{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:54:58Z","timestamp":1773615298325,"version":"3.50.1"},"reference-count":14,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080200","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"980-986","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Spoofing Attack on Eigenfaces-Based Biometric Identification System"],"prefix":"10.3103","volume":"53","author":[{"given":"G. B.","family":"Marshalko","sequence":"first","affiliation":[]},{"given":"L. O.","family":"Nikiforova","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7206_CR1","first-page":"81","volume":"10","author":"M.M. Kasar","year":"2016","unstructured":"Kasar, M.M., Bhattacharyya, D. and Kim, T., Face recognition using neural network: A review, Int. J. Secur. Appl., 2016, vol. 10, no. 3, pp. 81\u2013100.","journal-title":"Int. J. Secur. Appl."},{"key":"7206_CR2","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s11263-010-0360-8","volume":"90","author":"S. Gupta","year":"2010","unstructured":"Gupta, S., Markey, M.K., and Bovik, A.C., Anthropometric 3D face recognition, Int. J. Comput. Vision, 2010, vol. 90, no. 3, pp. 331\u2013349.","journal-title":"Int. J. Comput. Vision"},{"key":"7206_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.3745\/JIPS.2009.5.2.041","volume":"5","author":"R. Jafri","year":"2009","unstructured":"Jafri, R. and Arabnia, H.R., A survey of face recognition techniques, J. Inf. Process. Syst., 2009, vol. 5, no. 2, pp.\u00a041\u201367.","journal-title":"J. Inf. Process. Syst."},{"key":"7206_CR4","volume-title":"Face Recognition Algorithms","author":"Marqu\u00e9s","year":"2010","unstructured":"Marqu\u00e9s, I., Face Recognition Algorithms, Proyecto Fin de Carrera, 2010"},{"key":"7206_CR5","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M. Turk","year":"1991","unstructured":"Turk, M. and Pentland, A., Eigenfaces for recognition, J. Cognit. Neurosci., 1991, vol. 3, no. 1, pp. 71\u201386.","journal-title":"J. Cognit. Neurosci."},{"key":"7206_CR6","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., and Reiter, M.K., Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition, ACM Conference on Computer and Communications Security, 2016, pp. 1528\u20131540.","DOI":"10.1145\/2976749.2978392"},{"key":"7206_CR7","doi-asserted-by":"crossref","unstructured":"Galbally, J., Fierrez, J., and Ortega-Garcia, J., Hill-climbing attack to an eigenface-based face verification system, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS), 2009.","DOI":"10.1109\/BIDS.2009.5507530"},{"key":"#cr-split#-7206_CR8.1","unstructured":"Galbally, J., Fierrez, J., and Ortega-Garcia, J., Bayesian hill-climbing attack and its application to signature verification, International Conference on Biometrics, 2007"},{"key":"#cr-split#-7206_CR8.2","unstructured":"Lect. Notes Comput. Sci., 2007, vol. 4642, pp. 386-395."},{"key":"7206_CR9","first-page":"4721849","volume":"2016","author":"Z. Akhtar","year":"2016","unstructured":"Akhtar, Z. and Foresti, G.L., Face spoof attack recognition using discriminative image patches, J. Electr. Comput. Eng., 2016, vol. 2016, Article ID 4721849.","journal-title":"J. Electr. Comput. Eng."},{"key":"7206_CR10","unstructured":"Yuan, X., He, P., Zhu, Q., and Li, X., Adversarial examples: Attacks and defenses for deep learning, arXiv:1712.07107v3."},{"key":"7206_CR11","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1364\/JOSAA.4.000519","volume":"4","author":"L. Sirovich","year":"1987","unstructured":"Sirovich, L. and Kirby, M., Low-dimensional procedure for the characterization of human faces, J. Opt. Soc. Am. A, 1987, vol. 4, p. 519.","journal-title":"J. Opt. Soc. Am. A"},{"issue":"1","key":"7206_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/1745-6150-2-2","volume":"2","author":"Richard Cangelosi","year":"2007","unstructured":"Cangelosi, R. and Goriely, A., Component retention in principal component analysis with application to cDNA microarray data, Biol. Direct, 2007, vol. 2, no. 2. https:\/\/doi.org\/10.1186\/1745-6150-2-2","journal-title":"Biology Direct"},{"key":"7206_CR13","unstructured":"ISO\/IEC 30107-1:2016 Information Technology\u2014Biometric Presentation Attack Detection\u2014Part 1: Framework."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080200.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080200","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080200.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:58:03Z","timestamp":1773611883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":14,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7206"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080200","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"11 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}