{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T09:40:02Z","timestamp":1746092402569,"version":"3.40.4"},"reference-count":16,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12,24]]},"DOI":"10.1117\/12.2051724","type":"proceedings-article","created":{"date-parts":[[2013,12,25]],"date-time":"2013-12-25T02:50:21Z","timestamp":1387939821000},"page":"90671M","source":"Crossref","is-referenced-by-count":4,"title":["Securing palmprint authentication systems using spoof detection approach"],"prefix":"10.1117","volume":"9067","author":[{"given":"Vivek","family":"Kanhangad","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"c1","first-page":"36","article-title":"A new method for fingerprint antispoofing using pulse oximetry","author":"Reddy","year":"2007"},{"issue":"5","key":"c2","first-page":"441","article-title":"Fingerprint sensor having spoof reduction features and related methods","volume":"953","author":"Setlak","year":"1999"},{"key":"c3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71041-9"},{"key":"c4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2005.848192"},{"key":"c5","first-page":"296","article-title":"Live face detection based on the analysis of Fourier spectra","author":"Li","year":"2004"},{"key":"c6","first-page":"436","article-title":"Face liveness detection by learning multispectral reflectance distributions","author":"Zhang","year":"2011"},{"article-title":"Face spoofing detection from single images using micro-texture analysis","year":"2011","author":"M\u00e4\u00e4tt\u00e4","key":"c7"},{"key":"c8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.04.026"},{"article-title":"Fake hands: Spoofing hand geometry systems","year":"2005","author":"Chen","key":"c9"},{"key":"c10","doi-asserted-by":"publisher","DOI":"10.1117\/12.606643"},{"key":"c11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2121062"},{"key":"c12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"c13","doi-asserted-by":"crossref","unstructured":"V. Kecman, Learning and Soft Computing: Support Vector Machines, Neural Networks, and Fuzzy Logic Models, 1st Edition, Pearson Education.","DOI":"10.1007\/10984697_1"},{"key":"c14","unstructured":"IIT Delhi Touchless Palmprint Database (Version 1.0), http:\/\/web.iitd.ac.in\/~ajaykr\/Database_Palm.htm"},{"key":"c15","first-page":"1051","article-title":"Competitive coding scheme for palmprint verification","author":"Kong","year":"2004"},{"key":"c16","doi-asserted-by":"crossref","DOI":"10.1145\/1961189.1961199","article-title":"LIBSVM: a library for support vector machines","author":"Chang","year":"2011"}],"event":{"name":"Sixth International Conference on Machine Vision (ICMV 13)","location":"London, United Kingdom"},"container-title":["SPIE Proceedings","Sixth International Conference on Machine Vision (ICMV 2013)"],"original-title":[],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T09:06:03Z","timestamp":1746090363000},"score":1,"resource":{"primary":{"URL":"http:\/\/proceedings.spiedigitallibrary.org\/proceeding.aspx?doi=10.1117\/12.2051724"}},"subtitle":[],"editor":[{"given":"Branislav","family":"Vuksanovic","sequence":"first","affiliation":[]},{"given":"Jianhong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Antanas","family":"Verikas","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2013,12,24]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1117\/12.2051724","relation":{},"ISSN":["0277-786X"],"issn-type":[{"type":"print","value":"0277-786X"}],"subject":[],"published":{"date-parts":[[2013,12,24]]}}}