{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T09:15:30Z","timestamp":1760346930527,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA)","award":["2017-17020200005"],"award-info":[{"award-number":["2017-17020200005"]}]},{"name":"The Natural Sciences and Engineering Research Council of Canada (NSERC)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,12]]},"DOI":"10.1145\/3394171.3413606","type":"proceedings-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T13:12:00Z","timestamp":1602508320000},"page":"3568-3576","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Revealing True Identity: Detecting Makeup Attacks in Face-based Biometric Systems"],"prefix":"10.1145","author":[{"given":"Mohammad Amin","family":"Arab","sequence":"first","affiliation":[{"name":"Simon Fraser University, Burnaby, Canada"}]},{"given":"Puria","family":"Azadi Moghadam","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Burnaby, Canada"}]},{"given":"Mohamed","family":"Hussein","sequence":"additional","affiliation":[{"name":"Information Sciences Institute, Marina del Rey, CA, USA"}]},{"given":"Wael","family":"Abd-Almageed","sequence":"additional","affiliation":[{"name":"Information Sciences Institute, Marina del Rey, CA, USA"}]},{"given":"Mohamed","family":"Hefeeda","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Burnaby, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,10,12]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_2_1_1","DOI":"10.1109\/TPAMI.2006.244"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1109\/WVC.2019.8876943"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_3_1","DOI":"10.1109\/ICCV.2017.116"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.1109\/TMM.2019.2911457"},{"volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 40--48","author":"Chang H.","unstructured":"H. Chang , J. Lu , F. Yu , and A. Finkelstein . 2018. PairedCycleGAN: Asymmetric Style Transfer for Applying and Removing Makeup . In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 40--48 . H. Chang, J. Lu, F. Yu, and A. Finkelstein. 2018. PairedCycleGAN: Asymmetric Style Transfer for Applying and Removing Makeup. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 40--48.","key":"e_1_3_2_2_5_1"},{"volume-title":"Proceedings of the International Conference on Biometrics (ICB). 1--8.","author":"Chen C.","unstructured":"C. Chen , A. Dantcheva , and A. Ross . 2013. Automatic facial makeup detection with application in face recognition . In Proceedings of the International Conference on Biometrics (ICB). 1--8. C. Chen, A. Dantcheva, and A. Ross. 2013. Automatic facial makeup detection with application in face recognition. In Proceedings of the International Conference on Biometrics (ICB). 1--8.","key":"e_1_3_2_2_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.1109\/ISBA.2017.7947686"},{"volume-title":"Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS). 391--398","author":"Dantcheva A.","unstructured":"A. Dantcheva , C. Chen , and A. Ross . 2012. Can facial cosmetics affect the matching accuracy of face recognition systems? . In Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS). 391--398 . A. Dantcheva, C. Chen, and A. Ross. 2012. Can facial cosmetics affect the matching accuracy of face recognition systems?. In Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS). 391--398.","key":"e_1_3_2_2_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.1109\/TIFS.2019.2916652"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.1007\/978-3-030-01258-8_40"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the Advances in Neural Information Processing Systems (NIPS). 2672--2680","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014 . Generative adversarial nets . In Proceedings of the Advances in Neural Information Processing Systems (NIPS). 2672--2680 . Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Proceedings of the Advances in Neural Information Processing Systems (NIPS). 2672--2680."},{"volume-title":"Information technology -- Biometric presentation attack detection -- Part 3: Testing and reporting. Standard","author":"ISO","unstructured":"ISO 30107--3:2017 2017. Information technology -- Biometric presentation attack detection -- Part 3: Testing and reporting. Standard . International Organization for Standardization , Geneva, CH . ISO 30107--3:2017 2017. Information technology -- Biometric presentation attack detection -- Part 3: Testing and reporting. Standard. International Organization for Standardization, Geneva, CH.","key":"e_1_3_2_2_12_1"},{"doi-asserted-by":"crossref","unstructured":"K. Kotwal Z. Mostaani and S. Marcel. 2019. Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features. IEEE Transactions on Biometrics Behavior and Identity Science (2019).  K. Kotwal Z. Mostaani and S. Marcel. 2019. Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features. IEEE Transactions on Biometrics Behavior and Identity Science (2019).","key":"e_1_3_2_2_13_1","DOI":"10.1109\/TBIOM.2019.2946175"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.1145\/3240508.3240618"},{"key":"e_1_3_2_2_15_1","first-page":"1","article-title":"Face Verification Across Age Progression Using Discriminative Methods","volume":"5","author":"Ling H.","year":"2010","unstructured":"H. Ling , S. Soatto , N. Ramanathan , and D. W. Jacobs . 