{"id":"https://openalex.org/W3161979908","doi":"https://doi.org/10.1109/icpr48806.2021.9412323","title":"Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern","display_name":"Face Anti-Spoofing Based on Dynamic Color Texture Analysis Using Local Directional Number Pattern","publication_year":2021,"publication_date":"2021-01-10","ids":{"openalex":"https://openalex.org/W3161979908","doi":"https://doi.org/10.1109/icpr48806.2021.9412323","mag":"3161979908"},"language":"en","primary_location":{"id":"doi:10.1109/icpr48806.2021.9412323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr48806.2021.9412323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 25th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056068917","display_name":"Junwei Zhou","orcid":"https://orcid.org/0000-0002-6094-1203"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Junwei Zhou","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, Pennsylvania, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004348160","display_name":"Ke Shu","orcid":null},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Shu","raw_affiliation_strings":["School of Computer Science and Technology, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100346828","display_name":"Peng Liu","orcid":"https://orcid.org/0000-0002-5091-8464"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Liu","raw_affiliation_strings":["College of Information Sciences and Technology, The Pennsylvania State University, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, The Pennsylvania State University, Pennsylvania, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016677170","display_name":"Jianwen Xiang","orcid":"https://orcid.org/0000-0001-8440-4181"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwen Xiang","raw_affiliation_strings":["School of Computer Science and Technology, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101598103","display_name":"Shengwu Xiong","orcid":"https://orcid.org/0000-0002-3836-0664"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengwu Xiong","raw_affiliation_strings":["School of Computer Science and Technology, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5056068917"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":2.1331,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.8785666,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"4221","last_page":"4228"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10057","display_name":"Face and Expression Recognition","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6754648685455322},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.6668515205383301},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6284091472625732},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6073859930038452},{"id":"https://openalex.org/keywords/texture","display_name":"Texture (cosmology)","score":0.5912365317344666},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.5223765969276428},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.44045963883399963},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4274749159812927},{"id":"https://openalex.org/keywords/image-texture","display_name":"Image texture","score":0.42121490836143494},{"id":"https://openalex.org/keywords/image-segmentation","display_name":"Image segmentation","score":0.1553289294242859},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.14850834012031555},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10119268298149109}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6754648685455322},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.6668515205383301},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6284091472625732},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6073859930038452},{"id":"https://openalex.org/C2781195486","wikidata":"https://www.wikidata.org/wiki/Q289436","display_name":"Texture (cosmology)","level":3,"score":0.5912365317344666},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.5223765969276428},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.44045963883399963},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4274749159812927},{"id":"https://openalex.org/C63099799","wikidata":"https://www.wikidata.org/wiki/Q17147001","display_name":"Image texture","level":4,"score":0.42121490836143494},{"id":"https://openalex.org/C124504099","wikidata":"https://www.wikidata.org/wiki/Q56933","display_name":"Image segmentation","level":3,"score":0.1553289294242859},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.14850834012031555},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10119268298149109},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpr48806.2021.9412323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr48806.2021.9412323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 