{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:54:04Z","timestamp":1774968844440,"version":"3.50.1"},"reference-count":124,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"German Federal Ministry of Education and Research"},{"name":"Hessen State Ministry for Higher Education, Research and the Arts (HMWK), Center for Research in Security and Privacy"},{"name":"Federal Office of Information Security (BSI) through the FACETRUST Project"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2899367","type":"journal-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T19:58:55Z","timestamp":1550174335000},"page":"23012-23026","source":"Crossref","is-referenced-by-count":192,"title":["Face Recognition Systems Under Morphing Attacks: A Survey"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6280-048X","authenticated-orcid":false,"given":"Ulrich","family":"Scherhag","sequence":"first","affiliation":[]},{"given":"Christian","family":"Rathgeb","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Merkle","sequence":"additional","affiliation":[]},{"given":"Ralph","family":"Breithaupt","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/2629494","article-title":"Automating image morphing using structural similarity on a halfway domain","volume":"33","author":"liao","year":"2014","journal-title":"ACM Trans Graph"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2018.11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935087"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5220\/0006131100390050"},{"key":"ref31","article-title":"Face recognition jammer using image morphing","author":"wu","year":"2011"},{"key":"ref30","first-page":"1","article-title":"Image morphing using mass-spring system","author":"choi","year":"2011","journal-title":"Proc Int Conf Comput Graph Virtual Reality (CGVR)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2018.8401562"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935088"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-319-64185-0_9","article-title":"Detection of face morphing attacks by deep learning","author":"seibold","year":"2017","journal-title":"Digital Forensics and Watermarking"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64185-0_10"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/133994.134003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/218380.218501"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1179352.1141920"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459377"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.241"},{"key":"ref21","first-page":"2879","article-title":"Face detection, pose estimation, and landmark localization in the wild","author":"zhu","year":"2012","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1186\/1687-5281-2013-13"},{"key":"ref23","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"king","year":"2009","journal-title":"J Mach Learn Res"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2008.4813399"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/15922.15903"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553375"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/38.365004"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1399504.1360638"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12214"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1037\/1076-898X.5.4.339"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3758\/BF03193433"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2014.12.005"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2214050"},{"key":"ref55","first-page":"1","article-title":"No-reference perceptual quality assessment of JPEG compressed images","author":"wang","year":"2002","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.2003.1224741"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1530348"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-012-0734-8"},{"key":"ref4","first-page":"6","article-title":"Deep face recognition","author":"parkhi","year":"2015","journal-title":"Proc Brit Mach Vis Conf (BMVC)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0079"},{"key":"ref8","first-page":"156","article-title":"Image morphing algorithm: A survey","volume":"5","author":"patel","year":"2015","journal-title":"Int J Comput Appl"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2827389"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s003710050148"},{"key":"ref9","year":"2017","journal-title":"Information Technology&#x2014;Biometric Presentation Attack Detection&#x2014;Part 3 Testing and Reporting"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639345"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.397"},{"key":"ref48","article-title":"MorGAN: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network","author":"damer","year":"2018","journal-title":"IEEE Int Conf Biometrics Theory Appl Syst (BTAS)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272693"},{"key":"ref42","first-page":"93","article-title":"Face morphing using 3D-aware appearance optimization","author":"yang","year":"2012","journal-title":"Proc Graph Interface"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/237170.237196"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540159"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.1996.557254"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1117\/12.666448"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272742"},{"key":"ref71","article-title":"Performance of automated facial morph detection and morph resistant face recognition algorithms","author":"ngan","year":"2018"},{"key":"ref70","year":"2006","journal-title":"Information Technology&#x2014;Biometric Performance Testing and Reporting&#x2014;Part 1 Principles and Framework"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553317"},{"key":"ref77","article-title":"Utrecht ECVP","year":"2008","journal-title":"Proc 37th Eur Conf Vis Perception (ECVP)"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272754"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-319-64185-0_11","article-title":"Topological data analysis for image tampering detection","author":"asaad","year":"2017","journal-title":"Digital Forensics and Watermarking"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083244"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3230820.3230822"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0720(199706)11:3<211::AID-ACP430>3.0.CO;2-O"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1490"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1037\/a0013464"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1002\/acp.2965"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0103510"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173319"},{"key":"ref66","article-title":"Picture