{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:50:24Z","timestamp":1771955424096,"version":"3.50.1"},"publisher-location":"Cham","reference-count":70,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030585709","type":"print"},{"value":"9783030585716","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58571-6_33","type":"book-chapter","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T16:02:34Z","timestamp":1604851354000},"page":"557-575","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":125,"title":["Face Anti-Spoofing with Human Material Perception"],"prefix":"10.1007","author":[{"given":"Zitong","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xiaobai","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuesong","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Jingang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Guoying","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Guo, J., Zhu, X., Zhao, C., Cao, D., Lei, Z., Li, S.Z.: Learning meta face recognition in unseen domains. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6163\u20136172 (2020)","DOI":"10.1109\/CVPR42600.2020.00620"},{"key":"33_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-319-97909-0_30","volume-title":"Biometric Recognition","author":"J Guo","year":"2018","unstructured":"Guo, J., Zhu, X., Lei, Z., Li, S.Z.: Face synthesis for eyeglass-robust face recognition. In: Zhou, J., et al. (eds.) CCBR 2018. LNCS, vol. 10996, pp. 275\u2013284. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-97909-0_30"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Cao, D., Zhu, X., Huang, X., Guo, J., Lei, Z.: Domain balancing: face recognition on long-tailed domains. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5671\u20135679 (2020)","DOI":"10.1109\/CVPR42600.2020.00571"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face anti-spoofing based on color texture analysis. In: IEEE International Conference on Image Processing (ICIP), pp. 2636\u20132640 (2015)","DOI":"10.1109\/ICIP.2015.7351280"},{"issue":"8","key":"33_CR5","doi-asserted-by":"publisher","first-page":"1818","DOI":"10.1109\/TIFS.2016.2555286","volume":"11","author":"Z Boulkenafet","year":"2016","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face spoofing detection using colour texture analysis. IEEE Trans. Inf. Forensics Secur. 11(8), 1818\u20131830 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"de Freitas Pereira, T., Anjos, A., De Martino, J.M., Marcel, S.: LBP-top based countermeasure against face spoofing attacks. In: Asian Conference on Computer Vision, pp. 121\u2013132 (2012)","DOI":"10.1007\/978-3-642-37410-4_11"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Komulainen, J., Hadid, A., Pietikainen, M.: Context based face anti-spoofing. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20138 (2013)","DOI":"10.1109\/BTAS.2013.6712690"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Peixoto, B., Michelassi, C., Rocha, A.: Face liveness detection under bad illumination conditions. In: ICIP, pp. 3557\u20133560. IEEE (2011)","DOI":"10.1109\/ICIP.2011.6116484"},{"issue":"10","key":"33_CR9","doi-asserted-by":"publisher","first-page":"2268","DOI":"10.1109\/TIFS.2016.2578288","volume":"11","author":"K Patel","year":"2016","unstructured":"Patel, K., Han, H., Jain, A.K.: Secure face unlock: spoof detection on smartphones. IEEE Trans. Inf. Forensics Secur. 11(10), 2268\u20132283 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Qin, Y., et al.: Learning meta model for zero-and few-shot face anti-spoofing. In: The Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI) (2020)","DOI":"10.1609\/aaai.v34i07.6866"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Deep spatial gradient and temporal depth learning for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5042\u20135051 (2020)","DOI":"10.1109\/CVPR42600.2020.00509"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Yu, Z., et al.: Searching central difference convolutional networks for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5295\u20135305 (2020)","DOI":"10.1109\/CVPR42600.2020.00534"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Jourabloo, A., Liu, Y., Liu, X.: Face de-spoofing: anti-spoofing via noise modeling. