{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:04:33Z","timestamp":1742378673196},"reference-count":65,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1016\/j.neucom.2020.12.095","type":"journal-article","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:36:48Z","timestamp":1610152608000},"page":"149-164","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["Identity-constrained noise modeling with metric learning for face anti-spoofing"],"prefix":"10.1016","volume":"434","author":[{"given":"Yaowen","family":"Xu","sequence":"first","affiliation":[]},{"given":"Lifang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Jian","sequence":"additional","affiliation":[]},{"given":"Wei-Shi","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yukun","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zhuming","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2007","series-title":"Handbook of Biometrics","author":"Jain","key":"10.1016\/j.neucom.2020.12.095_b0005"},{"issue":"9","key":"10.1016\/j.neucom.2020.12.095_b0010","doi-asserted-by":"crossref","first-page":"3922","DOI":"10.1109\/TIP.2014.2332396","article-title":"Ordinal feature selection for iris and palmprint recognition","volume":"23","author":"Sun","year":"2014","journal-title":"IEEE Transactions on Image Processing"},{"issue":"8","key":"10.1016\/j.neucom.2020.12.095_b0015","doi-asserted-by":"crossref","first-page":"1979","DOI":"10.1109\/TPAMI.2017.2737538","article-title":"Simultaneous local binary feature learning and encoding for homogeneous and heterogeneous face recognition","volume":"40","author":"Lu","year":"2017","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"year":"2011","series-title":"Handbook of Face Recognition","author":"Jain","key":"10.1016\/j.neucom.2020.12.095_b0020"},{"key":"10.1016\/j.neucom.2020.12.095_b0025","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"10023","article-title":"Multi-adversarial discriminative deep domain generalization for face presentation attack detection","author":"Shao","year":"2019"},{"key":"10.1016\/j.neucom.2020.12.095_b0030","series-title":"Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG)","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","author":"Chingovska","year":"2012"},{"issue":"4","key":"10.1016\/j.neucom.2020.12.095_b0035","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1109\/TIFS.2015.2403306","article-title":"Person-specific face antispoofing with subject domain adaptation","volume":"10","author":"Yang","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.neucom.2020.12.095_b0040","unstructured":"J. Yang, Z. Lei, S. Z. Li, Learn convolutional neural network for face anti-spoofing, in: arXiv preprint arXiv:1408.5601, 2014."},{"key":"10.1016\/j.neucom.2020.12.095_b0045","series-title":"3rd IAPR Asian Conference on Pattern Recognition (ACPR)","first-page":"141","article-title":"Learning temporal features using LSTM-CNN architecture for face anti-spoofing","author":"Xu","year":"2015"},{"key":"10.1016\/j.neucom.2020.12.095_b0050","doi-asserted-by":"crossref","unstructured":"Y. Atoum, Y. Liu, A. Jourabloo, X. Liu, Face anti-spoofing using patch and depth-based cnns, in: IEEE International Joint Conference on Biometrics (IJCB), 2017, pp. 319\u2013328.","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"10.1016\/j.neucom.2020.12.095_b0055","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"389","article-title":"Learning deep models for face anti-spoofing: Binary or auxiliary supervision","author":"Liu","year":"2018"},{"key":"10.1016\/j.neucom.2020.12.095_b0060","doi-asserted-by":"crossref","unstructured":"X. Niu, H. Han, S. Shan, X. Chen, Continuous heart rate measurement from face: a robust rppg approach with distribution learning, in: IEEE International Joint Conference on Biometrics (IJCB), 2017, pp. 642\u2013650.","DOI":"10.1109\/BTAS.2017.8272752"},{"key":"10.1016\/j.neucom.2020.12.095_b0065","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"290","article-title":"Face de-spoofing: Anti-spoofing via noise modeling","author":"Jourabloo","year":"2018"},{"key":"10.1016\/j.neucom.2020.12.095_b0070","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"3233","article-title":"Erase or fill? deep joint recurrent rain removal and reconstruction in videos","author":"Liu","year":"2018"},{"key":"10.1016\/j.neucom.2020.12.095_b0075","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"3253","article-title":"Gated fusion network for single image dehazing","author":"Ren","year":"2018"},{"key":"10.1016\/j.neucom.2020.12.095_b0080","series-title":"Proceedings of the European Conference on Computer Vision (ECCV)","first-page":"303","article-title":"Deep image demosaicking using a cascade of convolutional residual denoising networks","author":"Kokkinos","year":"2018"},{"key":"10.1016\/j.neucom.2020.12.095_b0085","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.patcog.2017.10.032","article-title":"Distance