{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T13:50:23Z","timestamp":1774446623417,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61960206008, 62272390, 62025205, 62072375, 62032020"],"award-info":[{"award-number":["No. 61960206008, 62272390, 62025205, 62072375, 62032020"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Singapore Ministry of Education Academic Research Fund Tier 2","award":["T2EP20221-0023"],"award-info":[{"award-number":["T2EP20221-0023"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,12]]},"DOI":"10.1145\/3591106.3592289","type":"proceedings-article","created":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T22:33:38Z","timestamp":1686263618000},"page":"144-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["FaceLivePlus: A Unified System for Face Liveness Detection and Face Verification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6411-4486","authenticated-orcid":false,"given":"Ying","family":"Zhang","sequence":"first","affiliation":[{"name":"Northwestern Polytechnical University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8621-2666","authenticated-orcid":false,"given":"Lilei","family":"Zheng","sequence":"additional","affiliation":[{"name":"Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4424-8596","authenticated-orcid":false,"given":"Vrizlynn L.L.","family":"Thing","sequence":"additional","affiliation":[{"name":"Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7410-2590","authenticated-orcid":false,"given":"Roger","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7631-3386","authenticated-orcid":false,"given":"Bin","family":"Guo","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9905-3238","authenticated-orcid":false,"given":"Zhiwen","family":"Yu","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"684","article-title":"Secure face authentication with liveness detection for mobile","volume":"9","author":"Bao Sheng\u00a0Hua","year":"2017","unstructured":"Sheng\u00a0Hua Bao, Min Li, Wei\u00a0Hong Qian, and Zhong Su. 2017. Secure face authentication with liveness detection for mobile. US Patent 9,684,779.","journal-title":"US Patent"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555286"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Zinelabinde Boulkenafet Jukka Komulainen Lei Li Xiaoyi Feng and Abdenour Hadid. 2017. OULU-NPU: A mobile face presentation attack database with real-world variations. In FG. 612\u2013618.","DOI":"10.1109\/FG.2017.77"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Qiong Cao Li Shen Weidi Xie Omkar\u00a0M Parkhi and Andrew Zisserman. 2018. Vggface2: A dataset for recognising faces across pose and age. In FG. 67\u201374.","DOI":"10.1109\/FG.2018.00020"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Hakan Cevikalp and Bill Triggs. 2010. Face recognition based on image sets. In CVPR. 2567\u20132573.","DOI":"10.1109\/CVPR.2010.5539965"},{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Machine Learning. 794\u2013803","author":"Chen Zhao","year":"2018","unstructured":"Zhao Chen, Vijay Badrinarayanan, Chen-Yu Lee, and Andrew Rabinovich. 2018. Gradnorm: Gradient normalization for adaptive loss balancing in deep multitask networks. In International Conference on Machine Learning. 794\u2013803."},{"key":"e_1_3_2_1_7_1","volume-title":"On the Effectiveness of Local Binary Patterns in Face Anti-spoofing. IEEE BIOSIG","author":"Chingovska Ivana","year":"2012","unstructured":"Ivana Chingovska, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2012. On the Effectiveness of Local Binary Patterns in Face Anti-spoofing. IEEE BIOSIG 2012."},{"key":"e_1_3_2_1_8_1","unstructured":"Ivana Chingovska Andr\u00e9 Anjos and S\u00e9bastien Marcel. 2012. On the effectiveness of local binary patterns in face anti-spoofing. In BIOSIG. 1\u20137."},{"key":"e_1_3_2_1_9_1","volume-title":"Handbook of Biometric Anti-Spoofing","author":"Chingovska Ivana","unstructured":"Ivana Chingovska, Amir Mohammadi, Andr\u00e9 Anjos, and S\u00e9bastien Marcel. 2019. Evaluation Methodologies for Biometric Presentation Attack Detection. In Handbook of Biometric Anti-Spoofing. Springer, 457\u2013480."},{"key":"e_1_3_2_1_10_1","unstructured":"Sumit Chopra Raia Hadsell and Yann LeCun. [n.d.]. Learning a similarity metric discriminatively with application to face verification. In CVPR."