{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T03:10:37Z","timestamp":1773112237718,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825017","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"2244-2253","source":"Crossref","is-referenced-by-count":5,"title":["IDNet: A Novel Identity Document Dataset via Few-Shot and Quality-Driven Synthetic Data Generation"],"prefix":"10.1109","author":[{"given":"Lulu","family":"Xie","sequence":"first","affiliation":[{"name":"Arizona State University,Department of Homeland Security-Center of Accelerated Operational Excellence"}]},{"given":"Yancheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Arizona State University,Department of Homeland Security-Center of Accelerated Operational Excellence"}]},{"given":"Hong","family":"Guan","sequence":"additional","affiliation":[{"name":"Arizona State University,Department of Homeland Security-Center of Accelerated Operational Excellence"}]},{"given":"Soham","family":"Nag","sequence":"additional","affiliation":[{"name":"Arizona State University,Department of Homeland Security-Center of Accelerated Operational Excellence"}]},{"given":"Rajeev","family":"Goel","sequence":"additional","affiliation":[{"name":"Arizona State University,Department of Homeland Security-Center of Accelerated Operational Excellence"}]},{"given":"Niranjan","family":"Swamy","sequence":"additional","affiliation":[{"name":"Arizona State University,Department of Homeland Security-Center of Accelerated Operational Excellence"}]},{"given":"Yingzhen","family":"Yang","sequence":"additional","affiliation":[{"name":"Arizona State University,Department of Homeland Security-Center of Accelerated Operational Excellence"}]},{"given":"Chaowei","family":"Xiao","sequence":"additional","affiliation":[{"name":"University of Wisconsin,Madison"}]},{"given":"Jonathan","family":"Prisby","sequence":"additional","affiliation":[{"name":"Directorate,Department of Homeland Security&#x2013;Science and Technology"}]},{"given":"Ross","family":"Maciejewski","sequence":"additional","affiliation":[{"name":"Arizona State University,Department of Homeland Security-Center of Accelerated Operational Excellence"}]},{"given":"Jia","family":"Zou","sequence":"additional","affiliation":[{"name":"Arizona State University,Department of Homeland Security-Center of Accelerated Operational Excellence"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Fincen issues analysis of identity-related suspicious activities"},{"key":"ref2","volume-title":"Identity fraud report 2024","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2021.3066254"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18287\/2412-6179-2019-43-5-818-824"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1117\/12.2558438"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18287\/2412-6179-CO-1006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP59012.2023.10337681"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-024-04160-9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3626235"},{"key":"ref10","volume-title":"Academic dataset by generated photos"},{"key":"ref11","article-title":"Emergent abilities of large language models","author":"Wei","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00044"},{"key":"ref13","volume-title":"Aamva dl and id card design standard (2020)","year":"2020"},{"key":"ref14","volume-title":"Anti-counterfeiting technology guide","year":"2021"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2017.306"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2018.17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615122"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12088"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3255585"},{"key":"ref20","first-page":"12104","article-title":"Training generative adversarial networks with limited data","volume":"33","author":"Karras","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref21","volume-title":"Open-ai privacy policy"},{"key":"ref22","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume":"33","author":"Ho","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref24","article-title":"Denoising diffusion implicit models","author":"Song","year":"2020"},{"key":"ref25","volume-title":"Faker the perfect python package to generate fake data"},{"key":"ref26","article-title":"The faiss library","author":"Douze","year":"2024"},{"key":"ref27","volume-title":"Icao 9303: Machine readable passports"},{"key":"ref28","article-title":"A tutorial on bayesian optimization","author":"Frazier","year":"2018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2013.6636641"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s003710050148"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8292"},{"key":"ref33","article-title":"Idnet: A novel dataset for identity document analysis and fraud detection","author":"Guan","year":"2024"},{"key":"ref34","article-title":"Synthetic data\u2013what, why and how?","author":"Jordon","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746477"},{"key":"ref36","volume-title":"Frll-morphs dataset"},{"key":"ref37","article-title":"Vulnerability analysis of face morphing attacks from landmarks and generative adversarial networks","author":"Sarkar","year":"2020"},{"key":"ref38","volume-title":"Frgc-morphs dataset"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90439-5_23"},{"key":"ref41","first-page":"255","article-title":"Detecting face morphing attacks with collaborative representation of steerable features","volume-title":"Proceedings of 3rd International Conference on Computer Vision and Image Processing: CVIP 2018","volume":"1","author":"Ramachandra"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484374"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10008003"},{"key":"ref44","volume-title":"Aws pricing"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72970-6_3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00371"},{"key":"ref47","volume-title":"Dod 5220.22-m \u2013 the secure wiping standard to get rid of data"},{"key":"ref48","article-title":"Mixconv: Mixed depthwise convolutional kernels","author":"Tan","year":"2019"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","location":"Washington, DC, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825017.pdf?arnumber=10825017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:18:23Z","timestamp":1737101903000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825017\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825017","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}