{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:46:43Z","timestamp":1771458403578,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319641843","type":"print"},{"value":"9783319641850","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64185-0_9","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:08:07Z","timestamp":1500970087000},"page":"107-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":87,"title":["Detection of Face Morphing Attacks by Deep Learning"],"prefix":"10.1007","author":[{"given":"Clemens","family":"Seibold","sequence":"first","affiliation":[]},{"given":"Wojciech","family":"Samek","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Hilsmann","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Eisert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"9_CR1","unstructured":"Spreeuwers, L.J., Hendrikse, A.J., Gerritsen, K.J.: Evaluation of automatic face recognition for automatic border control on actual data recorded of travellers at schiphol airport. In: Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG), 1\u20136 September 2012"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics, 1\u20137 September 2014","DOI":"10.1109\/BTAS.2014.6996240"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/TSP.2004.839932","volume":"53","author":"AC Popescu","year":"2005","unstructured":"Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Sig. Process. 53(2), 758\u2013767 (2005)","journal-title":"IEEE Trans. Sig. Process."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Kirchner, M., Gloe, T.: On resampling detection in re-compressed images. In: 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), 21\u201325 December 2009","DOI":"10.1109\/WIFS.2009.5386489"},{"key":"9_CR5","first-page":"754110\u2013754110","volume":"7541","author":"M Kirchner","year":"2010","unstructured":"Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. Proc. SPIE 7541, 754110\u2013754110\u201312 (2010)","journal-title":"Proc. SPIE"},{"key":"9_CR6","unstructured":"Luk\u00e1\u0161, J., Fridrich, J.: Estimation of primary quantization matrix in double compressed JPEG images. In: Proceedings of DFRWS (2003)"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIFS.2008.2012215","volume":"4","author":"H Farid","year":"2009","unstructured":"Farid, H.: Exposing digital forgeries from JPEG ghosts. IEEE Trans. Inf. Forensics Secur. 4(1), 154\u2013160 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-540-77370-2_21","volume-title":"Information Hiding","author":"MK Johnson","year":"2007","unstructured":"Johnson, M.K., Farid, H.: Exposing digital forgeries through specular highlights on the eye. In: Furon, T., Cayre, F., Do\u00ebrr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 311\u2013325. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-77370-2_21"},{"issue":"5","key":"9_CR9","doi-asserted-by":"publisher","first-page":"165:1","DOI":"10.1145\/2629646","volume":"33","author":"E Kee","year":"2014","unstructured":"Kee, E., O\u2019brien, J.F., Farid, H.: Exposing photo manipulation from shading and shadows. ACM Trans. Graph. 33(5), 165:1\u2013165:21 (2014)","journal-title":"ACM Trans. Graph."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Makrushin, A., Neubert, T., Dittmann, J.: Automatic generation and detection of visually faultless facial morphs. In: Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), pp. 39\u201350 (2017)","DOI":"10.5220\/0006131100390050"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Raghavendra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: 8th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, Niagara Falls, NY, USA, pp. 1\u20137, 6\u20139 September 2016","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"9_CR12","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems 25. Curran Associates, Inc., pp. 1097\u20131105 (2012)"},{"key":"9_CR13","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. CoRR abs\/1409.1556 (2014)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A.: Going deeper with convolutions. In: Computer Vision and Pattern Recognition (CVPR) (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Bayar, B., Stamm, M.C.: A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, New York, NY, USA, pp. 5\u201310. ACM (2016)","DOI":"10.1145\/2909827.2930786"},{"key":"9_CR16","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755\u20131758 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2014, Computer Society, pp. 1867\u20131874. IEEE, Washington, DC (2014)","DOI":"10.1109\/CVPR.2014.241"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Beier, T., Neely, S.: Feature-based image metamorphosis. In: Proceedings of the 19th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1992, pp. 35\u201342. ACM, New York (1992)","DOI":"10.1145\/133994.134003"},{"key":"9_CR19","unstructured":"Delaunay, B.: Sur la sphere vide. Izv. Akad. Nauk SSSR, Otdelenie Matematicheskii i Estestvennyka Nauk 7, 793\u2013800 (1934)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"P\u00e9rez, P., Gangnet, M., Blake, A.: Poisson image editing. In: ACM SIGGRAPH 2003 Papers, SIGGRAPH 2003, pp. 313\u2013318. ACM, New York (2003)","DOI":"10.1145\/1201775.882269"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Prestele, B., Schneider, D.C., Eisert, P.: System for the automated segmentation of heads from arbitrary background. In: ICIP, pp. 3257\u20133260. IEEE (2011)","DOI":"10.1109\/ICIP.2011.6116364"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Paier, W., Kettern, M., Hilsmann, A., Eisert, P.: Video-based facial re-animation. In: Proceedings of the 12th European Conference on Visual Media Production, London, United Kingdom, pp. 4:1\u20134:10, 24\u201325 November 2015","DOI":"10.1145\/2824840.2824843"},{"key":"9_CR23","unstructured":"Neurotechnology Inc.: Verilook 9.0\/megamatcher 9.0 faces identification technology (2017). http:\/\/www.neurotechnology.com\/"},{"key":"9_CR24","unstructured":"FRONTEX - Research and Development Unit: Best practice technical guidelines for automated border control (abc) systems - v2.0 (2012)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T.: Caffe: convolutional architecture for fast feature embedding. arXiv preprint (2014). arXiv:1408.5093","DOI":"10.1145\/2647868.2654889"},{"key":"9_CR26","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS10). Society for Artificial Intelligence and Statistics (2010)"},{"issue":"3","key":"9_CR27","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TIFS.2011.2119314","volume":"6","author":"MC Stamm","year":"2011","unstructured":"Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050\u20131065 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-53465-7_1","volume-title":"Digital Forensics and Watermarking","author":"J Yu","year":"2017","unstructured":"Yu, J., Zhan, Y., Yang, J., Kang, X.: A multi-purpose image counter-anti-forensic method using convolutional neural networks. In: Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. (eds.) IWDW 2016. LNCS, vol. 10082, pp. 3\u201315. Springer, Cham (2017). doi:10.1007\/978-3-319-53465-7_1"},{"issue":"4","key":"9_CR29","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TIFS.2008.2008214","volume":"3","author":"M Kirchner","year":"2008","unstructured":"Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Secur. 3(4), 582\u2013592 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Lapuschkin, S., Binder, A., Montavon, G., M\u00fcller, K.R., Samek, W.: Analyzing classifiers: fisher vectors and deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2912\u20132920 (2016)","DOI":"10.1109\/CVPR.2016.318"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64185-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:07:57Z","timestamp":1709831277000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-64185-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319641843","9783319641850"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64185-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"26 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Magdeburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2017.cs.ovgu.de\/cms\/front_content.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}