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2014-2"},{"key":"e_1_3_2_1_12_1","volume-title":"Arcface: Additive angular margin loss for deep face recognition. In CVPR. 4690\u20134699.","author":"Deng Jiankang","year":"2019","unstructured":"Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. 2019. Arcface: Additive angular margin loss for deep face recognition. In CVPR. 4690\u20134699."},{"key":"e_1_3_2_1_13_1","volume-title":"Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect","author":"Erdogmus Nesli","unstructured":"Nesli Erdogmus and Sebastien Marcel. 2013. Spoofing in 2D face recognition with 3D masks and anti-spoofing with Kinect. In BTAS. IEEE, 1\u20136."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.03.019"},{"key":"e_1_3_2_1_15_1","volume-title":"Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition","author":"Galbally Javier","year":"2014","unstructured":"Javier Galbally, S\u00e9bastien Marcel, and Julian Fierrez. 2014. Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE transactions on image processing 23, 2 (2014), 710\u2013724."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Shiming Ge Shengwei Zhao Xindi Gao and Jia Li. 2019. Fewer-Shots and Lower-Resolutions: Towards Ultrafast Face Recognition in the Wild. In ACM MM. 229\u2013237.","DOI":"10.1145\/3343031.3351082"},{"key":"e_1_3_2_1_17_1","unstructured":"Michelle Guo Albert Haque De-An Huang Serena Yeung and Li Fei-Fei. 2018. Dynamic task prioritization for multitask learning. In ECCV."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Junlin Hu Jiwen Lu and Yap-Peng Tan. 2014. Discriminative deep metric learning for face verification in the wild. In CVPR. 1875\u20131882.","DOI":"10.1109\/CVPR.2014.242"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.579"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Huafeng Kuang Rongrong Ji Hong Liu Shengchuan Zhang Xiaoshuai Sun Feiyue Huang and Baochang Zhang. 2019. Multi-modal Multi-layer Fusion Network with Average Binary Center Loss for Face Anti-spoofing. In ACM MM. 48\u201356.","DOI":"10.1145\/3343031.3351001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2018.8650440"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Lei Li Xiaoyi Feng Zinelabidine Boulkenafet Zhaoqiang Xia Mingming Li and Abdenour Hadid. 2016. An original face anti-spoofing approach using partial convolutional neural network. In IPTA. 1\u20136.","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"e_1_3_2_1_24_1","volume-title":"Face presentation attack detection in learned color-liked space. arXiv preprint arXiv:1810.13170","author":"Li Lei","year":"2018","unstructured":"Lei Li, Zhaoqiang Xia, Xiaoyue Jiang, Fabio Roli, and Xiaoyi Feng. 2018. Face presentation attack detection in learned color-liked space. arXiv preprint arXiv:1810.13170 (2018)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2550459"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Jukka M\u00e4\u00e4tt\u00e4 Abdenour Hadid and Matti Pietik\u00e4inen. 2011. Face spoofing detection from single images using micro-texture analysis. In IJCB. 1\u20137.","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"e_1_3_2_1_28_1","volume-title":"A Holistic Networks For Face Authentication Based On Dynamic Multi-task Convolutional Neural Networks. arXiv preprint arXiv:1902.11179","author":"Ming Zuheng","year":"2019","unstructured":"Zuheng Ming, Junshi Xia, Muhammad\u00a0Muzzamil Luqman, Jean-Christophe Burie, and Kaixing Zhao. 2019. FaceLiveNet+: A Holistic Networks For Face Authentication Based On Dynamic Multi-task Convolutional Neural Networks. arXiv preprint arXiv:1902.11179 (2019)."},{"key":"e_1_3_2_1_29_1","unstructured":"Olivier Moindrot. 2018. Triplet Loss and Online Triplet Mining in TensorFlow. https:\/\/omoindrot.github.io\/triplet-loss##batch-hard-strategy."},{"key":"e_1_3_2_1_30_1","volume-title":"Eyeblink-based anti-spoofing in face recognition from a generic webcamera","author":"Pan Gang","unstructured":"Gang Pan, Lin Sun, Zhaohui Wu, and Shihong Lao. 2007. Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In ICCV. IEEE, 1\u20138."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.06.011"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.02.014"},{"key":"e_1_3_2_1_33_1","volume-title":"An overview of multi-task learning in deep neural networks. arXiv preprint arXiv:1706.05098","author":"Ruder Sebastian","year":"2017","unstructured":"Sebastian Ruder. 