25th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5528105931","display_name":null,"funder_award_id":"61872430","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1487288055","https://openalex.org/W1515999713","https://openalex.org/W1557252109","https://openalex.org/W1964762821","https://openalex.org/W1982209341","https://openalex.org/W2003092530","https://openalex.org/W2047575506","https://openalex.org/W2096943734","https://openalex.org/W2107227001","https://openalex.org/W2111440402","https://openalex.org/W2118392996","https://openalex.org/W2139916508","https://openalex.org/W2153635508","https://openalex.org/W2163487272","https://openalex.org/W2163744678","https://openalex.org/W2174309130","https://openalex.org/W2341318667","https://openalex.org/W2341528187","https://openalex.org/W2471678645","https://openalex.org/W2516707548","https://openalex.org/W2594656819","https://openalex.org/W2607927535","https://openalex.org/W2613967729","https://openalex.org/W2753424941","https://openalex.org/W2755702751","https://openalex.org/W2763821861","https://openalex.org/W2780314033","https://openalex.org/W2782801008","https://openalex.org/W2787613668","https://openalex.org/W2798097728","https://openalex.org/W2800210950","https://openalex.org/W2801012453","https://openalex.org/W2803272491","https://openalex.org/W2885013511","https://openalex.org/W2903298537","https://openalex.org/W2909240857","https://openalex.org/W2949699261","https://openalex.org/W2963656031","https://openalex.org/W3005729266","https://openalex.org/W3045675435","https://openalex.org/W3101998545","https://openalex.org/W4236338163","https://openalex.org/W6676885845","https://openalex.org/W6684314024","https://openalex.org/W6754206849","https://openalex.org/W6757676388","https://openalex.org/W6763414456"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2998478967","https://openalex.org/W3012240659","https://openalex.org/W2384651879","https://openalex.org/W2044270176","https://openalex.org/W2374828682","https://openalex.org/W2153116791","https://openalex.org/W2388733570","https://openalex.org/W4230530180","https://openalex.org/W1980033651"],"abstract_inverted_index":{"Face":[0],"anti-spoofing":[1,37],"is":[2,38,98,116,131,176],"becoming":[3],"increasingly":[4],"indispensable":[5],"for":[6,35,126],"face":[7,36,127],"recognition":[8],"systems,":[9],"which":[10,61],"are":[11],"vulnerable":[12],"to":[13,51,76,103],"various":[14],"spoofing":[15],"attacks":[16],"performed":[17],"using":[18,146],"fake":[19],"photos":[20],"and":[21,59,143,166],"videos.":[22],"In":[23],"this":[24],"paper,":[25],"a":[26,77],"novel":[27],"\u201cLDN-TOP":[28],"representation":[29,110,122],"followed":[30],"by":[31],"ProCRC":[32],"classification\u201d":[33],"pipeline":[34],"proposed.":[39],"We":[40],"use":[41],"local":[42,81],"directional":[43,82],"number":[44,83],"pattern":[45,66,84],"(LDN)":[46],"with":[47,108,161],"the":[48,64,105,113,119],"derivative-Gaussian":[49],"mask":[50],"capture":[52,70],"detailed":[53],"appearance":[54],"information":[55,97],"resisting":[56],"illumination":[57],"variations":[58],"noises,":[60],"can":[62,157],"influence":[63],"texture":[65],"distribution.":[67],"To":[68],"further":[69],"motion":[71],"information,":[72],"we":[73],"extend":[74],"LDN":[75],"spatial-temporal":[78],"variant":[79],"named":[80],"from":[85,100],"three":[86,134],"orthogonal":[87],"planes":[88],"(LDN-":[89],"TOP).":[90],"The":[91,150,171],"multi-scale":[92],"LDN-":[93],"TOP":[94],"capturing":[95],"complete":[96],"extracted":[99],"color":[101],"images":[102],"generate":[104],"feature":[106,114],"vector":[107,115],"powerful":[109],"capacity.":[111],"Finally,":[112],"fed":[117],"into":[118],"probabilistic":[120],"collaborative":[121],"based":[123],"classifier":[124],"(ProCRC)":[125],"anti-spoofing.":[128],"Our":[129],"method":[130,156],"evaluated":[132],"on":[133,164,169,173],"challenging":[135],"public":[136],"datasets,":[137],"namely":[138],"CASIA":[139,165],"FASD,":[140],"Replay-Attack":[141,174],"database,":[142],"UVAD":[144],"database":[145,175],"sequence-based":[147],"evaluation":[148],"protocol.":[149],"experimental":[151],"results":[152],"show":[153],"that":[154],"our":[155],"achieve":[158],"promising":[159],"performance":[160,172],"0.37%":[162],"EER":[163],"5.73%":[167],"HTER":[168],"UVAD.":[170],"also":[177],"competitive.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4}],"updated_date":"2026-02-24T08:05:00.420983","created_date":"2025-10-10T00:00:00"}
