{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:36:40Z","timestamp":1772642200207,"version":"3.50.1"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030687793","type":"print"},{"value":"9783030687809","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68780-9_44","type":"book-chapter","created":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T17:04:13Z","timestamp":1614186253000},"page":"560-572","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Differential Morphed Face Detection Using Deep Siamese Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3541-0918","authenticated-orcid":false,"given":"Sobhan","family":"Soleymani","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9564-951X","authenticated-orcid":false,"given":"Baaria","family":"Chaudhary","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1084-6224","authenticated-orcid":false,"given":"Ali","family":"Dabouei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4539-7588","authenticated-orcid":false,"given":"Jeremy","family":"Dawson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8730-627X","authenticated-orcid":false,"given":"Nasser M.","family":"Nasrabadi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,2,25]]},"reference":[{"key":"44_CR1","unstructured":"Utrecht ecvp face database. https:\/\/pics.stir.ac.uk\/2D_face_sets.html"},{"key":"44_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11744023_32","volume-title":"Computer Vision \u2013 ECCV 2006","author":"H Bay","year":"2006","unstructured":"Bay, H., Tuytelaars, T., Van Gool, L.: SURF: speeded up robust features. In: Leonardis, A., Bischof, H., Pinz, A. (eds.) ECCV 2006. LNCS, vol. 3951, pp. 404\u2013417. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11744023_32"},{"key":"44_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6","volume-title":"Face Recognition Across the Imaging Spectrum","year":"2016","unstructured":"Bourlai, T. (ed.): Face Recognition Across the Imaging Spectrum. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-28501-6"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Bromley, J., Guyon, I., LeCun, Y., S\u00e4ckinger, E., Shah, R.: Signature verification using a \u201csiamese\u201d time delay neural network. In: Advances in neural information processing systems, pp. 737\u2013744 (1994)","DOI":"10.1142\/9789812797926_0003"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Cao, Q., Shen, L., Xie, W., Parkhi, O.M., Zisserman, A.: Vggface2: a dataset for recognising faces across pose and age. In: 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), pp. 67\u201374. IEEE (2018)","DOI":"10.1109\/FG.2018.00020"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Damer, N., Boutros, F., Saladie, A.M., Kirchbuchner, F., Kuijper, A.: Realistic dreams: cascaded enhancement of GAN-generated images with an example in face morphing attacks. In: 10th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2019 (2019)","DOI":"10.1109\/BTAS46853.2019.9185994"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Damer, N., Saladie, A.M., Braun, A., Kuijper, A.: Morgan: recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In: 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u201310 (2018)","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"44_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-030-30645-8_32","volume-title":"Image Analysis and Processing \u2013 ICIAP 2019","author":"L Debiasi","year":"2019","unstructured":"Debiasi, L., et al.: On the detection of GAN-based face morphs using established morph detectors. In: Ricci, E., Rota Bul\u00f3, S., Snoek, C., Lanz, O., Messelodi, S., Sebe, N. (eds.) ICIAP 2019. LNCS, vol. 11752, pp. 345\u2013356. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30645-8_32"},{"key":"44_CR9","unstructured":"Dumoulin, V., et al.: Adversarially learned inference. arXiv preprint arXiv:1606.00704 (2016)"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics, pp. 1\u20137 (2014)","DOI":"10.1109\/BTAS.2014.6996240"},{"issue":"4","key":"44_CR11","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/TIFS.2017.2777340","volume":"13","author":"M Ferrara","year":"2017","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. IEEE Trans. Inf. Forensics Secur. 13(4), 1008\u20131017 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: Face demorphing in the presence of facial appearance variations. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 2365\u20132369. IEEE (2018)","DOI":"10.23919\/EUSIPCO.2018.8553430"},{"key":"44_CR13","unstructured":"Frontex, R.: Best practice operational guidelines for automated border control (abc) systems. European Agency Manage. Oper. Cooperation Res. Dev. Unit 9(05), 2013 (2012) Accessed https:\/\/bit.ly\/2KYBXhz"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Hadsell, R., Chopra, S., LeCun, Y.: Dimensionality reduction by learning an invariant mapping. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2006), vol. 2, pp. 1735\u20131742. IEEE (2006)","DOI":"10.1109\/CVPR.2006.100"},{"key":"44_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-491-1","volume-title":"Natural Image Statistics: A probabilistic Approach to Early Computational Vision","author":"A Hyv\u00e4rinen","year":"2009","unstructured":"Hyv\u00e4rinen, A., Hurri, J., Hoyer, P.O.: Natural Image Statistics: A probabilistic Approach to Early Computational Vision, vol. 39. Springer, New York (2009)"},{"key":"44_CR16","unstructured":"ICAO, D.: 9303-machine readable travel documents-part 9: deployment of biometric identification and electronic storage of data in emrtds. International Civil Aviation Organization (ICAO) (2015)"},{"key":"44_CR17","unstructured":"Kannala, J., Rahtu, E.: Bsif: Binarized statistical image features. In: Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012), pp. 1363\u20131366 (2012)"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Liao, S., Zhu, X., Lei, Z., Zhang, L., Li, S.Z.: Learning multi-scale block local binary patterns for face recognition. In: International Conference on Biometrics, pp. 828\u2013837 (2007)","DOI":"10.1007\/978-3-540-74549-5_87"},{"key":"44_CR19","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Large-scale celebfaces attributes (celeba) dataset (2018) Accessed 15 Aug 2018"},{"key":"44_CR20","first-page":"91","volume":"2","author":"G Lowe","year":"2004","unstructured":"Lowe, G.: Sift-the scale invariant feature transform. Int. J 2, 91\u2013110 (2004)","journal-title":"Int. J"},{"key":"44_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.5220\/0006131100390050","volume":"7","author":"A Makrushin","year":"2017","unstructured":"Makrushin, A., Neubert, T., Dittmann, J.: Automatic generation and detection of visually faultless facial morphs. Int. Conf. Comput. Vis. Theor. Appl. 7, 39\u201350 (2017)","journal-title":"Int. Conf. Comput. Vis. Theor. Appl."