{"id":"https://openalex.org/W3189417314","doi":"https://doi.org/10.1109/icc42927.2021.9501053","title":"PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting","display_name":"PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3189417314","doi":"https://doi.org/10.1109/icc42927.2021.9501053","mag":"3189417314"},"language":"en","primary_location":{"id":"doi:10.1109/icc42927.2021.9501053","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9501053","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100324301","display_name":"Liu Liu","orcid":"https://orcid.org/0000-0003-4218-8008"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liu Liu","raw_affiliation_strings":["School of Cyber Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087754239","display_name":"Hanlin Yu","orcid":"https://orcid.org/0000-0002-6586-6230"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanlin Yu","raw_affiliation_strings":["School of Cyber Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072485378","display_name":"Zhongjie Ba","orcid":"https://orcid.org/0000-0003-0921-8869"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongjie Ba","raw_affiliation_strings":["School of Cyber Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100658678","display_name":"Li L\u00fc","orcid":"https://orcid.org/0000-0001-5230-3749"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Lu","raw_affiliation_strings":["School of Cyber Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078406349","display_name":"Feng Lin","orcid":"https://orcid.org/0000-0001-5240-5200"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Lin","raw_affiliation_strings":["School of Cyber Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000596496","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0003-3441-6277"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["School of Cyber Science and Technology, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Zhejiang University","institution_ids":["https://openalex.org/I168879160"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100324301"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":0.1921,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.48356209,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8700026273727417},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8322113752365112},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7077659964561462},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.6458110809326172},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.6435666680335999},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5589947700500488},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5576077103614807},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.5329583287239075},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.48734650015830994},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3778829574584961},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.3765656054019928},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.33926600217819214},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.2843611240386963},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11760100722312927}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8700026273727417},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8322113752365112},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7077659964561462},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.6458110809326172},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.6435666680335999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5589947700500488},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5576077103614807},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.5329583287239075},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.48734650015830994},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3778829574584961},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.3765656054019928},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.33926600217819214},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2843611240386963},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11760100722312927}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc42927.2021.9501053","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9501053","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1519268598","https://openalex.org/W1838866347","https://openalex.org/W1871733231","https://openalex.org/W2092966366","https://openalex.org/W2096754397","https://openalex.org/W2129622867","https://openalex.org/W2141701079","https://openalex.org/W2151343288","https://openalex.org/W2162339282","https://openalex.org/W2791445945","https://openalex.org/W2793096385","https://openalex.org/W2916472906","https://openalex.org/W6639119543","https://openalex.org/W6680944521"],"related_works":["https://openalex.org/W2281508611","https://openalex.org/W3007059209","https://openalex.org/W4233349824","https://openalex.org/W4220832730","https://openalex.org/W4313224733","https://openalex.org/W4312120756","https://openalex.org/W1688416049","https://openalex.org/W4288120931","https://openalex.org/W2020816142","https://openalex.org/W4200422973"],"abstract_inverted_index":{"Facial":[0],"recognition":[1,93],"has":[2],"become":[3,75],"the":[4,67,79,98,103,129,133,138,153,159,163,166,174,178],"surge":[5],"on":[6],"mobile":[7],"authentication":[8,101,195],"scenarios":[9],"and":[10,25,40,135,141,177,196],"makes":[11],"up":[12],"a":[13,123,182],"huge":[14],"market":[15],"share":[16],"for":[17,100,184],"various":[18,32],"apps,":[19],"such":[20],"as":[21,102],"MasterCard,":[22],"Google":[23],"Wallet,":[24],"AliPay.":[26],"However,":[27],"existing":[28],"solutions":[29],"suffer":[30],"from":[31,132,155],"impersonation":[33,117],"attacks,":[34,72],"including":[35],"photo-spoofing":[36],"attack,":[37,39],"video-replay":[38],"3D":[41,69,83],"facial":[42,70,92,109],"mask":[43,71],"attack.":[44],"State-of-the-art":[45],"countermeasures":[46],"either":[47],"require":[48],"additional":[49],"user":[50,113],"intervention":[51],"or":[52],"introduce":[53],"specialized":[54],"high-end":[55],"sensors.":[56],"Even":[57],"introducing":[58],"these":[59,62],"extra":[60],"efforts,":[61],"approaches":[63],"still":[64],"hardly":[65],"defend":[66],"latest":[68],"which":[73,96],"gradually":[74],"accessible":[76],"due":[77],"to":[78,115,168],"prevalence":[80],"of":[81,158],"low-cost":[82],"printing.":[84],"In":[85,119],"this":[86],"paper,":[87],"we":[88],"propose":[89],"an":[90],"anti-spoofing":[91],"system,":[94],"PassFace,":[95],"verifies":[97],"smartphone":[99,154],"second":[104],"factor":[105],"merely":[106],"using":[107],"raw":[108],"videos":[110],"without":[111],"any":[112],"intervention,":[114],"defeat":[116],"attacks.":[118],"particular,":[120],"when":[121],"receiving":[122],"user\u2019s":[124,130],"selfie":[125],"video,":[126,134],"PassFace":[127,189],"identifies":[128],"face":[131],"meanwhile":[136],"extracts":[137],"highly":[139],"unique":[140],"physically":[142],"irreproducible":[143],"camera":[144],"fingerprint,":[145],"i.e.,":[146],"Photo":[147],"Response":[148],"Non-Uniformity":[149],"(PRNU),":[150],"built":[151],"in":[152,194],"key":[156],"frames":[157],"video.":[160],"After":[161],"that,":[162],"system":[164],"compares":[165],"Peak":[167],"Correlation":[169],"Energy":[170],"(PCE)":[171],"calculated":[172],"by":[173],"estimated":[175],"PRNU":[176],"reference":[179],"profile":[180],"with":[181],"threshold":[183],"authentication.":[185],"Experiment":[186],"results":[187],"demonstrate":[188],"can":[190],"achieve":[191],"satisfactory":[192],"performance":[193],"attack":[197],"resistance.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
