{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:59:39Z","timestamp":1761663579655,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/tsp.2016.7760965","type":"proceedings-article","created":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T16:40:11Z","timestamp":1480610411000},"page":"660-664","source":"Crossref","is-referenced-by-count":22,"title":["A realistic evaluation of iris presentation attack detection"],"prefix":"10.1109","author":[{"given":"Ana F.","family":"Sequeira","sequence":"first","affiliation":[]},{"given":"Shejin","family":"Thavalengal","sequence":"additional","affiliation":[]},{"given":"James","family":"Ferryman","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Corcoran","sequence":"additional","affiliation":[]},{"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.296"},{"key":"ref11","first-page":"553","article-title":"On the robustness of fingerprint liveness detection algorithms against new materials used for spoofing","volume":"8","author":"marasco","year":"2011","journal-title":"Biosignals"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996254"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2464772"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s150614615"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MC.2014.118","article-title":"Cosmetic contact lenses and iris recognition spoofing","volume":"47","author":"bowyer","year":"2014","journal-title":"Computer"},{"key":"ref16","first-page":"22","article-title":"Iris liveness detection methods in mobile applications","author":"sequeira","year":"2014","journal-title":"Proceedings of Int Con on ComputerVision Theory and Applications"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.1040"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854305"},{"key":"ref19","first-page":"1","article-title":"Significance of dictionary for sparse coding based face recognition","author":"shejin","year":"2012","journal-title":"Proc Int Conf of the Biometrics Special Interest Group (BIOSIG)"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.patrec.2015.04.001","article-title":"Guest editorial introduction to the special executable issue on &#x201C; Mobile Iris CHallenge Evaluation part I (MICHE I)","volume":"57","author":"marsico","year":"2015","journal-title":"Pattern Recognition Letters"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301318"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400393"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398815"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2013.0020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.884091"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1007\/978-0-387-73003-5_179","article-title":"Liveness detection: iris","author":"toth","year":"2009","journal-title":"Encyclopedia of Biometrics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996290"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5244\/C.25.119"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(99)00087-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69905-7_27"},{"year":"2013","key":"ref24","article-title":"ISO\/IEC 5th WD 30107: Information Technology - Biometrics - Presentation attack detection"},{"key":"ref23","article-title":"Iris liveness detection using regional features","author":"hu","year":"2015","journal-title":"Pattern Recognition Letters"}],"event":{"name":"2016 39th International Conference on Telecommunications and Signal Processing (TSP)","start":{"date-parts":[[2016,6,27]]},"location":"Vienna, Austria","end":{"date-parts":[[2016,6,29]]}},"container-title":["2016 39th International Conference on Telecommunications and Signal Processing (TSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7750937\/7760810\/07760965.pdf?arnumber=7760965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T19:54:33Z","timestamp":1657914873000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7760965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/tsp.2016.7760965","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}