Image life trails based on contrast reduction models for face counter-spoofing

Natural face images are both content and context-rich, in the sense that they carry significant immersive information via depth cues embedded in the form of self-shadows or a space varying blur. Images of planar face prints, on the other hand, tend to have lower contrast and also suppressed depth cu...

Full description

Saved in:
Bibliographic Details
Published in:EURASIP Journal on Information Security Vol. 2023; no. 1; pp. 1 - 31
Main Authors: Katika, Balaji Rao, Karthik, Kannan
Format: Journal Article
Language:English
Published: Cham Springer International Publishing 16.01.2023
Springer Nature B.V
SpringerOpen
Subjects:
ISSN:2510-523X, 1687-4161, 2510-523X, 1687-417X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Natural face images are both content and context-rich, in the sense that they carry significant immersive information via depth cues embedded in the form of self-shadows or a space varying blur. Images of planar face prints, on the other hand, tend to have lower contrast and also suppressed depth cues. In this work, a solution is proposed, to detect planar print spoofing by enhancing self-shadow patterns present in face images. This process is facilitated and siphoned via the application of a non-linear iterative functional map, which is used to produce a contrast reductionist image sequence, termed as an image life trail. Subsequent images in this trail tend to have lower contrast in relation to the previous iteration. Differences taken across this image sequence help in bringing out the self-shadows already present in the original image. The proposed solution has two fronts: (i) a calibration and customization heavy 2-class client specific model construction process, based on self-shadow statistics, in which the model has to be trained with respect to samples from the new environment, and (ii) a subject independent and virtually environment independent model building procedure using random scans and Fourier descriptors, which can be cross-ported and applied to new environments without prior training. For the first case, where calibration and customization is required, overall mean error rate for the calibration-set (reduced CASIA dataset) was found to be 0.3106%, and the error rates for other datasets such OULU-NPU and CASIA-SURF were 1.1928% and 2.2462% respectively. For the second case, which involved building a 1-class and 2-class model using CASIA alone and testing completely on OULU, the error rates were 5.86% and 2.34% respectively, comparable to the customized solution for OULU-NPU.
AbstractList Abstract Natural face images are both content and context-rich, in the sense that they carry significant immersive information via depth cues embedded in the form of self-shadows or a space varying blur. Images of planar face prints, on the other hand, tend to have lower contrast and also suppressed depth cues. In this work, a solution is proposed, to detect planar print spoofing by enhancing self-shadow patterns present in face images. This process is facilitated and siphoned via the application of a non-linear iterative functional map, which is used to produce a contrast reductionist image sequence, termed as an image life trail. Subsequent images in this trail tend to have lower contrast in relation to the previous iteration. Differences taken across this image sequence help in bringing out the self-shadows already present in the original image. The proposed solution has two fronts: (i) a calibration and customization heavy 2-class client specific model construction process, based on self-shadow statistics, in which the model has to be trained with respect to samples from the new environment, and (ii) a subject independent and virtually environment independent model building procedure using random scans and Fourier descriptors, which can be cross-ported and applied to new environments without prior training. For the first case, where calibration and customization is required, overall mean error rate for the calibration-set (reduced CASIA dataset) was found to be 0.3106%, and the error rates for other datasets such OULU-NPU and CASIA-SURF were 1.1928% and 2.2462% respectively. For the second case, which involved building a 1-class and 2-class model using CASIA alone and testing completely on OULU, the error rates were 5.86% and 2.34% respectively, comparable to the customized solution for OULU-NPU.
