{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:05:27Z","timestamp":1762376727819,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1109\/wacv45572.2020.9093397","type":"proceedings-article","created":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T03:41:09Z","timestamp":1589514069000},"page":"2684-2693","source":"Crossref","is-referenced-by-count":9,"title":["DeFraudNet:End2End Fingerprint Spoof Detection using Patch Level Attention"],"prefix":"10.1109","author":[{"given":"B.V.S","family":"Anusha","sequence":"first","affiliation":[]},{"given":"Sayan","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Subhasis","family":"Chaudhuri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Cbam: Convolutional block attention module","author":"woo","year":"2018","journal-title":"the European Conference on Computer Vision (ECCV)"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/CVPR.2019.00154"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1117\/1.2885133"},{"key":"ref32","article-title":"Going deeper with convolutions","author":"szegedy","year":"2014","journal-title":"CoRR abs\/1409 4842"},{"year":"2014","author":"simonyan","journal-title":"Very Deep Convolutional Networks for Large-scale Image Recognition","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/S0893-6080(98)00116-6"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/ICIP.2018.8451027"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/CVPR.2017.683"},{"year":"0","author":"thakkar","journal-title":"What makes fingerprint the most popular biometric modality","key":"ref35"},{"year":"0","author":"thakkar","journal-title":"Top five biometrics face fingerprint iris palm and voice","key":"ref34"},{"key":"ref10","first-page":"1","author":"ghiani","year":"2013","journal-title":"Fingerprint liveness detection using binarized statistical image features"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ICB.2012.6199810"},{"key":"ref11","first-page":"537","article-title":"Fingerprint live-ness detection by local phase quantization","author":"ghiani","year":"2012","journal-title":"Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012)"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICB.2013.6613027"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/BTAS.2014.6996224"},{"year":"2013","author":"gragnaniello","journal-title":"Fingerprint liveness detection based on weber local image descriptor","key":"ref14"},{"key":"ref15","first-page":"770","article-title":"Deep residual learning for image recognition","author":"he","year":"2015","journal-title":"2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CVPR.2016.266"},{"key":"ref17","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"howard","year":"2017","journal-title":"ArXiv abs\/1704 04861"},{"key":"ref18","article-title":"Densely connected convolutional networks","author":"huang","year":"2016","journal-title":"arXiv preprint arXiv 1608 06993"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICASSP.2019.8682573"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TPAMI.2002.1017623"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIFS.2019.2922241"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ICPR.1994.576366"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ICB.2015.7139054"},{"key":"ref6","article-title":"Aliveness detection of fingerprints using multiple static features","volume":"22","author":"choi","year":"2007","journal-title":"Proc Of World Academy of Science Engineering and Technology"},{"key":"ref29","first-page":"287","author":"pala","year":"2017","journal-title":"Deep Triplet Embedding Representations for Liveness Detection"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/CVPR.2017.667"},{"key":"ref8","article-title":"Fingerprint spoof buster","author":"chugh","year":"2017","journal-title":"ArXiv abs\/1712 04489"},{"key":"ref7","article-title":"Xception: Deep learning with depthwise separable convolutions","author":"chollet","year":"2016","journal-title":"cite arxiv 1610 02357"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICIP.2006.313158"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.imavis.2016.07.002","article-title":"Review of the fingerprint liveness detection (livdet) competition series","volume":"58","year":"2017","journal-title":"Image Vision Comput"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.patrec.2012.01.009"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TIFS.2015.2398817"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICPR.2010.321"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/ACCESS.2018.2890127"},{"key":"ref24","article-title":"Livdet 2017 fingerprint live-ness detection competition 2017","author":"mura","year":"2018","journal-title":"CoRR abs\/1803 05210"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/ISBI.2019.8759498"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/BTAS.2015.7358776"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIFS.2016.2520880"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/ICIP.2019.8802982"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/BTAS.2008.4699347"}],"event":{"name":"2020 IEEE Winter Conference on Applications of Computer Vision (WACV)","start":{"date-parts":[[2020,3,1]]},"location":"Snowmass Village, CO, USA","end":{"date-parts":[[2020,3,5]]}},"container-title":["2020 IEEE Winter Conference on Applications of Computer Vision (WACV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9087828\/9093261\/09093397.pdf?arnumber=9093397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:15:53Z","timestamp":1656602153000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9093397\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/wacv45572.2020.9093397","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}