3282567"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2024.3385711"},{"key":"ref59","article-title":"AgentAlign: Misalignment-adapted multi-agent perception for resilient inter-agent sensor correlations","author":"Meng","year":"2024","journal-title":"arXiv:2412.06142"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/11313711\/11322686.pdf?arnumber=11322686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:39:44Z","timestamp":1768423184000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11322686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3650391","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}