{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T09:03:16Z","timestamp":1721379796250},"reference-count":47,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","license":[{"start":{"date-parts":[[2020,3,11]],"date-time":"2020-03-11T00:00:00Z","timestamp":1583884800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2020,3,11]],"date-time":"2020-03-11T00:00:00Z","timestamp":1583884800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET biom."],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1049\/iet-bmt.2019.0155","type":"journal-article","created":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T02:38:05Z","timestamp":1580783885000},"page":"100-108","source":"Crossref","is-referenced-by-count":18,"title":["3D face mask presentation attack detection based on intrinsic image analysis"],"prefix":"10.1049","volume":"9","author":[{"given":"Lei","family":"Li","sequence":"first","affiliation":[{"name":"School of Electronics and InformationNorthwestern Polytechnical UniversityXi'anShaanxiPeople's Republic of China"}]},{"given":"Zhaoqiang","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Electronics and InformationNorthwestern Polytechnical UniversityXi'anShaanxiPeople's Republic of China"}]},{"given":"Xiaoyue","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Electronics and InformationNorthwestern Polytechnical UniversityXi'anShaanxiPeople's Republic of China"}]},{"given":"Yupeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Electronics and InformationNorthwestern Polytechnical UniversityXi'anShaanxiPeople's Republic of China"}]},{"given":"Fabio","family":"Roli","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic EngineeringUniversity of CagliariCagliariItaly"}]},{"given":"Xiaoyi","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Electronics and InformationNorthwestern Polytechnical UniversityXi'anShaanxiPeople's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2020,3,11]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"Oberhaus D.: \u2018Iphone x's face id can be fooled with a 3d\u2010printed mask\u2019 2017.https:\/\/motherboard.vice.com\/en_us\/article\/qv3n77\/iphone-x-face-id-mask-spoof?utm_source=mbfb"},{"key":"e_1_2_7_3_1","unstructured":"Chingovska I. Anjos A. Marcel S.: \u2018On the effectiveness of local binary patterns in face anti\u2010spoofing\u2019.Biometrics Special Interest Group Darmstadt Germany 2012 pp.1\u20137"},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","unstructured":"Erdogmus N. Marcel S.: \u2018Spoofing in 2d face recognition with 3d masks and anti\u2010spoofing with kinect\u2019.IEEE Sixth Int. Conf. on Biometrics: Theory Applications and Systems Arlington USA 2013 pp.1\u20136","DOI":"10.1109\/BTAS.2013.6712688"},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","unstructured":"M\u00e4\u00e4tt\u00e4 J. Hadid A. Pietik\u00e4inen M.: \u2018Face spoofing detection from single images using micro\u2010texture analysis\u2019.Int. Joint Conf. on Biometrics Washington D.C. USA 2011 pp.1\u20137","DOI":"10.1109\/IJCB.2011.6117510"},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z. Komulainen J Hadid A.: \u2018Face anti\u2010spoofing based on color texture analysis\u2019.IEEE Int. Conf. on Image Processing Quebec Canada 2015 pp.2636\u20132640","DOI":"10.1109\/ICIP.2015.7351280"},{"key":"e_1_2_7_7_1","doi-asserted-by":"crossref","unstructured":"Pan G. Sun L. Wu Z. et al. : \u2018Eyeblink\u2010based anti\u2010spoofing in face recognition from a generic webcamera\u2019.IEEE Int. Conf. on Computer Vision Rio de Janeiro Brazil 2007 pp.1\u20138","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"e_1_2_7_8_1","doi-asserted-by":"crossref","unstructured":"Li