Natural face images are both content and context-rich, in the sense that they carry significant immersive information via depth cues embedded in the form of self-shadows or a space varying blur. Images of planar face prints, on the other hand, tend to have lower contrast and also suppressed depth cues. In this work, a solution is proposed, to detect planar print spoofing by enhancing self-shadow patterns present in face images. This process is facilitated and siphoned via the application of a non-linear iterative functional map, which is used to produce a contrast reductionist image sequence, termed as an image life trail. Subsequent images in this trail tend to have lower contrast in relation to the previous iteration. Differences taken across this image sequence help in bringing out the self-shadows already present in the original image. The proposed solution has two fronts: (i) a calibration and customization heavy 2-class client specific model construction process, based on self-shadow statistics, in which the model has to be trained with respect to samples from the new environment, and (ii) a subject independent and virtually environment independent model building procedure using random scans and Fourier descriptors, which can be cross-ported and applied to new environments without prior training. For the first case, where calibration and customization is required, overall mean error rate for the calibration-set (reduced CASIA dataset) was found to be 0.3106%, and the error rates for other datasets such OULU-NPU and CASIA-SURF were 1.1928% and 2.2462% respectively. For the second case, which involved building a 1-class and 2-class model using CASIA alone and testing completely on OULU, the error rates were 5.86% and 2.34% respectively, comparable to the customized solution for OULU-NPU.
ArticleNumber 1
Author Karthik, Kannan
Katika, Balaji Rao
Author_xml – sequence: 1
  givenname: Balaji Rao
  orcidid: 0000-0002-7315-142X
  surname: Katika
  fullname: Katika, Balaji Rao
  email: k.balaji@iitg.ac.in
  organization: Department of Electronics and Electrical Engineering, Indian Institute of Technology Guwahati
– sequence: 2
  givenname: Kannan
  surname: Karthik
  fullname: Karthik, Kannan
  organization: Department of Electronics and Electrical Engineering, Indian Institute of Technology Guwahati
BookMark eNp9kc1LAzEQxYNUUKv_gKcFz6uTj02yRxE_CkUvCt5CNpmULe2mJtuD_73RFfXkaYbH770ZeCdkNsQBCTmncEmplleZcsmbGhirAWjZ9AE5Zg2FumH8dfZnPyJnOa8BgGnQLTTH5HGxtSusNn3Aaky23-Sqsxl9FYfKxaFIeawS-r0b-yJto8eChJiqYB0WZD-MmOq8izH0w-qUHAa7yXj2Pefk5e72-eahXj7dL26ul7XjGsaa-iC0BMU5V8gY9YwpIYQGpVmjA6MOZKAihFbZhnkhmbXCBtROg1VS8DlZTLk-2rXZpX5r07uJtjdfQkwrY9PYuw2aDmgrvWOcIhWdl10nHEUnuPJK6K4rWRdT1i7Ftz3m0azjPg3lfcOUbLSWrWgLxSbKpZhzwvBzlYL5rMFMNZhSg_mqwehi4pMpF3hYYfqN_sf1AUKliuA
Cites_doi 10.1007/978-981-32-9088-4_13
10.1109/TIFS.2016.2578288
10.1109/TIFS.2015.2403306
10.1007/s00371-020-01849-x
10.1049/iet-bmt.2017.0077
10.1109/TIP.2013.2292332
10.3390/s150101537
10.1007/978-3-030-32583-1_13
10.1109/TIFS.2015.2400392
10.1109/TIFS.2015.2400395
10.1109/ACCESS.2014.2381273
10.1109/ACCESS.2017.2729161
10.1049/iet-bmt.2011.0009
10.1007/s11263-010-0380-4
10.1109/TIFS.2014.2349158
10.1109/BTAS.2017.8272758
10.1109/WACV48630.2021.00122
10.1109/ICB.2013.6612957
10.1007/978-3-030-01261-8_18
10.1109/ICPR.2014.211
10.1109/ICME.2010.5583280
10.1109/CVPR42600.2020.00509
10.1109/FG.2011.5771438
10.1109/ICPR.2016.7900093
10.1007/s10044-020-00875-8
10.1109/CVPR.2019.00101
10.1007/3-540-48184-2_35
10.1109/ICIINFS.2017.8300354
10.1364/JOSAA.26.000760
10.1109/FG.2017.77
10.1109/ICB.2012.6199754
10.1109/CVPR.2019.00362
10.1109/ICB.2013.6613002
10.1109/CSCITA.2017.8066527
ContentType Journal Article
Copyright The Author(s) 2023
The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2023
– notice: The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOA
DOI 10.1186/s13635-022-00135-8
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
DatabaseTitleList

CrossRef
Computer Science Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 2510-523X
1687-417X
EndPage 31
ExternalDocumentID oai_doaj_org_article_b0196dc231e14bd6bb4c1ec437d748bb
10_1186_s13635_022_00135_8
GroupedDBID -A0
.4S
.DC
2WC
3V.