metric learning for pattern recognition","volume":"75","author":"Lu","year":"2018","journal-title":"Pattern Recognition"},{"issue":"6","key":"10.1016\/j.neucom.2020.12.095_b0090","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MSP.2017.2732900","article-title":"Deep metric learning for visual understanding: an overview of recent advances","volume":"34","author":"Lu","year":"2017","journal-title":"IEEE Signal Processing Magazine"},{"key":"10.1016\/j.neucom.2020.12.095_b0095","doi-asserted-by":"crossref","unstructured":"T. Ojala, M. Pietik\u00e4inen, T. M\u00e4enp\u00e4\u00e4, Multiresolution gray-scale and rotation invariant texture classification with local binary patterns, IEEE Transactions on Pattern Analysis & Machine Intelligence (7) (2002) 971\u2013987.","DOI":"10.1109\/TPAMI.2002.1017623"},{"issue":"10","key":"10.1016\/j.neucom.2020.12.095_b0100","doi-asserted-by":"crossref","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","article-title":"Secure face unlock: Spoof detection on smartphones","volume":"11","author":"Patel","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.neucom.2020.12.095_b0105","series-title":"Asian Conference on Computer Vision (ACCV)","first-page":"121","article-title":"LBP-TOP based countermeasure against face spoofing attacks","author":"de Freitas Pereira","year":"2012"},{"key":"10.1016\/j.neucom.2020.12.095_b0110","doi-asserted-by":"crossref","unstructured":"W. R. Schwartz, A. Rocha, H. Pedrini, Face spoofing detection through partial least squares and low-level descriptors, in: International Joint Conference on Biometrics (IJCB), 2011, pp. 1\u20138.","DOI":"10.1109\/IJCB.2011.6117592"},{"key":"10.1016\/j.neucom.2020.12.095_b0115","doi-asserted-by":"crossref","unstructured":"K. B. Housam, S. H. Lau, Y. H. Pang, Y. P. Liew, M. L. Chiang, Face spoofing detection based on improved local graph structure, in: 2014 International Conference on Information Science & Applications (ICISA), 2014, pp. 1\u20134.","DOI":"10.1109\/ICISA.2014.6847399"},{"issue":"5","key":"10.1016\/j.neucom.2020.12.095_b0120","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1109\/TIFS.2015.2395139","article-title":"Using visual rhythms for detecting video-based facial spoof attacks","volume":"10","author":"Pinto","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.neucom.2020.12.095_b0125","series-title":"18th IEEE International Conference on Image Processing (ICIP)","first-page":"3557","article-title":"Face liveness detection under bad illumination conditions","author":"Peixoto","year":"2011"},{"issue":"8","key":"10.1016\/j.neucom.2020.12.095_b0130","doi-asserted-by":"crossref","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","article-title":"Face spoofing detection using colour texture analysis","volume":"11","author":"Boulkenafet","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.neucom.2020.12.095_b0135","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1117\/12.541955","article-title":"Live face detection based on the analysis of fourier spectra","volume":"5404","author":"Li","year":"2004","journal-title":"Biometric Technology for Human Identification"},{"key":"10.1016\/j.neucom.2020.12.095_b0140","series-title":"International Conference on Image Analysis and Signal Processing (IASP)","first-page":"233","article-title":"A liveness detection method for face recognition based on optical flow field","author":"Bao","year":"2009"},{"key":"10.1016\/j.neucom.2020.12.095_b0145","doi-asserted-by":"crossref","unstructured":"M. M. Chakka, A. Anjos, S. Marcel, Motion-based counter-measures to photo attacks in face recognition, Iet Biometrics 3 (3) 147\u2013158.","DOI":"10.1049\/iet-bmt.2012.0071"},{"key":"10.1016\/j.neucom.2020.12.095_b0150","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/TIP.2013.2292332","article-title":"Image quality assessment for fake biometric detection: application to iris, fingerprint and face recognition","volume":"23","author":"Galbally","year":"2014","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.neucom.2020.12.095_b0155","series-title":"2015 International Conference on Biometrics (ICB)","first-page":"98","article-title":"Live face video vs. spoof face video: Use of moir\u00e9 patterns to detect replay video attacks","author":"Patel","year":"2015"},{"key":"10.1016\/j.neucom.2020.12.095_b0160","doi-asserted-by":"crossref","unstructured":"N. Erdogmus, S. Marcel, Spoofing in 2d face recognition with 3d masks and anti-spoofing with kinect, in: IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), 2013.","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"10.1016\/j.neucom.2020.12.095_b0165","doi-asserted-by":"crossref","unstructured":"O. Nikisins, A. Mohammadi, A. Anjos, S. Marcel, On effectiveness of anomaly detection approaches against unseen presentation attacks in face anti-spoofing, in: International Conference on Biometrics (ICB), 2018, pp. 