Y. Tan X.: \u2018An anti\u2010photo spoof method in face recognition based on the analysis of Fourier spectra with sparse logistic regression\u2019.Chinese Conf. on Pattern Recognition Nanjing China 2009 pp.1\u20135","DOI":"10.1109\/CCPR.2009.5344092"},{"key":"e_1_2_7_9_1","doi-asserted-by":"crossref","unstructured":"Zhang Z. Yan J. Liu S. et al. : \u2018A face antispoofing database with diverse attacks\u2019.Int. Conf. on Biometrics Clearwater USA 2012 pp.26\u201331","DOI":"10.1109\/ICB.2012.6199754"},{"key":"e_1_2_7_10_1","doi-asserted-by":"crossref","unstructured":"Tan X. Li Y. Liu J. et al. : \u2018Face liveness detection from a single image with sparse low rank bilinear discriminative model\u2019.European Conf. on Computer Vision Crete Greece 2010 pp.504\u2013517","DOI":"10.1007\/978-3-642-15567-3_37"},{"key":"e_1_2_7_11_1","doi-asserted-by":"crossref","unstructured":"Li H. Wang S. Kot A.C.: \u2018Face spoofing detection with image quality regression\u2019.Int. Conf. on Image Processing Theory Tools and Applications Oulu Finland 2016 pp.1\u20136","DOI":"10.1109\/IPTA.2016.7821027"},{"key":"e_1_2_7_12_1","unstructured":"Pavlidis I Symosek P.: \u2018The imaging issue in an automatic face\/disguise detection system\u2019.IEEE Workshop on Computer Vision Beyond the Visible Spectrum: Methods and Applications Hilton Head USA 2000 pp.15\u201324"},{"key":"e_1_2_7_13_1","doi-asserted-by":"crossref","unstructured":"Zhang Z. Yi D. Lei Z. et al. : \u2018Face liveness detection by learning multispectral reflectance distributions\u2019.IEEE Int. Conf. on Automatic Face and Gesture Recognition and Workshops Santa Barbara USA 2011 pp.436\u2013441","DOI":"10.1109\/FG.2011.5771438"},{"issue":"1","key":"e_1_2_7_14_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1049\/iet-bmt.2017.0089","article-title":"Face recognition under spoofing attacks: countermeasures and research directions","volume":"7","author":"Li L.","year":"2018","journal-title":"IET Biometrics"},{"key":"e_1_2_7_15_1","doi-asserted-by":"crossref","unstructured":"Liu Y. Jourabloo A. Liu X.: \u2018Learning deep models for face anti\u2010spoofing: binary or auxiliary supervision\u2019.IEEE Conf. on Computer Vision and Pattern Recognition Salt Lake City USA 2018 pp.389\u2013398","DOI":"10.1109\/CVPR.2018.00048"},{"key":"e_1_2_7_16_1","doi-asserted-by":"crossref","unstructured":"Ma Y. Feng X. Jiang X. et al. : \u2018Intrinsic image decomposition: A comprehensive review\u2019.Int. Conf. on Image and Graphics Shanghai China2017 pp.626\u2013638","DOI":"10.1007\/978-3-319-71607-7_55"},{"key":"e_1_2_7_17_1","doi-asserted-by":"crossref","unstructured":"Jiang X. Schofield A.J. Wyatt J.L.: \u2018Correlation\u2010based intrinsic image extraction from a single image\u2019.European Conf. on Computer Vision Crete Greece 2010 pp.58\u201371","DOI":"10.1007\/978-3-642-15561-1_5"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"Agarwal A. Singh R. Vatsa M.: \u2018Face anti\u2010spoofing using haralick features\u2019.IEEE Int. Conf. on Biometrics Theory Applications and Systems Niagara Falls USA 2016 pp.1\u20136","DOI":"10.1109\/BTAS.2016.7791171"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2578288"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555286"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400395"},{"key":"e_1_2_7_22_1","unstructured":"Yang J. Lei Z. Li S.Z.: \u2018Learn convolutional neural network for face anti\u2010spoofing\u2019.Computing Research Repository 2014 abs\/1408.5601 pp.373\u2013384"},{"key":"e_1_2_7_23_1","doi-asserted-by":"crossref","unstructured":"Li L. Feng X. Boulkenafet Z. et al. : \u2018An