4.4
40G
5VS
6KP
8FE
8FG
8R4
8R5
AAKPC
ABUWG
ACGFS
ADBBV
ADINQ
ADMLS
AFKRA
AHBYD
AHYZX
ALMA_UNASSIGNED_HOLDINGS
AMKLP
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
C24
C6C
CCPQU
CS3
DWQXO
EDO
EIS
GNUQQ
GROUPED_DOAJ
HCIFZ
HZ~
K6V
K7-
KQ8
M0N
M~E
OK1
P62
PQQKQ
PROAC
Q2X
RHU
SEG
TR2
TUS
U2A
AAYXX
CITATION
OVT
7SC
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c380t-1df486073337e221d2274448078258f21c06f14ff97a52d462aa4afe8c80a7643
IEDL.DBID DOA
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000913678100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2510-523X
1687-4161
IngestDate Fri Oct 03 12:51:50 EDT 2025
Sat Oct 11 05:52:01 EDT 2025
Sat Nov 29 03:33:02 EST 2025
Fri Feb 21 02:45:47 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Self-shadows
Face counter-spoofing
Image life trail
Contrast reduction
Logistic maps
Iterated function
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c380t-1df486073337e221d2274448078258f21c06f14ff97a52d462aa4afe8c80a7643
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-7315-142X
OpenAccessLink https://doaj.org/article/b0196dc231e14bd6bb4c1ec437d748bb
PQID 2765886949
PQPubID 237294
PageCount 31
ParticipantIDs doaj_primary_oai_doaj_org_article_b0196dc231e14bd6bb4c1ec437d748bb
proquest_journals_2765886949
crossref_primary_10_1186_s13635_022_00135_8
springer_journals_10_1186_s13635_022_00135_8
PublicationCentury 2000
PublicationDate 2023-01-16
PublicationDateYYYYMMDD 2023-01-16
PublicationDate_xml – month: 01
  year: 2023
  text: 2023-01-16
  day: 16
PublicationDecade 2020
PublicationPlace Cham
PublicationPlace_xml – name: Cham
– name: New York
PublicationTitle EURASIP Journal on Information Security
PublicationTitleAbbrev EURASIP J. on Info. Security
PublicationYear 2023
Publisher Springer International Publishing
Springer Nature B.V
SpringerOpen
Publisher_xml – name: Springer International Publishing
– name: Springer Nature B.V
– name: SpringerOpen
References Katika, Karthik, Chaudhuri, Nakagawa, Khanna, Kumar (CR10) 2020
Yang, Lei, Yi, Li (CR20) 2015; 10
Wen, Han, Jain (CR23) 2015; 10
Nesli Erdogmus (CR3) 2013
Karthik, Katika (CR5) 2019
Sun, Xiong, Yiu (CR37) 2021; 37
CR18
Galbally, Marcel, Fierrez (CR25) 2014; 23
CR39
CR16
CR38
Patel, Han, Jain (CR2) 2016; 11
Arashloo, Kittler, Christmas (CR11) 2017; 5
CR14
CR13
CR34
CR33
CR31
CR30
Kim, Ban, Lee (CR15) 2015; 15
Chingovska, Dos Anjos (CR36) 2015; 10
Chingovska, Dos Anjos, Marcel (CR17) 2014; 9
CR4
Määttä, Hadid, Pietikäinen (CR19) 2012; 1
Pereira, Pinto, Andaló, Ferreira, Lavi, Soriano-Vargas, Cirne, Rocha, Jiang, Li, Crookes, Meng, Rosenberger (CR1) 2020
CR6
CR8
CR7
CR29
CR28
CR9
CR27
Edmunds, Caplier (CR12) 2017; 7
CR26
CR24
CR22
CR44
CR43
CR42
CR41
CR40
Cover, Thomas (CR32) 2006
Saragih, Lucey, Cohn (CR21) 2011; 91
Galbally, Marcel, Fierrez (CR35) 2014; 2
135_CR18
135_CR16
135_CR38
135_CR39
K Patel (135_CR2) 2016; 11
K. Karthik (135_CR5) 2019
J Määttä (135_CR19) 2012; 1
135_CR9
J Galbally (135_CR35) 2014; 2
135_CR8
135_CR7
135_CR6
J Yang (135_CR20) 2015; 10
135_CR40
135_CR4
135_CR43
SR Arashloo (135_CR11) 2017; 5
135_CR22
135_CR44
S Kim (135_CR15) 2015; 15
135_CR41
TM Cover (135_CR32) 2006
135_CR42
135_CR26
D Wen (135_CR23) 2015; 10
135_CR24