75\u201381.","DOI":"10.1109\/ICB2018.2018.00022"},{"key":"10.1016\/j.neucom.2020.12.095_b0170","doi-asserted-by":"crossref","unstructured":"L. Li, X. Feng, Z. Boulkenafet, Z. Xia, M. Li, A. Hadid, An original face anti-spoofing approach using partial convolutional neural network, in: Sixth International Conference on Image Processing Theory, Tools and Applications (IPTA), 2016, pp. 1\u20136.","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"10.1016\/j.neucom.2020.12.095_b0175","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/j.jvcir.2016.03.019","article-title":"Integration of image quality and motion cues for face anti-spoofing: a neural network approach","volume":"38","author":"Feng","year":"2016","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"4","key":"10.1016\/j.neucom.2020.12.095_b0180","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1007\/s11760-016-1014-2","article-title":"Deep face liveness detection based on nonlinear diffusion using convolution neural network","volume":"11","author":"Alotaibi","year":"2017","journal-title":"Signal, Image and Video Processing"},{"key":"10.1016\/j.neucom.2020.12.095_b0185","series-title":"2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","first-page":"1","article-title":"A discriminative spatio-temporal mapping of face for liveness detection","author":"Lakshminarayana","year":"2017"},{"key":"10.1016\/j.neucom.2020.12.095_b0190","doi-asserted-by":"crossref","unstructured":"X. Tu, Y. Fang, Ultra-deep neural network for face anti-spoofing, in: International Conference on Neural Information Processing, 2017, pp. 686\u2013695.","DOI":"10.1007\/978-3-319-70096-0_70"},{"issue":"10","key":"10.1016\/j.neucom.2020.12.095_b0195","doi-asserted-by":"crossref","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","article-title":"Learning generalized deep feature representation for face anti-spoofing","volume":"13","author":"Li","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.neucom.2020.12.095_b0200","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.eswa.2018.05.004","article-title":"Livenet: Improving features generalization for face liveness detection using convolution neural networks","volume":"108","author":"Rehman","year":"2018","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.neucom.2020.12.095_b0205","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/TIFS.2019.2916652","article-title":"Biometric face presentation attack detection with multi-channel convolutional neural network","volume":"15","author":"George","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.neucom.2020.12.095_b0210","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1109\/TIFS.2019.2922241","article-title":"Attention-based two-stream convolutional networks for face spoofing detection","volume":"15","author":"Chen","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.neucom.2020.12.095_b0215","series-title":"Proceedings of the 27th ACM International Conference on Multimedia","first-page":"1526","article-title":"User diverse preference modeling by multimodal attentive metric learning","author":"Liu","year":"2019"},{"key":"10.1016\/j.neucom.2020.12.095_b0220","series-title":"Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI","first-page":"3508","article-title":"Auxiliary template-enhanced generative compatibility modeling","author":"Liu","year":"2020"},{"key":"10.1016\/j.neucom.2020.12.095_b0225","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"1125","article-title":"Image-to-image translation with conditional adversarial networks","author":"Isola","year":"2017"},{"key":"10.1016\/j.neucom.2020.12.095_b0230","series-title":"International Conference on Medical Image Computing and Computer-assisted Intervention","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"Ronneberger","year":"2015"},{"key":"10.1016\/j.neucom.2020.12.095_b0235","series-title":"Proceedings of the IEEE International Conference on Computer Vision (ICCV)","first-page":"192","article-title":"S3FD: Single shot scale-invariant face detector","author":"Zhang","year":"2017"},{"key":"10.1016\/j.neucom.2020.12.095_b0240","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"539","article-title":"Learning a similarity metric discriminatively, with application to face verification","author":"Chopra","year":"2005"},{"key":"10.1016\/j.neucom.2020.12.095_b0245","doi-asserted-by":"crossref","unstructured":"R. Hadsell, S. Chopra, Y. LeCun, Dimensionality reduction by learning an invariant mapping, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), vol. 2, 2006, pp. 1735\u20131742.","DOI":"10.1109\/CVPR.2006.100"},{"key":"10.1016\/j.neucom.2020.12.095_b0250","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.neunet.2020.03.015","article-title":"Cross-modal dual subspace learning with adversarial network","volume":"126","author":"Shang","year":"2020","journal-title":"Neural Networks"},{"key":"10.1016\/j.neucom.2020.12.095_b0255","series-title":"Proceedings of