original face anti\u2010spoofing approach using partial convolutional neural network\u2019.Int. Conf. on Image Processing Theory Tools and Applications Oulu Finland 2016 pp.1\u20136","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"e_1_2_7_24_1","doi-asserted-by":"crossref","unstructured":"Li L. Feng X. Jiang X. et al. : \u2018Face anti\u2010spoofing via deep local binary patterns\u2019.IEEE Int. Conf. on Image Processing Beijing China 2017 pp.101\u2013105","DOI":"10.1109\/ICIP.2017.8296251"},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","unstructured":"Sun L. Pan G. Wu Z. et al. : \u2018Blinking\u2010based live face detection using conditional random fields\u2019.Advances in Biometrics Seoul Korea 2007 pp.252\u2013260","DOI":"10.1007\/978-3-540-74549-5_27"},{"key":"e_1_2_7_26_1","doi-asserted-by":"crossref","unstructured":"Anjos A. Marcel S.: \u2018Counter\u2010measures to photo attacks in face recognition: A public database and a baseline\u2019.Int. Joint Conf. on Biometrics Washington D.C. USA 2011 pp.1\u20137","DOI":"10.1109\/IJCB.2011.6117503"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2035882"},{"key":"e_1_2_7_28_1","unstructured":"Bao W. Li H. Li N. et al. : \u2018A liveness detection method for face recognition based on optical flow field\u2019.Int. Conf. on Image Analysis and Signal Processing Linhai China 2009 pp.233\u2013236"},{"issue":"1","key":"e_1_2_7_29_1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1186\/1687-5281-2014-2","article-title":"Face liveness detection using dynamic texture","volume":"2014","author":"Freitas Pereira T.D.","year":"2014","journal-title":"EURASIP J. Image and Video Process."},{"key":"e_1_2_7_30_1","doi-asserted-by":"crossref","unstructured":"Xu Z. Li S. Deng W.: \u2018Learning temporal features using lstm\u2010cnn architecture for face anti\u2010spoofing\u2019.Asian Conf. on Pattern Recognition Kuala Lumpur Malaysia 2015 pp.141\u2013145","DOI":"10.1109\/ACPR.2015.7486482"},{"key":"e_1_2_7_31_1","doi-asserted-by":"crossref","first-page":"2639","DOI":"10.1109\/TIFS.2018.2825949","article-title":"Learning generalized deep feature representation for face anti\u2010spoofing","volume":"13","author":"Li H.","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"issue":"12","key":"e_1_2_7_32_1","doi-asserted-by":"crossref","first-page":"22471","DOI":"10.3390\/s141222471","article-title":"Face liveness detection using a light field camera","volume":"14","author":"Kim S.","year":"2014","journal-title":"Sensors"},{"key":"e_1_2_7_33_1","doi-asserted-by":"crossref","unstructured":"Ji Z. Zhu H. Wang Q.: \u2018Lfhog: A discriminative descriptor for live face detection from light field image\u2019.IEEE Int. Conf. on Image Processing Phoenix USA 2016 pp.1474\u20131478","DOI":"10.1109\/ICIP.2016.7532603"},{"key":"e_1_2_7_34_1","doi-asserted-by":"crossref","unstructured":"Sepas\u2010Moghaddam A. Correia P.L. Pereira F.: \u2018Light field local binary patterns description for face recognition\u2019.IEEE Int. Conf. on Image Processing Beijing China 2017 pp.3815\u20133819","DOI":"10.1109\/ICIP.2017.8296996"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2322255"},{"key":"e_1_2_7_36_1","doi-asserted-by":"crossref","unstructured":"Liu S. Yuen P.C. Zhang S. et al. : \u20183d mask face anti\u2010spoofing with remote photoplethysmography\u2019.European Conf. on Computer Vision Munich Germany 2016 pp.85\u2013100","DOI":"10.1007\/978-3-319-46478-7_6"},{"key":"e_1_2_7_37_1","unstructured":"Li X. Komulainen J. Zhao G. et al. : \u2018Generalized face anti\u2010spoofing by detecting pulse from face videos\u2019.Int. Conf. on Pattern Recognition Poznan Poland 2017 