135_CR29
135_CR27
135_CR28
SM Nesli Erdogmus (135_CR3) 2013
LAM Pereira (135_CR1) 2020
T Edmunds (135_CR12) 2017; 7
Y Sun (135_CR37) 2021; 37
BR Katika (135_CR10) 2020
I Chingovska (135_CR17) 2014; 9
J Galbally (135_CR25) 2014; 23
I Chingovska (135_CR36) 2015; 10
135_CR33
JM Saragih (135_CR21) 2011; 91
135_CR30
135_CR31
135_CR14
135_CR34
135_CR13
References_xml – ident: CR22
– start-page: 145
  year: 2020
  end-page: 155
  ident: CR10
  article-title: Face anti-spoofing based on specular feature projections
  publication-title: Proceedings of 3rd International Conference on Computer Vision and Image Processing
  doi: 10.1007/978-981-32-9088-4_13
– volume: 11
  start-page: 2268
  issue: 10
  year: 2016
  end-page: 2283
  ident: CR2
  article-title: Secure face unlock: Spoof detection on smartphones
  publication-title: IEEE Trans. Inf. Forensic Secur.
  doi: 10.1109/TIFS.2016.2578288
– ident: CR18
– ident: CR43
– year: 2013
  ident: CR3
  publication-title: Spoofing in 2d face recognition with 3d masks and antispoofing with kinect
– ident: CR4
– ident: CR14
– ident: CR39
– ident: CR16
– volume: 10
  start-page: 797
  issue: 4
  year: 2015
  end-page: 809
  ident: CR20
  article-title: Person-specific face antispoofing with subject domain adaptation
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2403306
– ident: CR30
– ident: CR33
– volume: 37
  start-page: 1015
  year: 2021
  end-page: 1028
  ident: CR37
  article-title: Understanding deep face anti-spoofing: from the perspective of data
  publication-title: Vis. Comput.
  doi: 10.1007/s00371-020-01849-x
– volume: 7
  start-page: 27
  issue: 1
  year: 2017
  end-page: 38
  ident: CR12
  article-title: Face spoofing detection based on colour distortions
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2017.0077
– ident: CR6
– volume: 23
  start-page: 710
  issue: 2
  year: 2014
  end-page: 724
  ident: CR25
  article-title: Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition
  publication-title: IEEE Trans. Image Process.
  doi: 10.1109/TIP.2013.2292332
– ident: CR29
– ident: CR8
– ident: CR40
– ident: CR27
– ident: CR42
– volume: 15
  start-page: 1537
  issue: 1
  year: 2015
  end-page: 1563
  ident: CR15
  publication-title: Face liveness detection using defocus. Sensors.
  doi: 10.3390/s150101537
– start-page: 289
  year: 2020
  end-page: 311
  ident: CR1
  article-title: The Rise of Data-Driven Models in Presentation Attack Detection
  publication-title: Deep Biometrics. Unsupervised and Semi-Supervised Learning
  doi: 10.1007/978-3-030-32583-1_13
– ident: CR44
– volume: 10
  start-page: 787
  issue: 4
  year: 2015
  end-page: 796
  ident: CR36
  article-title: On the use of client identity information for face antispoofing
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2400392
– ident: CR38
– volume: 10
  start-page: 746
  issue: 4
  year: 2015
  end-page: 761
  ident: CR23
  article-title: Face spoof detection with image distortion analysis
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2400395
– volume: 2
  start-page: 1530
  year: 2014
  end-page: 1552
  ident: CR35
  article-title: Biometric antispoofing methods: A survey in face recognition
  publication-title: IEEE Access.
