{"id":"https://openalex.org/W3118584410","doi":"https://doi.org/10.1109/ijcb48548.2020.9304862","title":"Specular- and Diffuse-reflection-based Face Spoofing Detection for Mobile Devices","display_name":"Specular- and Diffuse-reflection-based Face Spoofing Detection for Mobile Devices","publication_year":2020,"publication_date":"2020-09-28","ids":{"openalex":"https://openalex.org/W3118584410","doi":"https://doi.org/10.1109/ijcb48548.2020.9304862","mag":"3118584410"},"language":"en","primary_location":{"id":"doi:10.1109/ijcb48548.2020.9304862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcb48548.2020.9304862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041006680","display_name":"Akinori F. Ebihara","orcid":"https://orcid.org/0000-0001-6192-757X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Akinori F. Ebihara","raw_affiliation_strings":["NEC Biometrics Research Laboratories"],"affiliations":[{"raw_affiliation_string":"NEC Biometrics Research Laboratories","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111368069","display_name":"K. Sakurai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kazuyuki Sakurai","raw_affiliation_strings":["NEC Biometrics Research Laboratories"],"affiliations":[{"raw_affiliation_string":"NEC Biometrics Research Laboratories","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028205677","display_name":"Hitoshi Imaoka","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hitoshi Imaoka","raw_affiliation_strings":["NEC Corporation"],"affiliations":[{"raw_affiliation_string":"NEC Corporation","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041006680"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3031,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.56662278,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10057","display_name":"Face and Expression Recognition","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8920536041259766},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7100904583930969},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.59688800573349},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.5579981803894043},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5445282459259033},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5381577610969543},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5131598114967346},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.4722275733947754},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.46408864855766296},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.45523762702941895},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.4105614721775055},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.36856725811958313},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.30129459500312805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14251446723937988}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8920536041259766},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7100904583930969},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.59688800573349},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.5579981803894043},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5445282459259033},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5381577610969543},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5131598114967346},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.4722275733947754},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.46408864855766296},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.45523762702941895},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4105614721775055},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.36856725811958313},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.30129459500312805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14251446723937988},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcb48548.2020.9304862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcb48548.2020.9304862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W56743589","https://openalex.org/W1704933117","https://openalex.org/W1770095230","https://openalex.org/W1889383825","https://openalex.org/W1979339361","https://openalex.org/W1982209341","https://openalex.org/W1983488873","https://openalex.org/W2003092530","https://openalex.org/W2012612618","https://openalex.org/W2063661788","https://openalex.org/W2086261219","https://openalex.org/W2125320497","https://openalex.org/W2136975665","https://openalex.org/W2140593870","https://openalex.org/W2153635508","https://openalex.org/W2157285372","https://openalex.org/W2159270577","https://openalex.org/W2163487272","https://openalex.org/W2164598857","https://openalex.org/W2302255633","https://openalex.org/W2493468541","https://openalex.org/W2511115389","https://openalex.org/W2762867765","https://openalex.org/W2783415177","https://openalex.org/W2797062860","https://openalex.org/W2802734296","https://openalex.org/W2886353803","https://openalex.org/W2907172176","https://openalex.org/W2927522063","https://openalex.org/W2963656031","https://openalex.org/W2963721962","https://openalex.org/W3101824741","https://openalex.org/W3210232381","https://openalex.org/W4241948780","https://openalex.org/W6602288617","https://openalex.org/W6637339757","https://openalex.org/W6684314024","https://openalex.org/W6751967555","https://openalex.org/W6761110810","https://openalex.org/W6803376173"],"related_works":["https://openalex.org/W2533239677","https://openalex.org/W2140593870","https://openalex.org/W4389545061","https://openalex.org/W3126377002","https://openalex.org/W2903861076","https://openalex.org/W2604576816","https://openalex.org/W2729608596","https://openalex.org/W2913345013","https://openalex.org/W2900020547","https://openalex.org/W2465785224"],"abstract_inverted_index":{"In":[0],"light":[1,59],"of":[2,21,88,120,159],"the":[3,18,61,73,94,111,117,149],"rising":[4],"demand":[5],"for":[6,17,48],"biometric-authentication":[7],"systems,":[8],"preventing":[9],"face":[10,22,30,113],"spoofing":[11],"attacks":[12],"is":[13,82,175],"a":[14,42,71,76,99,121],"critical":[15],"issue":[16],"safe":[19],"deployment":[20],"recognition":[23],"systems.":[24],"Here,":[25],"we":[26],"propose":[27],"an":[28,136,160],"efficient":[29],"presentation":[31],"attack":[32],"detection":[33],"(PAD)":[34],"algorithm":[35,63,151],"that":[36,97,115,158],"requires":[37],"minimal":[38],"hardware":[39],"and":[40,106,139,145],"only":[41],"small":[43],"database,":[44],"making":[45],"it":[46],"suitable":[47],"resource-constrained":[49],"devices":[50],"such":[51],"as":[52],"mobile":[53],"phones.":[54],"Utilizing":[55],"one":[56,68],"monocular":[57],"visible":[58],"camera,":[60],"proposed":[62,79,150],"takes":[64],"two":[65,86],"facial":[66],"photos,":[67],"taken":[69],"with":[70,126],"flash,":[72],"other":[74,130],"without":[75],"flash.":[77],"The":[78,173],"SpecDiff":[80,127],"descriptor":[81,128],"constructed":[83],"by":[84],"leveraging":[85],"types":[87],"reflection:":[89],"(i)":[90],"specular":[91],"reflections":[92,109],"from":[93,110],"iris":[95],"region":[96,114],"have":[98],"specific":[100],"intensity":[101],"distribution":[102],"depending":[103],"on":[104,134,140],"liveness,":[105],"(ii)":[107],"diffuse":[108],"entire":[112],"represents":[116],"3D":[118],"structure":[119],"subject's":[122],"face.":[123],"Classifiers":[124],"trained":[125],"outperforms":[129],"flash-based":[131],"PAD":[132],"algorithms":[133],"both":[135],"in-house":[137],"database":[138],"publicly":[141,176],"available":[142,177],"NUAA,":[143],"Replay-Attack,":[144],"SiW":[146],"databases.":[147],"Moreover,":[148],"achieves":[152],"statistically":[153],"significantly":[154],"better":[155],"accuracy":[156],"to":[157],"end-to-end,":[161],"deep":[162],"neural":[163],"network":[164],"classifier,":[165],"while":[166],"being":[167],"approximately":[168],"six-times":[169],"faster":[170],"execution":[171],"speed.":[172],"code":[174],"at":[178],"https://github.com/Akinori-F-Ebihara/SpecDiff-spoofing-detector.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