pp.4244\u20134249"},{"key":"e_1_2_7_38_1","doi-asserted-by":"crossref","unstructured":"Shao R. Lan X. Yuen P.C.: \u2018Deep convolutional dynamic texture learning with adaptive channel\u2010discriminability for 3d mask face anti\u2010spoofing\u2019.IEEE Int. Joint Conf. on Biometrics (IJCB) Denver USA 2017 pp.748\u2013755","DOI":"10.1109\/BTAS.2017.8272765"},{"key":"e_1_2_7_39_1","unstructured":"Simonyan K. Zisserman A.: \u2018Very deep convolutional networks for large\u2010scale image recognition\u2019.Computing Research Repository 2014 abs\/1409.1556"},{"key":"e_1_2_7_40_1","doi-asserted-by":"crossref","unstructured":"Patel K. Han H. Jain A.K.: \u2018Cross\u2010database face antispoofing with robust feature representation\u2019.Chinese Conf. on Biometric Recognition Chengdu China 2016 pp.611\u2013619","DOI":"10.1007\/978-3-319-46654-5_67"},{"key":"e_1_2_7_41_1","unstructured":"Sajjadi M.S.M. Sch\u00f6lkopf B. Hirsch M.: \u2018Enhancenet: single image super\u2010resolution through automated texture synthesis\u2019.CoRR 2016 abs\/1612.07919. Available from:http:\/\/arxiv.org\/abs\/1612.07919"},{"key":"e_1_2_7_42_1","unstructured":"Glorot X. Bordes A. Bengio Y. et al. : \u2018Deep sparse rectifier neural networks\u2019.Int. Conf. on Artificial Intelligence and Statistics Lauderdale USA 2011 pp.315\u2013323"},{"key":"e_1_2_7_43_1","doi-asserted-by":"crossref","unstructured":"Parkhi O.M. Vedaldi A. Zisserman A.: \u2018Deep face recognition\u2019.British Machine Vision Conf. Swansea UK 2015 pp.1\u201312","DOI":"10.5244\/C.29.41"},{"key":"e_1_2_7_44_1","doi-asserted-by":"crossref","unstructured":"Bottou L.: \u2018Large\u2010scale machine learning with stochastic gradient descent\u2019.Proc. of COMPSTAT'2010Physica\u2010Verlag HD Paris France 2010 pp.177\u2013186","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_2_7_45_1","doi-asserted-by":"crossref","unstructured":"Vedaldi A. Lenc K.: \u2018Matconvnet \u2013 convolutional neural networks for matlab\u2019.Proc. of the ACM Int. Conf. on Multimedia Brisbane Australia 2015","DOI":"10.1145\/2733373.2807412"},{"issue":"9","key":"e_1_2_7_46_1","first-page":"1871","article-title":"Liblinear: A library for large linear classification","volume":"9","author":"Fan R.E.","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_2_7_47_1","unstructured":"\u2018Iso\/iec jtc 1\/sc 37 Biometrics Information Technology \u2013 Biometric Presentation Attack Detection \u2013 Part 1: Framework\u2019 International Organization for Standardization 2016"},{"key":"e_1_2_7_48_1","doi-asserted-by":"crossref","unstructured":"Boulkenafet Z. Komulainen J. Li L. et al. : \u2018Oulu\u2010npu: A mobile face presentation attack database with real\u2010world variations\u2019.IEEE Int. Conf. on Automatic Face & Gesture Recognition (FG 2017) Washington D.C. USA 2017 pp.612\u2013618","DOI":"10.1109\/FG.2017.77"}],"container-title":["IET Biometrics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-bmt.2019.0155","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-bmt.2019.0155","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-bmt.2019.0155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T11:09:42Z","timestamp":1612609782000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-bmt.2019.0155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,11]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["10.1049\/iet-bmt.2019.0155"],"URL":"https:\/\/doi.org\/10.1049\/iet-bmt.2019.0155","archive":["Portico"],"relation":{},"ISSN":["2047-4938","2047-4946"],"issn-type":[{"value":"2047-4938","type":"print"},{"value":"2047-4946","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,11]]}}}