  doi: 10.1109/ACCESS.2014.2381273
– ident: CR31
– ident: CR13
– volume: 5
  start-page: 13868
  year: 2017
  end-page: 13882
  ident: CR11
  article-title: An anomaly detection approach to face spoofing detection: A new formulation and evaluation protocol
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2729161
– ident: CR9
– year: 2019
  ident: CR5
  article-title: Identity independent face anti-spoofing based on random scan patterns
  publication-title: 2019 8th PREMI International Conference on Pattern Recognition and Machine Intelligence (PREMI)
– ident: CR34
– ident: CR7
– volume: 1
  start-page: 3
  issue: 1
  year: 2012
  end-page: 10
  ident: CR19
  article-title: Face spoofing detection from single images using texture and local shape analysis
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2011.0009
– year: 2006
  ident: CR32
  publication-title: Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
– volume: 91
  start-page: 200
  issue: 2
  year: 2011
  end-page: 215
  ident: CR21
  article-title: Deformable model fitting by regularized landmark mean-shift
  publication-title: Int. J. Comput. Vis.
  doi: 10.1007/s11263-010-0380-4
– ident: CR28
– ident: CR41
– volume: 9
  start-page: 2264
  issue: 12
  year: 2014
  end-page: 2276
  ident: CR17
  article-title: Biometrics evaluation under spoofing attacks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2349158
– ident: CR26
– ident: CR24
– volume-title: Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
  year: 2006
  ident: 135_CR32
– volume-title: 2019 8th PREMI International Conference on Pattern Recognition and Machine Intelligence (PREMI)
  year: 2019
  ident: 135_CR5
– ident: 135_CR39
  doi: 10.1109/BTAS.2017.8272758
– ident: 135_CR43
  doi: 10.1109/WACV48630.2021.00122
– volume-title: Spoofing in 2d face recognition with 3d masks and antispoofing with kinect
  year: 2013
  ident: 135_CR3
– volume: 10
  start-page: 787
  issue: 4
  year: 2015
  ident: 135_CR36
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2400392
– ident: 135_CR22
  doi: 10.1109/ICB.2013.6612957
– ident: 135_CR14
– volume: 37
  start-page: 1015
  year: 2021
  ident: 135_CR37
  publication-title: Vis. Comput.
  doi: 10.1007/s00371-020-01849-x
– ident: 135_CR41
  doi: 10.1007/978-3-030-01261-8_18
– ident: 135_CR24
  doi: 10.1109/ICPR.2014.211
– ident: 135_CR13
  doi: 10.1109/ICME.2010.5583280
– ident: 135_CR42
  doi: 10.1109/CVPR42600.2020.00509
– ident: 135_CR29
  doi: 10.1109/FG.2011.5771438
– ident: 135_CR33
– ident: 135_CR16
  doi: 10.1109/ICPR.2016.7900093
– ident: 135_CR4
  doi: 10.1007/s10044-020-00875-8
– ident: 135_CR28
  doi: 10.1109/CVPR.2019.00101
– ident: 135_CR31
– volume: 1
  start-page: 3
  issue: 1
  year: 2012
  ident: 135_CR19
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2011.0009
– volume: 9
  start-page: 2264
  issue: 12
  year: 2014
  ident: 135_CR17
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2014.2349158
– ident: 135_CR26
– ident: 135_CR44
  doi: 10.1007/3-540-48184-2_35
– ident: 135_CR8
  doi: 10.1109/ICIINFS.2017.8300354
– ident: 135_CR7
  doi: 10.1364/JOSAA.26.000760
– ident: 135_CR38
  doi: 10.1109/BTAS.2017.8272758
– ident: 135_CR27
  doi: 10.1109/FG.2017.77
– start-page: 289
  volume-title: Deep Biometrics. Unsupervised and Semi-Supervised Learning
  year: 2020
  ident: 135_CR1
  doi: 10.1007/978-3-030-32583-1_13
– volume: 10
  start-page: 746
  issue: 4
  year: 2015
  ident: 135_CR23
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2400395
– ident: 135_CR18
  doi: 10.1109/ICB.2012.6199754
– volume: 15
  start-page: 1537
  issue: 1
  year: 2015
  ident: 135_CR15
  publication-title: Face liveness detection using defocus. Sensors.