2010 . Face Verification Across Age Progression Using Discriminative Methods . IEEE Transactions on Information Forensics and Security 5 , 1 (March 2010), 82--91. H. Ling, S. Soatto, N. Ramanathan, and D. W. Jacobs. 2010. Face Verification Across Age Progression Using Discriminative Methods. IEEE Transactions on Information Forensics and Security 5, 1 (March 2010), 82--91.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP). 4067--4071","author":"Liu K.","unstructured":"K. Liu , T. Liu , H. Liu , and S. Pei . 2015. Facial makeup detection via selected gradient orientation of entropy information . In Proceedings of the IEEE International Conference on Image Processing (ICIP). 4067--4071 . K. Liu, T. Liu, H. Liu, and S. Pei. 2015. Facial makeup detection via selected gradient orientation of entropy information. In Proceedings of the IEEE International Conference on Image Processing (ICIP). 4067--4071.","key":"e_1_3_2_2_16_1"},{"key":"e_1_3_2_2_17_1","volume-title":"Makeup like a superstar: Deep localized makeup transfer network. arXiv preprint arXiv:1604.07102","author":"Liu Si","year":"2016","unstructured":"Si Liu , Xinyu Ou , Ruihe Qian , Wei Wang , and Xiaochun Cao . 2016. Makeup like a superstar: Deep localized makeup transfer network. arXiv preprint arXiv:1604.07102 ( 2016 ). Si Liu, Xinyu Ou, Ruihe Qian, Wei Wang, and Xiaochun Cao. 2016. Makeup like a superstar: Deep localized makeup transfer network. arXiv preprint arXiv:1604.07102 (2016)."},{"key":"e_1_3_2_2_18_1","volume-title":"Deconvolution and Checkerboard Artifacts. Distill","author":"Odena Augustus","year":"2016","unstructured":"Augustus Odena , Vincent Dumoulin , and Chris Olah . 2016. Deconvolution and Checkerboard Artifacts. Distill ( 2016 ). https:\/\/doi.org\/10.23915\/distill.00003 10.23915\/distill.00003 Augustus Odena, Vincent Dumoulin, and Chris Olah. 2016. Deconvolution and Checkerboard Artifacts. Distill (2016). https:\/\/doi.org\/10.23915\/distill.00003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1049\/iet-bmt.2018.5059"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1109\/CVPR.2017.135"},{"volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP). 4277--4281","author":"Snell J.","unstructured":"J. Snell , K. Ridgeway , R. Liao , B. D. Roads , M. C. Mozer , and R. S. Zemel . 2017. Learning to generate images with perceptual similarity metrics . In Proceedings of the IEEE International Conference on Image Processing (ICIP). 4277--4281 . J. Snell, K. Ridgeway, R. Liao, B. D. Roads, M. C. Mozer, and R. S. Zemel. 2017. Learning to generate images with perceptual similarity metrics. In Proceedings of the IEEE International Conference on Image Processing (ICIP). 4277--4281.","key":"e_1_3_2_2_21_1"},{"volume-title":"Proceedings of the International Conference on Biometrics (ICB). 1--8.","author":"Steiner H.","unstructured":"H. Steiner , A. Kolb , and N. Jung . 2016. Reliable face anti-spoofing using multispectral SWIR imaging . In Proceedings of the International Conference on Biometrics (ICB). 1--8. H. Steiner, A. Kolb, and N. Jung. 2016. Reliable face anti-spoofing using multispectral SWIR imaging. In Proceedings of the International Conference on Biometrics (ICB). 1--8.","key":"e_1_3_2_2_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1109\/TIP.2010.2042645"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.5555\/3015812.3015821"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.1109\/TIFS.2018.2833032"},{"volume-title":"Proceedings of the IEEE International Conference on Image Processing. 3206--3210","author":"Xu L.","unstructured":"L. Xu , Y. Du , and Y. Zhang . 2013. An automatic framework for example-based virtual makeup . In Proceedings of the IEEE International Conference on Image Processing. 3206--3210 . L. Xu, Y. Du, and Y. Zhang. 2013. An automatic framework for example-based virtual makeup. In Proceedings of the IEEE International Conference on Image Processing. 3206--3210.","key":"e_1_3_2_2_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1109\/ICCV.2017.244"}],"event":{"sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"acronym":"MM '20","name":"MM '20: The 28th ACM International Conference on Multimedia","location":"Seattle WA USA"},"container-title":["Proceedings of the 28th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394171.3413606","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394171.3413606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:15Z","timestamp":1750193235000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394171.3413606"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":27,"alternative-id":["10.1145\/3394171.3413606","10.1145\/3394171"],"URL":"https:\/\/doi.org\/10.1145\/3394171.3413606","relation":{},"subject":[],"published":{"date-parts":[[2020,10,12]]},"assertion":[{"value":"2020-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}