{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:05:59Z","timestamp":1761663959376,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030306441"},{"type":"electronic","value":"9783030306458"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30645-8_32","type":"book-chapter","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T08:08:15Z","timestamp":1567584495000},"page":"345-356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["On the Detection of GAN-Based Face Morphs Using Established Morph Detectors"],"prefix":"10.1007","author":[{"given":"Luca","family":"Debiasi","sequence":"first","affiliation":[]},{"given":"Naser","family":"Damer","sequence":"additional","affiliation":[]},{"given":"Alexandra Mosegu\u00ed\u00ad","family":"Saladi\u00e9","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Rathgeb","sequence":"additional","affiliation":[]},{"given":"Ulrich","family":"Scherhag","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Kirchbuchner","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,2]]},"reference":[{"key":"32_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/978-3-030-12939-2_36","volume-title":"Pattern Recognition","author":"N Damer","year":"2019","unstructured":"Damer, N., et al.: Detecting face morphing attacks by analyzing the directed distances of facial landmarks shifts. In: Brox, T., Bruhn, A., Fritz, M. (eds.) GCPR 2018. LNCS, vol. 11269, pp. 518\u2013534. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12939-2_36"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Damer, N., Saladie, A.M., Braun, A., Kuijper, A.: MorGAN: recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems (BTAS 2018). IEEE (2018)","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Debiasi, L., Rathgeb, C., Scherhag, U., Uhl, A., Busch, C.: PRNU variance analysis for morphed face image detection. In: Proceedings of the IEEE 9th International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2018), Los Angeles, California, USA, pp. 1\u20138, October 2018","DOI":"10.1109\/BTAS.2018.8698576"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Debiasi, L., Scherhag, U., Rathgeb, C., Uhl, A., Busch, C.: PRNU-based detection of morphed face images. In: 2018 International Workshop on Biometrics and Forensics (IWBF 2018), pp. 1\u20137, June 2018","DOI":"10.1109\/IWBF.2018.8401555"},{"issue":"4","key":"32_CR5","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1049\/iet-bmt.2016.0117","volume":"6","author":"L Debiasi","year":"2017","unstructured":"Debiasi, L., Uhl, A.: PRNU enhancement effects on biometric source sensor attribution. IET Biometrics 6(4), 256\u2013265 (2017)","journal-title":"IET Biometrics"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics (IJCB 2014), pp. 1\u20137. IEEE (2014)","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-28501-6_9","volume-title":"Face Recognition Across the Imaging Spectrum","author":"M Ferrara","year":"2016","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: On the effects of image alterations on face recognition accuracy. In: Bourlai, T. (ed.) Face Recognition Across the Imaging Spectrum, pp. 195\u2013222. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-28501-6_9"},{"issue":"4","key":"32_CR8","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/TIFS.2017.2777340","volume":"13","author":"M Ferrara","year":"2018","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. IEEE Trans. Inf. Forensics Secur. 13(4), 1008\u20131017 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"32_CR9","unstructured":"ISO\/IEC JTC1 SC37 Biometrics: ISO\/IEC IS 30107\u20133:2017, IT - Biometric presentation attack detection - Part 3: Testing and Reporting"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2015.10.005","volume":"40","author":"L Liu","year":"2016","unstructured":"Liu, L., Hua, Y., Zhao, Q., Huang, H., Bovik, A.C.: Blind image quality assessment by relative gradient statistics and adaboosting neural network. Sig. Process. Image Commun. 40, 1\u201315 (2016)","journal-title":"Sig. Process. Image Commun."},{"issue":"8","key":"32_CR11","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1016\/j.image.2014.06.006","volume":"29","author":"L Liu","year":"2014","unstructured":"Liu, L., Liu, B., Huang, H., Bovik, A.C.: No-reference image quality assessment based on spatial and spectral entropies. Sig. Process. Image Commun. 29(8), 856\u2013863 (2014)","journal-title":"Sig. Process. Image Commun."},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of International Conference on Computer Vision (ICCV 2015), December 2015","DOI":"10.1109\/ICCV.2015.425"},{"issue":"12","key":"32_CR13","doi-asserted-by":"publisher","first-page":"4695","DOI":"10.1109\/TIP.2012.2214050","volume":"21","author":"A Mittal","year":"2012","unstructured":"Mittal, A., Moorthy, A.K., Bovik, A.C.: No-reference image quality assessment in the spatial domain. IEEE Trans. Image Process. 