the IEEE International Conference on Computer Vision (ICCV)","first-page":"2794","article-title":"Least squares generative adversarial networks","author":"Mao","year":"2017"},{"key":"10.1016\/j.neucom.2020.12.095_b0260","series-title":"5th IAPR international conference on Biometrics (ICB)","first-page":"26","article-title":"A face antispoofing database with diverse attacks","author":"Zhang","year":"2012"},{"issue":"4","key":"10.1016\/j.neucom.2020.12.095_b0265","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","article-title":"Face spoof detection with image distortion analysis","volume":"10","author":"Wen","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.1016\/j.neucom.2020.12.095_b0270","doi-asserted-by":"crossref","unstructured":"Z. Boulkenafet, J. Komulainen, L. Li, X. Feng, A. Hadid, OULU-NPU: A mobile face presentation attack database with real-world variations, in: 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG), 2017, pp. 612\u2013618.","DOI":"10.1109\/FG.2017.77"},{"key":"10.1016\/j.neucom.2020.12.095_b0275","unstructured":"R. Ramachandra, C. Busch, Presentation attack detection methods for face recognition systems: a comprehensive survey, ACM Computing Surveys (CSUR) 50 (1) (2017) 8."},{"issue":"2","key":"10.1016\/j.neucom.2020.12.095_b0280","first-page":"141","article-title":"Face anti-spoofing using speeded-up robust features and fisher vector encoding","volume":"24","author":"Boulkenafet","year":"2016","journal-title":"IEEE Signal Processing Letters"},{"key":"10.1016\/j.neucom.2020.12.095_b0285","doi-asserted-by":"crossref","unstructured":"Z. Boulkenafet, J. Komulainen, Z. Akhtar, A. Benlamoudi, D. Samai, S. E. Bekhouche, A. Ouafi, F. Dornaika, A. Taleb-Ahmed, L. Qin, et al., A competition on generalized software-based face presentation attack detection in mobile scenarios, in: IEEE International Joint Conference on Biometrics (IJCB), 2017, pp. 688\u2013696.","DOI":"10.1109\/BTAS.2017.8272758"},{"key":"10.1016\/j.neucom.2020.12.095_b0290","doi-asserted-by":"crossref","unstructured":"C. Lin, Z. Liao, P. Zhou, J. Hu, B. Ni, Live face verification with multiple instantialized local homographic parameterization., in: International Joint Conferences on Artificial Intelligence (IJCAI), 2018, pp. 814\u2013820.","DOI":"10.24963\/ijcai.2018\/113"},{"key":"10.1016\/j.neucom.2020.12.095_b0295","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"3507","article-title":"Face anti-spoofing: model matters, so does data","author":"Yang","year":"2019"},{"key":"10.1016\/j.neucom.2020.12.095_b0300","doi-asserted-by":"crossref","unstructured":"T. de Freitas Pereira, A. Anjos, J. M. De Martino, S. Marcel, Can face anti-spoofing countermeasures work in a real world scenario?, in: International Conference on Biometrics (ICB), 2013, pp. 1\u20138.","DOI":"10.1109\/ICB.2013.6612981"},{"key":"10.1016\/j.neucom.2020.12.095_b0305","series-title":"2017 2nd International Conference on Multimedia and Image Processing (ICMIP)","article-title":"3d convolutional neural network based on face anti-spoofing","author":"Gan","year":"2017"},{"key":"10.1016\/j.neucom.2020.12.095_b0310","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops","first-page":"105","article-title":"Computationally efficient face spoofing detection with motion magnification","author":"Bharadwaj","year":"2013"},{"issue":"12","key":"10.1016\/j.neucom.2020.12.095_b0315","doi-asserted-by":"crossref","first-page":"4726","DOI":"10.1109\/TIP.2015.2466088","article-title":"Face spoofing detection through visual codebooks of spectral temporal cubes","volume":"24","author":"Pinto","year":"2015","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.neucom.2020.12.095_b0320","doi-asserted-by":"crossref","unstructured":"Z. Boulkenafet, J. Komulainen, A. Hadid, Face anti-spoofing based on color texture analysis, in: 2015 IEEE International Conference on Image Processing (ICIP), 2015, pp. 2636\u20132640.","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"10.1016\/j.neucom.2020.12.095_b0325","unstructured":"L. v. d. Maaten, G. Hinton, Visualizing data using t-sne, Journal of Machine Learning Research 9 (Nov) (2008) 2579\u20132605."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231220320075?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231220320075?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T03:08:57Z","timestamp":1724296137000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231220320075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":65,"alternative-id":["S0925231220320075"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2020.12.095","relation":{},"ISSN":["0925-2312"],"issn-type":[{"type":"print","value":"0925-2312"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Identity-constrained noise modeling with metric learning for face anti-spoofing","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2020.12.095","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}