database of morphed faces (MoFa)","author":"j\u00e4ger","year":"2005"},{"key":"ref67","article-title":"Best practices in testing and reporting performance of biometric devices","author":"mansfield","year":"2002"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935079"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-932-1"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0144"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"ref109","article-title":"Openface: A general-purpose face recognition library with mobile applications","author":"amos","year":"2016"},{"key":"ref95","first-page":"1","article-title":"Accurate and robust neural networks for security related applications exampled by face morphing attacks","author":"seibold","year":"2018","journal-title":"Proc Comput Vis Pattern Recognit"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/S1007-0214(11)70032-3"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.228"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","article-title":"Speeded-up robust features (SURF)","volume":"110","author":"bay","year":"2008","journal-title":"Comput Vis Image Understand"},{"key":"ref93","article-title":"The CAS-PEAL large-scale chinese face database and baseline evaluations","author":"gao","year":"2004"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553430"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.389"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777340"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.322"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1007\/978-3-319-94211-7_48","article-title":"Detecting morphed face images using facial landmarks","author":"scherhag","year":"2018","journal-title":"Proc Int Conf Image Signal Process (ICISP)"},{"key":"ref103","first-page":"1363","article-title":"BSIF: Binarized statistical image features","author":"kannala","year":"2012","journal-title":"Proc Int Conf Pattern Recognit (ICPR)"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00067-4"},{"key":"ref111","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/3206004.3206018","article-title":"Generalized Benford&#x2019;s law for blind detection of morphed face images","author":"makrushin","year":"2018","journal-title":"Proc 1st ACM Workshop Inf Hiding Multimedia Secur (IH & MMSec)"},{"key":"ref112","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"Proc Comput Vis Pattern Recognit"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-319-64185-0_8","article-title":"Face morphing detection: An approach based on image degradation analysis","author":"neubert","year":"2017","journal-title":"Digital Forensics and Watermarking"},{"key":"ref98","first-page":"59","article-title":"The PUT face database","volume":"13","author":"kasinski","year":"2008","journal-title":"Image Process Commun"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-009-0417-2"},{"key":"ref96","first-page":"211","article-title":"A 3D facial expression database for facial behavior research","author":"yin","year":"2006","journal-title":"Proc IEEE 7th Int Conf Autom Face Gesture Recognit"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-014-0532-5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s41235-018-0113-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553599"},{"key":"ref13","year":"2015","journal-title":"ICAO Doc 9303 Machine Readable Travel Documents&#x2014;Part 9 Deployment of Biometric Identification and Electronic Storage of Data in MRTDs"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"ref15","first-page":"92","article-title":"Finding face features","author":"craw","year":"1992","journal-title":"Vision Computer"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2011-3"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1006\/cviu.1995.1004","article-title":"Active shape models-their training and application","volume":"61","author":"cootes","year":"1995","journal-title":"Comput Vis Image Understand"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553018"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2427849"},{"key":"ref17","first-page":"456","article-title":"Face recognition by elastic bunch graph matching","author":"wiskott","year":"1997","journal-title":"Computer Analysis of Images and Patterns"},{"key":"ref81","article-title":"The AR face database","author":"mart\u00ednez","year":"1998"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/34.927467"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2018.8401555"},{"key":"ref119","author":"menezes","year":"2001","journal-title":"Handbook of Applied Cryptography"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24694-7_70"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123152"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref115","year":"2005"},{"key":"ref120","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-5225-0105-3","author":"gupta","year":"2016","journal-title":"Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security"},{"key":"ref89","first-page":"1","article-title":"Detecting face morphing attacks with collaborative representation of steerable features","author":"ramachandra","year":"2018","journal-title":"Proc 3rd Comput Vis Image Process (CVIP)"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5537-5"},{"key":"ref122","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/11527923_17","article-title":"Fingerprint quality indices for predicting authentication performance","author":"chen","year":"2005","journal-title":"Audio- and Video-Based Biometric Person Authentication"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2041658"},{"key":"ref85","article-title":"PRNU variance analysis for morphed face image detection","author":"debiasi","year":"2018","journal-title":"IEEE Int Conf Biometrics Theory Appl Syst (BTAS)"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2018.8486607"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.11.005"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553116"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08642312.pdf?arnumber=8642312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T06:54:02Z","timestamp":1643266442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8642312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":124,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2899367","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}