  doi: 10.3390/s150101537
– volume: 2
  start-page: 1530
  year: 2014
  ident: 135_CR35
  publication-title: IEEE Access.
  doi: 10.1109/ACCESS.2014.2381273
– volume: 10
  start-page: 797
  issue: 4
  year: 2015
  ident: 135_CR20
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2015.2403306
– volume: 91
  start-page: 200
  issue: 2
  year: 2011
  ident: 135_CR21
  publication-title: Int. J. Comput. Vis.
  doi: 10.1007/s11263-010-0380-4
– ident: 135_CR40
  doi: 10.1109/CVPR.2019.00362
– volume: 5
  start-page: 13868
  year: 2017
  ident: 135_CR11
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2729161
– volume: 23
  start-page: 710
  issue: 2
  year: 2014
  ident: 135_CR25
  publication-title: IEEE Trans. Image Process.
  doi: 10.1109/TIP.2013.2292332
– ident: 135_CR34
– ident: 135_CR30
– volume: 11
  start-page: 2268
  issue: 10
  year: 2016
  ident: 135_CR2
  publication-title: IEEE Trans. Inf. Forensic Secur.
  doi: 10.1109/TIFS.2016.2578288
– ident: 135_CR6
  doi: 10.1109/ICB.2013.6613002
– start-page: 145
  volume-title: Proceedings of 3rd International Conference on Computer Vision and Image Processing
  year: 2020
  ident: 135_CR10
  doi: 10.1007/978-981-32-9088-4_13
– volume: 7
  start-page: 27
  issue: 1
  year: 2017
  ident: 135_CR12
  publication-title: IET Biom.
  doi: 10.1049/iet-bmt.2017.0077
– ident: 135_CR9
  doi: 10.1109/CSCITA.2017.8066527
SSID ssj0002808905
ssj0064073
Score 2.2386718
Snippet Natural face images are both content and context-rich, in the sense that they carry significant immersive information via depth cues embedded in the form of...
Abstract Natural face images are both content and context-rich, in the sense that they carry significant immersive information via depth cues embedded in the...
SourceID doaj
proquest
crossref
springer
SourceType Open Website
Aggregation Database
Index Database
Publisher
StartPage 1
SubjectTerms Calibration
Communications Engineering
Contrast reduction
Customization
Datasets
Engineering
Errors
Face counter-spoofing
Image contrast
Image enhancement
Image life trail
Image sequencing
Iterated function
Iterative methods
Logistic maps
Networks
Security Science and Technology
Self-shadows
Shadows
Signal,Image and Speech Processing
Spoofing
Systems and Data Security
SummonAdditionalLinks – databaseName: Computer Science Database
  dbid: K7-