21(12), 4695\u20134708 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"32_CR14","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1049\/iet-bmt.2017.0079","volume":"7","author":"A Mohammadi","year":"2018","unstructured":"Mohammadi, A., Bhattacharjee, S., Marcel, S.: Deeply vulnerable: a study of the robustness of face recognition to presentation attacks. IET Biometrics 7(1), 15\u201326 (2018)","journal-title":"IET Biometrics"},{"issue":"5","key":"32_CR15","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/LSP.2010.2043888","volume":"17","author":"AK Moorthy","year":"2010","unstructured":"Moorthy, A.K., Bovik, A.C.: A two-step framework for constructing blind image quality indices. IEEE Signal Process. Lett. 17(5), 513\u2013516 (2010)","journal-title":"IEEE Signal Process. Lett."},{"key":"32_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-64185-0_8","volume-title":"Digital Forensics and Watermarking","author":"T Neubert","year":"2017","unstructured":"Neubert, T.: Face morphing detection: an approach based on image degradation analysis. In: Kraetzer, C., Shi, Y.-Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 93\u2013106. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64185-0_8"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Face morphing versus face averaging: Vulnerability and detection. In: IEEE International Joint Conference on Biometrics (IJCB 2017), pp. 555\u2013563. IEEE (2017)","DOI":"10.1109\/BTAS.2017.8272742"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR, pp. 1822\u20131830. IEEE Computer Society (2017)","DOI":"10.1109\/CVPRW.2017.228"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Ramachandra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: 8th IEEE International Conference on Biometrics Theory, Applications and Systems (BTAS 2016), pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/BTAS.2016.7791169"},{"issue":"3","key":"32_CR20","first-page":"1","volume":"12","author":"DJ Robertson","year":"2017","unstructured":"Robertson, D.J., Kramer, R.S.S., Burton, A.M.: Fraudulent id using face morphs: experiments on human and automatic recognition. PLoS ONE 12(3), 1\u201312 (2017)","journal-title":"PLoS ONE"},{"key":"32_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-319-94211-7_48","volume-title":"Image and Signal Processing","author":"U Scherhag","year":"2018","unstructured":"Scherhag, U., Budhrani, D., Gomez-Barrero, M., Busch, C.: Detecting morphed face images using facial landmarks. In: Mansouri, A., El Moataz, A., Nouboud, F., Mammass, D. (eds.) ICISP 2018. LNCS, vol. 10884, pp. 444\u2013452. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94211-7_48"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Scherhag, U., et al.: Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: International Conference of the Biometrics Special Interest Group (BIOSIG 2017), pp. 1\u201312 (2017)","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Scherhag, U., Ramachandra, R., Raja, K.B., Gomez-Barrero, M., Rathgeb, C., Busch, C.: On the vulnerability of face recognition systems towards morphed face attacks. In: 5th International Workshop on Biometrics and Forensics (IWBF 2017), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/IWBF.2017.7935088"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Scherhag, U., Rathgeb, C., Busch, C.: Towards detection of morphed face images in electronic travel documents. In: 13th IAPR International Workshop on Document Analysis Systems (DAS 2018), pp. 187\u2013192. IEEE Computer Society (2018)","DOI":"10.1109\/DAS.2018.11"}],"container-title":["Lecture Notes in Computer Science","Image Analysis and Processing \u2013 ICIAP 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30645-8_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:05:41Z","timestamp":1693785941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-30645-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030306441","9783030306458"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30645-8_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image Analysis and Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Trento","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciap2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/event.unitn.it\/iciap2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"207","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"117","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}