2017. An overview of multi-task learning in deep neural networks. arXiv preprint arXiv:1706.05098 (2017)."},{"key":"e_1_3_2_1_34_1","volume-title":"Facenet: A unified embedding for face recognition and clustering. In CVPR. 815\u2013823.","author":"Schroff Florian","year":"2015","unstructured":"Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. Facenet: A unified embedding for face recognition and clustering. In CVPR. 815\u2013823."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70096-0_70"},{"key":"e_1_3_2_1_36_1","unstructured":"Matthew Turk and Alex Pentland. 1991. Face recognition using eigenfaces. In CVPR. 586\u2013587."},{"key":"e_1_3_2_1_37_1","volume-title":"Cosface: Large margin cosine loss for deep face recognition. In CVPR. 5265\u20135274.","author":"Wang Hao","year":"2018","unstructured":"Hao Wang, Yitong Wang, Zheng Zhou, Xing Ji, Dihong Gong, Jingchao Zhou, Zhifeng Li, and Wei Liu. 2018. Cosface: Large margin cosine loss for deep face recognition. In CVPR. 5265\u20135274."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126686.3126693"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Zhenqi Xu Shan Li and Weihong Deng. 2015. Learning temporal features using LSTM-CNN architecture for face anti-spoofing. In ACPR. 141\u2013145.","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"e_1_3_2_1_41_1","volume-title":"Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601","author":"Yang Jianwei","year":"2014","unstructured":"Jianwei Yang, Zhen Lei, and Stan\u00a0Z Li. 2014. Learn convolutional neural network for face anti-spoofing. arXiv preprint arXiv:1408.5601 (2014)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2645208"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Hao Ye Weiyuan Shao Hong Wang Jianqi Ma Li Wang Yingbin Zheng and Xiangyang Xue. 2016. Face recognition via active annotation and learning. In ACM MM. 1058\u20131062.","DOI":"10.1145\/2964284.2984059"},{"key":"e_1_3_2_1_44_1","volume-title":"Learning face representation from scratch. arXiv preprint arXiv:1411.7923","author":"Yi Dong","year":"2014","unstructured":"Dong Yi, Zhen Lei, Shengcai Liao, and Stan\u00a0Z Li. 2014. Learning face representation from scratch. arXiv preprint arXiv:1411.7923 (2014)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Xiaowen Ying Xin Li and Mooi\u00a0Choo Chuah. 2018. LiveFace: A Multi-task CNN for Fast Face-Authentication. In ICMLA. 955\u2013960.","DOI":"10.1109\/ICMLA.2018.00155"},{"key":"e_1_3_2_1_46_1","first-page":"587","article-title":"Liveness test method and apparatus","volume":"16","author":"Yoo Byungin","year":"2019","unstructured":"Byungin Yoo, KWAK Youngjun, Jungbae Kim, SON Jinwoo, LEE Changkyo, Chang\u00a0Kyu Choi, and HAN JaeJoon. 2019. Liveness test method and apparatus. US Patent App. 16\/148,587.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"e_1_3_2_1_48_1","volume-title":"International Conference on Artificial Intelligence and Software Engineering.","author":"He Zhen-Yu Zhang Yan Ke","year":"2014","unstructured":"Yan Ke He Zhen-Yu Zhang, Jian and Yong Xu. 2014. A Collaborative Linear Discriminative Representation Classification Method for Face Recognition. In International Conference on Artificial Intelligence and Software Engineering."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Zhiwei Zhang Junjie Yan Sifei Liu Zhen Lei Dong Yi and Stan\u00a0Z Li. 2012. A face antispoofing database with diverse attacks. In ICB. 26\u201331.","DOI":"10.1109\/ICB.2012.6199754"}],"event":{"name":"ICMR '23: International Conference on Multimedia Retrieval","location":"Thessaloniki Greece","acronym":"ICMR '23","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2023 ACM International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3591106.3592289","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3591106.3592289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:30Z","timestamp":1750178250000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3591106.3592289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":49,"alternative-id":["10.1145\/3591106.3592289","10.1145\/3591106"],"URL":"https:\/\/doi.org\/10.1145\/3591106.3592289","relation":{},"subject":[],"published":{"date-parts":[[2023,6,12]]},"assertion":[{"value":"2023-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}