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NT9wwELXo0kMvBQRVQwH5wK1YG8eO7ZyqgkCtkFYcirQ3K_EHQqLJkiz8_s54kyIqtZdeoiiJIstv7HkztucRcupilftSaJbLUDHpeWSV9JE5mde6hKvxPolN6MXCLJfVzZhwG8ZtldOcmCZq3znMkc8LDb7SqEpWX1aPDFWjcHV1lNB4Q7Z5UXC082vNMMZSMHaQu0_nZIyaD1yAd2W4fR2JT8nMK1-USva_4pl_LI0mj3O1879t3SXvR65Jv26MY49shXafLL7_hCmEPtzHQFEf4mGg6Mk87Vqa9q3Xw5r2WNAVIaNJKWegQG1prF2gSVsi9AyiYTDL9u6A3F5d_rj4xkZRBeaEydeM-4i6U1oIoQP0mS-wRiAeLIdY0cSCu1xFLmOsdF0WXqqirmUdg3EG0AP-8oHM2q4NHwkVee4DxGu5dg3wAme0U3DnKxEgCuJlRj5P3WtXm9oZNsUcRtkNGBbAsAkMazJyjgj8_hLrXqcHXX9nx2FkGyzn4x2Q0sBl41XTSMeDk0J7LU3TZORoQsSOg3GwL3Bk5GzC9OX135t0-O-_fSLvUHweEzJcHZHZun8Kx-Ste17fD_1JMsVfn7Pj8A
  priority: 102
  providerName: ProQuest
– databaseName: SpringerOpen
  dbid: C24
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JT8UgEJ64HfTgbnxu4eBNiVBogaMajV5ePGjijbQsRqN9pn36-wVe6xY96KVpWtI0szDfADMfwL7xiticCUy4U5hb6rHi1mPDSSnycJXWJrIJMRzK21t11RWFtf1p935LMs3Uya1lcdRSFoIjjqfPI27JsZyG2ZxKFe36tKtxeEjLRUQq8g6C404V68tlfvzOl5CUOvd_gZvfdkhT4Dlf-t8vL8NiBzTR8cQyVmDK1auw1JM4oM6nV2HhU0fCNRhePoUJBj3ee4cie8Rji2Kcs2hUo3SqvWzHqIntXqNCUeLRaVEAvsiXxqHEPOEaHHLlYLT13TrcnJ9dn17gjnIBGybJGFPrIyuVYIwJl2XUZrGDYCw7D5mk9Bk1pPCUe69EmWeWF1lZ8tI7aWTQbUA3GzBTj2q3CYgRYl3I5ogwVUANRgpThDurmAs5Es0HcNBLXT9POmvolJHIQk8Ep4PgdBKclgM4iYp5Hxm7YqcHo-ZOd06mq9jsx5oAWR3llS2qihvqDGfCCi6ragA7vVp156qtzkQAYbJQXA3gsFfjx-vff2nrb8O3YT5S1cflG1rswMy4eXG7MGdex_dts5dM-A3Jj-h9
  priority: 102
  providerName: Springer Nature
Title Image life trails based on contrast reduction models for face counter-spoofing
URI https://link.springer.com/article/10.1186/s13635-022-00135-8
https://www.proquest.com/docview/2765886949
https://doaj.org/article/b0196dc231e14bd6bb4c1ec437d748bb
Volume 2023
WOSCitedRecordID wos000913678100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: DOA
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center)
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: M~E
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAVX
  databaseName: SpringerOpen
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: C24
  dateStart: 20071201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5B4cCFN2KhrHzgBlbt2IntI622AiFWKwRSxcVK_EBFJUWbhSO_nRknKS0S4sJlFCU5WDO25xs_vg_gechOxFoZLnRyXEeZudMx86BFa2q0NsYiNmHWa3ty4jaXpL7oTNhIDzw67qAjApcYEIYkqbvYdJ0OMgWtTDTadh3Nvoh6LhVTX8qSkbBOXABh2q1S85UZ2xwMUmGi5XSSnTBQze2VtFTY-69Azj92SUvyOb4LtyfUyF6Nrb0H11J_H-7MigxsGqAPYP3mK84P7Ow0J0biD2cDozQV2XnPyqH0dtixLbG1UjxYkcEZGOJWltuQWBGOSFuOpS72uf7zQ_h4vPpw9JpPigk8KCt2XMZMolJGKWVSVclYEQEg3RrHQtDmSgbRZKlzdqatq6ibqm11m5MNFkOD4OQR7PXnfXoMTAkRExZjwoQOk36wJjT4FJ1KWOLIegEvZof5byMxhi8FhW386F6P7vXFvd4u4JB8evEnkVqXFxhqP4Xa_yvUC9ifI-KnkTb4yiCGso3TbgEv5yj9_vz3Jj35H016CrdIf57WZGSzD3u77ff0DG6GH7vTYbuEG4er9eb9Eq4fVXpZeijat4ajffdzhXZTf_oFcVjmkg
