{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:52:52Z","timestamp":1767117172796,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/btas.2014.6996290","type":"proceedings-article","created":{"date-parts":[[2014,12,31]],"date-time":"2014-12-31T04:05:22Z","timestamp":1419998722000},"page":"1-6","source":"Crossref","is-referenced-by-count":26,"title":["MobILive 2014 - Mobile Iris Liveness Detection Competition"],"prefix":"10.1109","author":[{"given":"Ana F.","family":"Sequeira","sequence":"first","affiliation":[]},{"given":"Helder P.","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Joao C.","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Joao P.","family":"Monteiro","sequence":"additional","affiliation":[]},{"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"8","article-title":"Beyond simple features: A largescale feature search approach to unconstrained face recognition","author":"pinto","year":"2011","journal-title":"IEEE International Conference on Automatic Face and Gesture Recognition"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"18","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/978-3-540-69905-7_27","article-title":"Blur insensitive texture classification using local phase quantization","volume":"5099","author":"ojansivu","year":"2008","journal-title":"Image and Signal Processing Lecture Notes in Computer Science"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790410"},{"key":"16","first-page":"82","article-title":"Feature extraction based on co-occurrence of adjacent local binary patterns","author":"nosaka","year":"2012","journal-title":"Advances in Image &video Technology"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.68"},{"key":"14","first-page":"397","article-title":"Fake iris detection by using purkinje image","author":"lee","year":"2005","journal-title":"Advances in Biometrics 3832 of Lecture Notes in Computer Science"},{"journal-title":"ISO\/IEC CD 30107-Presentation Attack Detection (Working Draft","year":"2011","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459469"},{"key":"21","first-page":"133","article-title":"Mobbio a multimodal database captured with an handheld device","author":"sequeira","year":"2014","journal-title":"Proceedings of Int Conf on Computer Vision Theory and Applications"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(94)90127-9"},{"key":"22","first-page":"22","article-title":"Iris liveness detection methods in mobile applications","author":"sequeira","year":"2014","journal-title":"Proceedings of International Conference on Computer Vision Theory and Applications"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/36.752194"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.1996.488319"},{"key":"26","first-page":"1794","article-title":"Linear spatial pyramid matching using sparse coding for image classification","author":"yang","year":"2009","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2012.6466800"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2274330"},{"key":"2","first-page":"115","article-title":"Making a science of model search: Hyperparameter optimization in hundreds of dimensions for vision architectures","author":"bergstra","year":"2013","journal-title":"Intl conf on Machine Learning"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2014.6914250"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.4309314"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2004.1308819"},{"key":"6","article-title":"Iris recognition and anti-spoofing countermeasures","author":"daugman","year":"2004","journal-title":"7-th International Biometrics Conference"},{"key":"5","first-page":"921","article-title":"The importance of encoding versus training with sparse coding and vector quantization","author":"coates","year":"2011","journal-title":"Intl conf on Machine Learning"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.5589\/m02-004"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2012.6199819"},{"key":"8","first-page":"4","article-title":"Vulnerabilities in biometric systems: Attacks and recent advances in liveness detection","volume":"1","author":"galbally","year":"2007","journal-title":"Database"}],"event":{"name":"2014 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2014,9,29]]},"location":"Clearwater, FL, USA","end":{"date-parts":[[2014,10,2]]}},"container-title":["IEEE International Joint Conference on Biometrics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6982598\/6996217\/06996290.pdf?arnumber=6996290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T02:55:24Z","timestamp":1498186524000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6996290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/btas.2014.6996290","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}