{"id":"https://openalex.org/W7124170397","doi":"https://doi.org/10.18420/biosig_2025_006","title":"Online Augmentation for Presentation Attack Detection on ID Cards","display_name":"Online Augmentation for Presentation Attack Detection on ID Cards","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7124170397","doi":"https://doi.org/10.18420/biosig_2025_006"},"language":"en","primary_location":{"id":"doi:10.18420/biosig_2025_006","is_oa":true,"landing_page_url":"https://doi.org/10.18420/biosig_2025_006","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/biosig_2025_006","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083737530","display_name":"F\u00e9lix Brezo Fern\u00e1ndez","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Fern\u00e1ndez, F\u00e9lix","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017736954","display_name":"Juan Tapia","orcid":"https://orcid.org/0000-0001-9159-4075"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tapia, Juan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123029765","display_name":"Juan Manuel Esp\u00edn","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Esp\u00edn, Juan Manuel","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5123014580","display_name":"Mario Nieto","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nieto, Mario","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083737530"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.69823368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.18449999392032623,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.18449999392032623,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.15049999952316284,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.10570000112056732,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5565000176429749},{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.5472999811172485},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5422999858856201},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.42320001125335693},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.35589998960494995},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.34310001134872437},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.34200000762939453}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7433000206947327},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5565000176429749},{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.5472999811172485},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5422999858856201},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44119998812675476},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.42320001125335693},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4146000146865845},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.35589998960494995},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.34310001134872437},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.34200000762939453},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.33629998564720154},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.32919999957084656},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2750000059604645},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.273499995470047},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.2685999870300293},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/biosig_2025_006","is_oa":true,"landing_page_url":"https://doi.org/10.18420/biosig_2025_006","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/biosig_2025_006","is_oa":true,"landing_page_url":"https://doi.org/10.18420/biosig_2025_006","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.40364763140678406,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,78],"work":[1,79],"proposes":[2],"a":[3,28,74,131,135],"Presentation":[4],"of":[5,17,23,36,64,67,121],"Attack":[6],"Detection":[7],"on":[8,13,130],"ID":[9,71,76],"Card":[10],"systems,":[11],"focusing":[12],"improving":[14],"the":[15,34,65,68,90,102,106,119,127],"detection":[16],"manual":[18],"composite":[19,86,98],"attacks.":[20],"These":[21],"kinds":[22],"attacks":[24,99],"are":[25],"used":[26],"in":[27,39,105],"remote":[29],"verification":[30],"system":[31],"to":[32,41,73,84],"impersonate":[33],"identity":[35],"one":[37],"subject":[38],"order":[40],"obtain":[42],"benefits.":[43],"For":[44],"this":[45],"purpose,":[46],"relevant":[47],"text":[48],"can":[49,59],"be":[50,60],"modified,":[51],"copied,":[52],"and":[53,56,93,125,134],"pasted.":[54],"Faces":[55],"other":[57],"areas":[58],"manually":[61],"changed":[62],"because":[63],"alignment":[66],"originally":[69],"issued":[70],"card":[72],"fake":[75],"card.":[77],"proposed":[80],"an":[81],"\u201conline\u201d":[82],"methodology":[83],"create":[85],"attack":[87],"images":[88],"during":[89],"training":[91],"process":[92],"shows":[94],"that":[95,117],"using":[96],"automatic":[97],"may":[100],"reduce":[101],"error":[103],"rate":[104],"PAD":[107],"system.":[108],"To":[109],"demonstrate":[110],"it,":[111],"three":[112],"experiments":[113],"were":[114],"set":[115],"up":[116],"compared":[118],"performance":[120],"models":[122],"trained":[123],"with":[124],"without":[126],"aforementioned":[128],"technique":[129],"private":[132],"dataset":[133],"cross-evaluation":[136],"dataset.":[137]},"counts_by_year":[],"updated_date":"2026-01-15T23:21:31.212559","created_date":"2026-01-15T00:00:00"}