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 290\u2013306 (2018)","DOI":"10.1007\/978-3-030-01261-8_18"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Lin, B., Li, X., Yu, Z., Zhao, G.: Face liveness detection by RPPG features and contextual patch-based CNN. In: Proceedings of the 2019 3rd International Conference on Biometric Engineering and Applications, pp. 61\u201368. ACM (2019)","DOI":"10.1145\/3345336.3345345"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Li, X., Komulainen, J., Zhao, G., Yuen, P.C., Pietik\u00e4inen, M.: Generalized face anti-spoofing by detecting pulse from face videos. In: 2016 23rd International Conference on Pattern Recognition (ICPR), pp. 4244\u20134249. IEEE (2016)","DOI":"10.1109\/ICPR.2016.7900300"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Y., Jourabloo, A., Liu, X.: Learning deep models for face anti-spoofing: binary or auxiliary supervision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 389\u2013398 (2018)","DOI":"10.1109\/CVPR.2018.00048"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Liu, S.Q., Lan, X., Yuen, P.C.: Remote photoplethysmography correspondence feature for 3D mask face presentation attack detection. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 558\u2013573 (2018)","DOI":"10.1007\/978-3-030-01270-0_34"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Atoum, Y., Liu, Y., Jourabloo, A., Liu, X.: Face anti-spoofing using patch and depth-based CNNs. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 319\u2013328 (2017)","DOI":"10.1109\/BTAS.2017.8272713"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Guo, J., Zhu, X., Xiao, J., Lei, Z., Wan, G., Li, S.Z.: Improving face anti-spoofing by 3D virtual synthesis. In: 2019 International Conference on Biometrics (ICB), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/ICB45273.2019.8987415"},{"key":"33_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-642-15567-3_37","volume-title":"Computer Vision \u2013 ECCV 2010","author":"X Tan","year":"2010","unstructured":"Tan, X., Li, Y., Liu, J., Jiang, L.: Face liveness detection from a single image with sparse low rank bilinear discriminative model. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010. LNCS, vol. 6316, pp. 504\u2013517. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15567-3_37"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Li, L., Xia, Z., Jiang, X., Ma, Y., Roli, F., Feng, X.: 3D face mask presentation attack detection based on intrinsic image analysis. arXiv preprint arXiv:1903.11303 (2019)","DOI":"10.1049\/iet-bmt.2019.0155"},{"issue":"3","key":"33_CR22","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/s11263-013-0609-0","volume":"103","author":"L Sharan","year":"2013","unstructured":"Sharan, L., Liu, C., Rosenholtz, R., Adelson, E.H.: Recognizing materials using perceptually inspired features. Int. J. Comput. Vision 103(3), 348\u2013371 (2013)","journal-title":"Int. J. Comput. Vision"},{"issue":"2","key":"33_CR23","first-page":"141","volume":"24","author":"Z Boulkenafet","year":"2017","unstructured":"Boulkenafet, Z., Komulainen, J., Hadid, A.: Face antispoofing using speeded-up robust features and fisher vector encoding. IEEE Signal Process. Lett. 24(2), 141\u2013145 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"33_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-37410-4_13","volume-title":"Computer Vision - ACCV 2012 Workshops","author":"J Komulainen","year":"2013","unstructured":"Komulainen, J., Hadid, A., Pietik\u00e4inen, M.: Face spoofing detection using dynamic texture. In: Park, J.-I., Kim, J. (eds.) ACCV 2012. LNCS, vol. 7728, pp. 146\u2013157. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37410-4_13"},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Siddiqui, T.A., et al.: Face anti-spoofing with multifeature videolet aggregation. In: 2016 23rd International Conference on Pattern Recognition (ICPR), pp. 1035\u20131040. IEEE (2016)","DOI":"10.1109\/ICPR.2016.7899772"},{"key":"33_CR26","doi-asserted-by":"crossref","unstructured":"Pan, G., Sun, L., Wu, Z., Lao, S.: Eyeblink-based anti-spoofing in face recognition from a generic webcamera. In: IEEE International Conference on Computer Vision, pp. 1\u20138 (2007)","DOI":"10.1109\/ICCV.2007.4409068"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Yu, Z., et al.: Auto-fas: searching lightweight networks for face anti-spoofing. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 996\u20131000. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9053587"},{"key":"33_CR28","doi-asserted-by":"crossref","unstructured":"Li, L., Feng, X., Boulkenafet, Z., Xia, Z., Li, M., Hadid, A.: An original face anti-spoofing approach using partial convolutional neural network. In: IPTA, pp. 1\u20136 (2016)","DOI":"10.1109\/IPTA.2016.7821013"},{"key":"33_CR29","doi-asserted-by":"crossref","unstructured":"Patel, K., Han, H., Jain, A.K.: Cross-database face antispoofing with robust feature representation. In: Chinese Conference on Biometric Recognition, pp. 611\u2013619 (2016)","DOI":"10.1007\/978-3-319-46654-5_67"},{"key":"33_CR30","doi-asserted-by":"crossref","unstructured":"George, A., Marcel, S.: Deep pixel-wise binary supervision for face presentation attack detection. In: International Conference on Biometrics. Number CONF (2019)","DOI":"10.1109\/ICB45273.2019.8987370"},{"key":"33_CR31","doi-asserted-by":"crossref","unstructured":"Yu, Z., et al.: Multi-modal face anti-spoofing based on central difference networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 650\u2013651 (2020)","DOI":"10.1109\/CVPRW50498.2020.00333"},{"key":"33_CR32","doi-asserted-by":"crossref","unstructured":"Kim, T., Kim, Y., Kim, I., Kim, D.: BASN: enriching feature representation using bipartite auxiliary supervisions for face anti-spoofing. In: Proceedings of the IEEE International Conference on Computer Vision Workshops (2019)","DOI":"10.1109\/ICCVW.2019.00062"},{"key":"33_CR33","doi-asserted-by":"crossref","unstructured":"Liu, Y., Stehouwer, J., Jourabloo, A., Liu, X.: Deep tree learning for zero-shot face anti-spoofing. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4680\u20134689 (2019)","DOI":"10.1109\/CVPR.2019.00481"},{"key":"33_CR34","doi-asserted-by":"crossref","unstructured":"Jia, Y., Zhang, J., Shan, S., Chen, X.: Single-side domain generalization for face anti-spoofing. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8484\u20138493 (2020)","DOI":"10.1109\/CVPR42600.2020.00851"},{"key":"33_CR35","doi-asserted-by":"crossref","unstructured":"Wang, G., Han, H., Shan, S., Chen, X.: Cross-domain face presentation attack detection via multi-domain disentangled representation learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6678\u20136687 (2020)","DOI":"10.1109\/CVPR42600.2020.00671"},{"key":"33_CR36","doi-asserted-by":"crossref","unstructured":"Shao, R., Lan, X., Li, J., Yuen, P.C.: Multi-adversarial discriminative deep domain generalization for face presentation attack detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 10023\u201310031 (2019)","DOI":"10.1109\/CVPR.2019.01026"},{"key":"33_CR37","unstructured":"Wang, Z., Zhao, C., Qin, Y., Zhou, Q., Lei, Z.: Exploiting temporal and depth information for multi-frame face anti-spoofing. arXiv preprint arXiv:1811.05118 (2018)"},{"key":"33_CR38","doi-asserted-by":"crossref","unstructured":"Yang, X., et al.: Face anti-spoofing: Model matters, so does data. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2019)","DOI":"10.1109\/CVPR.2019.00362"},{"key":"33_CR39","doi-asserted-by":"crossref","unstructured":"Lin, C., Liao, Z., Zhou, P., Hu, J., Ni, B.: Live face verification with multiple instantialized local homographic parameterization. In: IJCAI, pp. 814\u2013820 (2018)","DOI":"10.24963\/ijcai.2018\/113"},{"key":"33_CR40","unstructured":"Yu, Z., Li, X., Zhao, G.: Remote photoplethysmograph signal measurement from facial videos using spatio-temporal networks. arXiv preprint arXiv:1905.02419 (2019)"},{"key":"33_CR41","doi-asserted-by":"crossref","unstructured":"Yu, Z., Li, X., Niu, X., Shi, J., Zhao, G.: Autohr: a strong end-to-end baseline for remote heart rate measurement with neural searching. arXiv preprint arXiv:2004.12292 (2020)","DOI":"10.1109\/LSP.2020.3007086"},{"key":"33_CR42","doi-asserted-by":"crossref","unstructured":"Yu, Z., Peng, W., Li, X., Hong, X., Zhao, G.: Remote heart rate measurement from highly compressed facial videos: an end-to-end deep learning solution with video enhancement. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 151\u2013160 (2019)","DOI":"10.1109\/ICCV.2019.00024"},{"issue":"9","key":"33_CR43","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1167\/10.9.19","volume":"10","author":"LT Maloney","year":"2010","unstructured":"Maloney, L.T., Brainard, D.H.: Color and material perception: achievements and challenges. J. Vis. 10(9), 19 (2010)","journal-title":"J. Vis."},{"key":"33_CR44","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.visres.2013.11.004","volume":"94","author":"RW Fleming","year":"2014","unstructured":"Fleming, R.W.: Visual perception of materials and their properties. Vis. Res. 94, 62\u201375 (2014)","journal-title":"Vis. Res."},{"key":"33_CR45","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.cobeha.2019.07.003","volume":"30","author":"S Nishida","year":"2019","unstructured":"Nishida, S.: Image statistics for material perception. Curr. Opinion Behav. Sci. 30, 94\u201399 (2019)","journal-title":"Curr. Opinion Behav. Sci."},{"key":"33_CR46","doi-asserted-by":"crossref","unstructured":"Adelson, E.H.: On seeing stuff: the perception of materials by humans and machines. In: Human vision and electronic imaging VI, vol. 4299, pp. 1\u201312. International Society for Optics and Photonics (2001)","DOI":"10.1117\/12.429489"},{"issue":"11","key":"33_CR47","doi-asserted-by":"publisher","first-page":"2032","DOI":"10.1109\/TPAMI.2008.182","volume":"31","author":"M Varma","year":"2008","unstructured":"Varma, M., Zisserman, A.: A statistical approach to material classification using image patch exemplars. IEEE Trans. Pattern Anal. Mach. Intell. 31(11), 2032\u20132047 (2008)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"33_CR48","doi-asserted-by":"crossref","unstructured":"Jiang, X., Du, J., Sun, B., Feng, X.: Deep dilated convolutional network for material recognition. In: 2018 Eighth International Conference on Image Processing Theory, Tools and Applications (IPTA), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/IPTA.2018.8608160"},{"issue":"14","key":"33_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.JEI.27.2.023032","volume":"2018","author":"S Ling","year":"2018","unstructured":"Ling, S., Callet, P.L., Yu, Z.: The role of structure and textural information in image utility and quality assessment tasks. Electron. Imaging 2018(14), 1\u201313 (2018)","journal-title":"Electron. Imaging"},{"key":"33_CR50","doi-asserted-by":"crossref","unstructured":"Deng, B.W., Yu, Z.T., Ling, B.W., Yang, Z.: Video quality assessment based on features for semantic task and human material perception. In: 2016 IEEE International Conference on Consumer Electronics-China (ICCE-China), pp. 1\u20134. IEEE (2016)","DOI":"10.1109\/ICCE-China.2016.7849750"},{"issue":"3","key":"33_CR51","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1049\/iet-bmt.2019.0155","volume":"9","author":"L Li","year":"2020","unstructured":"Li, L., Xia, Z., Jiang, X., Ma, Y., Roli, F., Feng, X.: 3D face mask presentation attack detection based on intrinsic image analysis. IET Biometrics 9(3), 100\u2013108 (2020)","journal-title":"IET Biometrics"},{"key":"33_CR52","unstructured":"Tomasi, C., Manduchi, R.: Bilateral filtering for gray and color images. In: ICCV, vol. 98, p. 2 (1998)"},{"key":"33_CR53","doi-asserted-by":"crossref","unstructured":"Durand, F., Dorsey, J.: Fast bilateral filtering for the display of high-dynamic-range images. In: ACM Transactions on Graphics (TOG), vol. 21, pp. 257\u2013266. ACM (2002)","DOI":"10.1145\/566654.566574"},{"key":"33_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/11744085_44","volume-title":"Computer Vision \u2013 ECCV 2006","author":"S Paris","year":"2006","unstructured":"Paris, S., Durand, F.: A fast approximation of the bilateral filter using a signal processing approach. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol. 3954, pp. 568\u2013580. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11744085_44"},{"key":"33_CR55","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"33_CR56","doi-asserted-by":"crossref","unstructured":"Wang, J., Chen, K., Xu, R., Liu, Z., Loy, C.C., Lin, D.: Carafe: content-aware reassembly of features. arXiv preprint arXiv:1905.02188 (2019)","DOI":"10.1109\/ICCV.2019.00310"},{"key":"33_CR57","doi-asserted-by":"crossref","unstructured":"Woo, S., Park, J., Lee, J.Y., So Kweon, I.: Cbam: convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 3\u201319 (2018)","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"33_CR58","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7132\u20137141 (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"33_CR59","doi-asserted-by":"crossref","unstructured":"Wang, X., Girshick, R., Gupta, A., He, K.: Non-local neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7794\u20137803 (2018)","DOI":"10.1109\/CVPR.2018.00813"},{"key":"33_CR60","doi-asserted-by":"crossref","unstructured":"Guo, J., Zhu, X., Yang, Y., Yang, F., Lei, Z., Li, S.Z.: Towards fast, accurate and stable 3D dense face alignment. In: Proceedings of the European Conference on Computer Vision (ECCV) (2020)","DOI":"10.1007\/978-3-030-58529-7_10"},{"key":"33_CR61","doi-asserted-by":"crossref","unstructured":"Feng, Y., Wu, F., Shao, X., Wang, Y., Zhou, X.: Joint 3D face reconstruction and dense alignment with position map regression network. In: Proceedings of the European Conference on Computer Vision (ECCV) (2017)","DOI":"10.1007\/978-3-030-01264-9_33"},{"key":"33_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, X., Ng, R., Chen, Q.: Single image reflection separation with perceptual losses. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4786\u20134794 (2018)","DOI":"10.1109\/CVPR.2018.00503"},{"key":"33_CR63","doi-asserted-by":"crossref","unstructured":"Boulkenafet, Z., Komulainen, J., Li, L., Feng, X., Hadid, A.: OULU-NPU: a mobile face presentation attack database with real-world variations. In: FGR, pp. 612\u2013618 (2017)","DOI":"10.1109\/FG.2017.77"},{"key":"33_CR64","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yan, J., Liu, S., Lei, Z., Yi, D., Li, S.Z.: A face antispoofing database with diverse attacks. In: ICB, pp. 26\u201331 (2012)","DOI":"10.1109\/ICB.2012.6199754"},{"key":"33_CR65","unstructured":"Chingovska, I., Anjos, A., Marcel, S.: On the effectiveness of local binary patterns in face anti-spoofing. In: Biometrics Special Interest Group, pp. 1\u20137 (2012)"},{"issue":"4","key":"33_CR66","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"33_CR67","unstructured":"International Organization for Standardization: ISO\/IEC JTC 1\/SC 37 biometrics: information technology biometric presentation attack detection part 1: Framework (2016). https:\/\/www.iso.org\/obp\/ui\/iso"},{"key":"33_CR68","unstructured":"Boulkenafet, Z., et al.: A competition on generalized software-based face presentation attack detection in mobile scenarios. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 688\u2013696. IEEE (2017)"},{"key":"33_CR69","doi-asserted-by":"publisher","first-page":"13868","DOI":"10.1109\/ACCESS.2017.2729161","volume":"5","author":"SR Arashloo","year":"2017","unstructured":"Arashloo, S.R., Kittler, J., Christmas, W.: An anomaly detection approach to face spoofing detection: a new formulation and evaluation protocol. IEEE Access 5, 13868\u201313882 (2017)","journal-title":"IEEE Access"},{"key":"33_CR70","doi-asserted-by":"crossref","unstructured":"Xiong, F., AbdAlmageed, W.: Unknown presentation attack detection with face RGB images. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20139. IEEE (2018)","DOI":"10.1109\/BTAS.2018.8698574"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58571-6_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:11:45Z","timestamp":1731024705000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58571-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030585709","9783030585716"],"references-count":70,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58571-6_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Glasgow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OpenReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5025","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1360","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}