{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:46:23Z","timestamp":1777016783596,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,17]]},"DOI":"10.1145\/3799830.3799853","type":"proceedings-article","created":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:45:08Z","timestamp":1777013108000},"page":"408-412","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Face Liveness Detection for Biometric Authentication using Single Image"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1057-959X","authenticated-orcid":false,"given":"Poulami","family":"Raha","sequence":"first","affiliation":[{"name":"Rakuten Group, Inc., Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2996-1759","authenticated-orcid":false,"given":"Yeongnam","family":"Chae","sequence":"additional","affiliation":[{"name":"Rakuten Group, Inc., Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2026,4,23]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Akshay Agarwal Akarsha Sehwag Mayank Vatsa and Richa Singh. 2019. Deceiving the protector: Fooling face presentation attack detection algorithms. IEEE\/IAPR ICB 1 5 (2019).","DOI":"10.1109\/ICB45273.2019.8987293"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.40"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6524-8_4"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272732"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_10"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698550"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Zinelabidine Boulkenafet Jukka Komulainen and Abdenour Hadid. 2018. On the generalization of color texture-based face anti-spoofing. Image and Vision Computing 77 (2018) 1\u20139.","DOI":"10.1016\/j.imavis.2018.04.007"},{"key":"e_1_3_3_1_9_2","unstructured":"Grace Chen. 2005. Cashless payment system. US Patent App. 10\/622 718."},{"key":"e_1_3_3_1_10_2","first-page":"121","volume-title":"Asian Conference on Computer Vision","author":"Freitas\u00a0Pereira Tiago de","year":"2012","unstructured":"Tiago de Freitas\u00a0Pereira, Andr\u00e9 Anjos, Jos\u00e9\u00a0Mario De\u00a0Martino, and S\u00e9bastien Marcel. 2012. LBP- TOP based countermeasure against face spoofing attacks. In Asian Conference on Computer Vision. Springer, Springer, Germany, 121\u2013132."},{"key":"e_1_3_3_1_11_2","first-page":"1","volume-title":"2013 International Conference of the BIOSIG Special Interest Group (BIOSIG)","author":"Erdogmus Nesli","year":"2013","unstructured":"Nesli Erdogmus and S\u00e9bastien Marcel. 2013. Spoofing 2D face recognition systems with 3D masks. In 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG). IEEE, IEEE, Germany, 1\u20138."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"e_1_3_3_1_13_2","volume-title":"Handbook of Biometric Anti-Spoofing: Presentation Attack Detection","author":"Evans Nicholas","year":"2019","unstructured":"Nicholas Evans. 2019. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection. Springer, Germany."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178258"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_9"},{"key":"e_1_3_3_1_17_2","volume-title":"Handbook of face recognition","author":"Jain Anil\u00a0K","year":"2011","unstructured":"Anil\u00a0K Jain and Stan\u00a0Z Li. 2011. Handbook of face recognition. Springer, Germany."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Anil\u00a0K Jain and Karthik Nandakumar. 2012. Biometric Authentication: System Security and User Privacy. IEEE Computer 45 11 (2012) 87\u201392.","DOI":"10.1109\/MC.2012.364"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Anil\u00a0K Jain Arun Ross and Sharath Pankanti. 2006. Biometrics: a tool for information security. IEEE transactions on information forensics and security 1 2 (2006) 125\u2013143.","DOI":"10.1109\/TIFS.2006.873653"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Anil\u00a0K Jain Arun Ross Salil Prabhakar et\u00a0al. 2004. An introduction to biometric recognition. IEEE Transactions on circuits and systems for video technology 14 1 (2004) 12\u201320.","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8_14"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Ketan Kotwal Sushil Bhattacharjee and S\u00e9bastien Marcel. 2019. Multispectral Deep Embeddings as a Countermeasure to Custom Silicone Mask Presentation Attacks. IEEE Transactions on Biometrics Behavior and Identity Science 1 4 (2019) 238\u2013251.","DOI":"10.1109\/TBIOM.2019.2939421"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Haoliang Li Wen Li Hong Cao Shiqi Wang Feiyue Huang and Alex\u00a0C Kot. 2018. Unsupervised domain adaptation for face anti-spoofing. IEEE Transactions on Information Forensics and Security 1 15 (2018) 1794\u20131809.","DOI":"10.1109\/TIFS.2018.2801312"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00014"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00048"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791155"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00008"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"I. Manjani S. Tariyal M. Vatsa R. Singh and A. Majumdar. 2017. Detecting Silicone Mask-Based Presentation Attack via Deep Dictionary Learning. IEEE Transactions on Information Forensics and Security 12 (July 2017) 1713\u20131723.","DOI":"10.1109\/TIFS.2017.2676720"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.5555\/2666111"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Suril Mehta Anannya Uberoi Akshay Agarwal Mayank Vatsa and Richa Singh. 2019. Crafting a panoptic face presentation attack detector. IEEE 1 5 (2019) 1\u20136.","DOI":"10.1109\/ICB45273.2019.8987257"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Raghavendra Ramachandra and Christoph Busch. 2017. Presentation attack detection methods for face recognition systems: A comprehensive survey. ACM Computing Surveys (CSUR) 50 1 (2017) 8.","DOI":"10.1145\/3038924"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2019.8739236"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Christian Rathgeb Antitza Dantcheva and Christoph Busch. 2019. Impact and Detection of Facial Beautification in Face Recognition: An Overview. IEEE Access 7 (2019) 152667\u2013152678.","DOI":"10.1109\/ACCESS.2019.2948526"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"Yasar Abbas\u00a0Ur Rehman Lai\u00a0Man Po and Mengyang Liu. 2018. LiveNet: Improving features generalization for face liveness detection using convolution neural networks. Expert Systems with Applications 10 5 (2018) 159\u2013169.","DOI":"10.1016\/j.eswa.2018.05.004"},{"key":"e_1_3_3_1_36_2","unstructured":"Rafael\u00a0Henrique Vareto Araceli\u00a0Marcia Sandanha and William\u00a0Robson Schwartz. 2019. The SWAX Benchmark: Attacking Biometric Systems with Wax Figures. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1910.09642 6 (2019) 1222\u20131232."},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2017.95"}],"event":{"name":"CODS 2025: 13th ACM IKDD International Conference on Data Science","location":"Pune India","acronym":"CODS 2025"},"container-title":["Proceedings of the 13th ACM IKDD International Conference on Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3799830.3799853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:16:50Z","timestamp":1777015010000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3799830.3799853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,17]]},"references-count":36,"alternative-id":["10.1145\/3799830.3799853","10.1145\/3799830"],"URL":"https:\/\/doi.org\/10.1145\/3799830.3799853","relation":{},"subject":[],"published":{"date-parts":[[2025,12,17]]},"assertion":[{"value":"2026-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}