},{"key":"44_CR22","unstructured":"Mallick, S.: Face morph using opencv-c++\/python (2016)"},{"key":"44_CR23","doi-asserted-by":"crossref","unstructured":"Ngan, M., Grother, P., Hanaoka, K., Kuo, J.: Face recognition vendor test (frvt) part 4: Morph performance of automated face morph detection. National Institute of Technology (NIST), Technical Report NISTIR 8292 (2020)","DOI":"10.6028\/NIST.IR.8292"},{"key":"44_CR24","doi-asserted-by":"crossref","unstructured":"Raghavendra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1\u20137 (2016)","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"44_CR25","doi-asserted-by":"crossref","unstructured":"Raghavendra, R., Raja, K.B., Venkatesh, S., Busch, C.: Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1822\u20131830 (2017)","DOI":"10.1109\/CVPRW.2017.228"},{"key":"44_CR26","doi-asserted-by":"crossref","unstructured":"Raghavendra, R., Raja, K., Venkatesh, S., Busch, C.: Face morphing versus face averaging: vulnerability and detection. In: 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 555\u2013563. IEEE (2017)","DOI":"10.1109\/BTAS.2017.8272742"},{"issue":"3","key":"44_CR27","doi-asserted-by":"publisher","first-page":"e0173319","DOI":"10.1371\/journal.pone.0173319","volume":"12","author":"DJ Robertson","year":"2017","unstructured":"Robertson, D.J., Kramer, R.S., Burton, A.M.: Fraudulent id using face morphs: experiments on human and automatic recognition. PLoS One 12(3), e0173319 (2017)","journal-title":"PLoS One"},{"key":"44_CR28","doi-asserted-by":"crossref","unstructured":"Scherhag, U., Rathgeb, C., Busch, C.: Performance variation of morphed face image detection algorithms across different datasets. In: 2018 International Workshop on Biometrics and Forensics (IWBF), pp. 1\u20136 (2018)","DOI":"10.1109\/IWBF.2018.8401562"},{"key":"44_CR29","doi-asserted-by":"crossref","unstructured":"Scherhag, U., Rathgeb, C., Busch, C.: Morph deterction from single face image: a multi-algorithm fusion approach. In: Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, pp. 6\u201312 (2018)","DOI":"10.1145\/3230820.3230822"},{"key":"44_CR30","doi-asserted-by":"crossref","unstructured":"Scherhag, U., Rathgeb, C., Busch, C.: Towards detection of morphed face images in electronic travel documents. In: 2018 13th IAPR International Workshop on Document Analysis Systems (DAS), pp. 187\u2013192 (2018)","DOI":"10.1109\/DAS.2018.11"},{"key":"44_CR31","doi-asserted-by":"crossref","unstructured":"Scherhag, U., Rathgeb, C., Merkle, J., Busch, C.: Deep face representations for differential morphing attack detection. arXiv preprint arXiv:2001.01202 (2020)","DOI":"10.1109\/TIFS.2020.2994750"},{"key":"44_CR32","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"44_CR33","doi-asserted-by":"crossref","unstructured":"Seibold, C., Samek, W., Hilsmann, A., Eisert, P.: Detection of face morphing attacks by deep learning. In: International Workshop on Digital Watermarking, pp. 107\u2013120 (2017)","DOI":"10.1007\/978-3-319-64185-0_9"},{"key":"44_CR34","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 618\u2013626 (2017)","DOI":"10.1109\/ICCV.2017.74"},{"key":"44_CR35","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.A.: Inception-v4, inception-resnet and the impact of residual connections on learning. In: Thirty-first AAAI conference on artificial intelligence (2017)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"44_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-319-64185-0_10","volume-title":"Digital Forensics and Watermarking","author":"L Wandzik","year":"2017","unstructured":"Wandzik, L., Garcia, R.V., Kaeding, G., Chen, X.: CNNs under attack: on the vulnerability of deep neural networks based face recognition to image morphing. In: Kraetzer, C., Shi, Y.-Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 121\u2013135. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64185-0_10"},{"issue":"8\u20139","key":"44_CR37","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/s003710050148","volume":"14","author":"G Wolberg","year":"1998","unstructured":"Wolberg, G.: Image morphing: a survey. Visual Comput. 14(8\u20139), 360\u2013372 (1998)","journal-title":"Visual Comput."},{"issue":"10","key":"44_CR38","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang, K., Zhang, Z., Li, Z., Qiao, Y.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. 23(10), 1499\u20131503 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"44_CR39","doi-asserted-by":"crossref","unstructured":"Zhou, B., Khosla, A., Lapedriza, A., Oliva, A., Torralba, A.: Learning deep features for discriminative localization. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2921\u20132929 (2016)","DOI":"10.1109\/CVPR.2016.319"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition. ICPR International Workshops and Challenges"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68780-9_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T20:11:48Z","timestamp":1724530308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68780-9_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030687793","9783030687809"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68780-9_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ICPR2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icpr2020.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}