{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:20:12Z","timestamp":1761060012520,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Singapore National Research Foundation","award":["NCR Award Number NRF2014NCR-NCR001-012"],"award-info":[{"award-number":["NCR Award Number NRF2014NCR-NCR001-012"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813612","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1558-1569","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Seeing Your Face Is Not Enough"],"prefix":"10.1145","author":[{"given":"Yan","family":"Li","sequence":"first","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Qiang","family":"Yan","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Hancong","family":"Kong","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.12.018"},{"key":"e_1_3_2_1_2_1","volume-title":"BlackHat USA","author":"Acquisti A.","year":"2011","unstructured":"A. Acquisti , R. Gross , and F. Stutzman . Faces of facebook: Privacy in the age of augmented reality . BlackHat USA , 2011 . A. Acquisti, R. Gross, and F. Stutzman. Faces of facebook: Privacy in the age of augmented reality. BlackHat USA, 2011."},{"key":"e_1_3_2_1_3_1","first-page":"233","volume-title":"IASP 2009","author":"Bao W.","year":"2009","unstructured":"W. Bao , H. Li , N. Li , and W. Jiang . A liveness detection method for face recognition based on optical flow field . In IASP 2009 , pages 233 -- 236 . IEEE, 2009 . W. Bao, H. Li, N. Li, and W. Jiang. A liveness detection method for face recognition based on optical flow field. In IASP 2009, pages 233--236. IEEE, 2009."},{"key":"e_1_3_2_1_4_1","volume-title":"McGraw-Hill New York","author":"Benson R. V.","year":"1966","unstructured":"R. V. Benson . Euclidean geometry and convexity . McGraw-Hill New York , 1966 . R. V. Benson. Euclidean geometry and convexity. McGraw-Hill New York, 1966."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2011.0012"},{"key":"e_1_3_2_1_6_1","volume-title":"Filter design in thirty seconds. Application Report from Texas Instruments","author":"Carter B.","year":"2001","unstructured":"B. Carter . Filter design in thirty seconds. Application Report from Texas Instruments , 2001 . B. Carter. Filter design in thirty seconds. Application Report from Texas Instruments, 2001."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117509"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594373"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5772\/58473"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702141"},{"key":"e_1_3_2_1_11_1","unstructured":"Facelock.mobi. http:\/\/www.facelock.mobi\/facelock-for-apps.  Facelock.mobi. http:\/\/www.facelock.mobi\/facelock-for-apps."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2428955.2429008"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1352-2310(97)00447-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6707096"},{"key":"e_1_3_2_1_16_1","unstructured":"Google. http:\/\/www.android.com\/about\/ice-cream-sandwich\/.  Google. http:\/\/www.android.com\/about\/ice-cream-sandwich\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.08.002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1148\/radiology.143.1.7063747"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(81)90024-2"},{"key":"e_1_3_2_1_21_1","volume-title":"Applied logistic regression","author":"Hosmer D. W.","year":"2004","unstructured":"D. W. Hosmer Jr and S. Lemeshow . Applied logistic regression . John Wiley & Sons , 2004 . D. W. Hosmer Jr and S. Lemeshow. Applied logistic regression. John Wiley & Sons, 2004."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616414"},{"issue":"4","key":"e_1_3_2_1_23_1","first-page":"235","article-title":"Liveness detection for embedded face recognition system","volume":"1","author":"Jee H.-K.","year":"2006","unstructured":"H.-K. Jee , S.-U. Jung , and J.-H. Yoo . Liveness detection for embedded face recognition system . International Journal of Biological and Medical Sciences , 1 ( 4 ): 235 -- 238 , 2006 . H.-K. Jee, S.-U. Jung, and J.-H. Yoo. Liveness detection for embedded face recognition system. International Journal of Biological and Medical Sciences, 1(4):235--238, 2006.","journal-title":"International Journal of Biological and Medical Sciences"},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"BIOSIG 2012","author":"Kahm O.","year":"2012","unstructured":"O. Kahm and N. Damer . 2d face liveness detection: An overview . In BIOSIG 2012 , pages 1 -- 12 , 2012 . O. Kahm and N. Damer. 2d face liveness detection: An overview. In BIOSIG 2012, pages 1--12, 2012."},{"key":"e_1_3_2_1_25_1","volume-title":"a Dead Reckoning Robot--A Practical Application to Understand the Thoery. IKA Logic: Electronics Solutions Online Documents","author":"Kamal I.","year":"2008","unstructured":"I. Kamal . WFR , a Dead Reckoning Robot--A Practical Application to Understand the Thoery. IKA Logic: Electronics Solutions Online Documents , 2008 . I. Kamal. WFR, a Dead Reckoning Robot--A Practical Application to Understand the Thoery. IKA Logic: Electronics Solutions Online Documents, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.05.004"},{"key":"e_1_3_2_1_27_1","unstructured":"Lenovo. http:\/\/veriface.software.informer.com\/.  Lenovo. http:\/\/veriface.software.informer.com\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590315"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"e_1_3_2_1_30_1","volume-title":"Introductory statistics","author":"Mann P. S.","year":"2007","unstructured":"P. S. Mann . Introductory statistics . John Wiley & Sons , 2007 . P. S. Mann. Introductory statistics. John Wiley & Sons, 2007."},{"key":"e_1_3_2_1_31_1","first-page":"2012","article-title":"Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets","author":"Mayrhofer R.","year":"2012","unstructured":"R. Mayrhofer and T. Kaiser . Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets . In IWSSI\/SPMU 2012 . Citeseer, 2012 . R. Mayrhofer and T. Kaiser. Towards usable authentication on mobile phones: An evaluation of speaker and face recognition on off-the-shelf handsets. In IWSSI\/SPMU 2012. Citeseer, 2012.","journal-title":"IWSSI\/SPMU"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74048-3_4"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.106"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.999"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523666"},{"key":"e_1_3_2_1_38_1","unstructured":"J. Rice. http:\/\/www.androidpolice.com\/2012\/08\/03\/android-jelly-beans-face-unlock-liveness-check-circumvented-with-simple-photo-editing\/.  J. Rice. http:\/\/www.androidpolice.com\/2012\/08\/03\/android-jelly-beans-face-unlock-liveness-check-circumvented-with-simple-photo-editing\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08189-2_8"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/BCC.2007.4430532"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5446-1_8"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2012.155"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1251154"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1093\/imamat\/12.1.103"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i2.620"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00202568"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02441745"},{"key":"e_1_3_2_1_48_1","unstructured":"Visidon. http:\/\/www.visidon.fi\/en\/Home.  Visidon. http:\/\/www.visidon.fi\/en\/Home."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/524467.796044"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813612"}},"subtitle":["An Inertial Sensor-Based Liveness Detection for Face Authentication"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":50,"alternative-id":["10.1145\/2810103.2813612","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813612","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}