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Jb9QwFH4qBQkuLALElAI-wAmsxkti54AQW9VRy6iHIlVcTOKlqlQyJZmC-FP8Rt7zTKiKBLceuERREll23vp5eR_AU5_qIpTK8ELHmusgEq91SNzrojElXm0ImWzCzGb28LDeX4Of41kY2lY5-sTsqMPc0xz5ljQYK21V6_rV6VdOrFG0ujpSaCzVYjf--I6QbXg5fYfyfSbl9vuDtzt8xSrAvbLFgouQiHjJKKVMlFIESUXy6GQ1giWbpPBFlYROqTZNKYOuZNPoJkXrLXYfAzi2ewWuao1gCe1nv_xEmK5CWyWsMJ7LsdXWIBRGc07b5SnRKrm9EPsyRcCFvPaPpdgc4bZv_W__5jbcXOXS7PVS-e_AWuzuwmz6BV0kOzlOkRH_xcnAKFIHNu9Y3pffDAvWU8FaUkmWmYAGhqk7S42PLHNnxJ4j2kez647uwcdLGcJ9WO_mXXwATBVFiIhHC-NbzHu8Nb7Cu1CriChPlBN4PorTnS5rg7iMqWzllsJ3KHyXhe_sBN6QxH9_SXW984N5f-RWbsK1VK4oeEy6o9BtqNpWexG9ViYYbdt2ApujBriVsxncufgn8GLUofPXf-_Sxr9bewLXdw4-7Lm96Wz3IdyQmN7R5JOoNmF90Z_FR3DNf1scD_3jbAYMPl-2bv0C9AQ9nQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3LbtQwFL0qBSE2PASoAwW8gBVYEztO7CwQAsqIUdFoFiBVbEziR1WpTIZkAPFrfB33ehKqIsGuCzZRlERRHJ_7OH7cA_DYxSrzRa55pkLFlReRV8pH7lRW6wKPxvskNqEXC3N0VC134Oe4F4aWVY4-MTlq3zoaI59KjbHSlJWqpnFYFrE8mL1Yf-GkIEUzraOcxhYih-HHd6Rv_fP5Afb1Eylnb96_fssHhQHucpNtuPCRRJh0nuc6SCm8pIJ5tMsaiZOJUrisjELFWOm6kF6Vsq5VHYNxBpuCwRzfewkua-SYZF3L4iPxuxLtlnjDuEfHlNNe5BjZOS2dp6Sr4OZcHExyAedy3D-mZVO0m934n__TTbg-5Njs5dYobsFOWN2Gxfwzuk52ehIDI12M055RBPesXbG0Xr_uN6yjQrYEVZYUgnqGKT2LtQssaWqEjvfrFs1xdXwHPlxIE-7C7qpdhT1geZb5gDw1067BfMgZ7Uo881UekP2JYgJPx661623NEJu4lintFggWgWATEKyZwCvq_d9PUr3vdKHtju3gPmxDZYy8w2Q8CNX4smmUE8GpXHutTNNMYH9Egx2cUG_PoDCBZyOezm7__ZPu_fttj-AqQsq-my8O78M1iVkfjUmJch92N93X8ACuuG-bk757mCyCwaeLhtYvvs9GcA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Image+life+trails+based+on+contrast+reduction+models+for+face+counter-spoofing&rft.jtitle=EURASIP+Journal+on+Information+Security&rft.au=Balaji+Rao+Katika&rft.au=Kannan+Karthik&rft.date=2023-01-16&rft.pub=SpringerOpen&rft.eissn=2510-523X&rft.volume=2023&rft.issue=1&rft.spage=1&rft.epage=31&rft_id=info:doi/10.1186%2Fs13635-022-00135-8&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_b0196dc231e14bd6bb4c1ec437d748bb
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2510-523X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2510-523X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2510-523X&client=summon