{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:22:43Z","timestamp":1729624963945,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,21]]},"DOI":"10.1109\/educon46332.2021.9454128","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T20:36:14Z","timestamp":1624048574000},"page":"1149-1154","source":"Crossref","is-referenced-by-count":2,"title":["Face Morphing Attacks: A Threat to eLearning?"],"prefix":"10.1109","author":[{"given":"Christian","family":"Rathgeb","sequence":"first","affiliation":[]},{"given":"Katrin","family":"Poppelmann","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"journal-title":"Technical report ic","article-title":"ICAO doc 9303, machine readable travel documents &#x2013; part 9: Deployment of biometric identification and electronic storage of data in MRTDs (7th edition)","year":"2015","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3035252"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.8331","author":"ngan","year":"2020","journal-title":"Face recognition vendor test (frvt) part 4 Morph-performanceofautomatedfacemorphdetection (nistir 8292)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2994750"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777340"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref10","first-page":"551","article-title":"Is my student at the other side? applying biometric web authentication to e-learning environments","author":"gonz\u00e1lez-agulla","year":"2008","journal-title":"IEEE International Conference on Advanced Learning Technologies (ICALT)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2014.42002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCGI.2006.28"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA.2016.7802043"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-7724-9.ch011"},{"key":"ref15","first-page":"699","article-title":"Multimodal biometrics-based student attendance measurement in learning management systems","author":"gonz\u00e1lez-agulla","year":"2009","journal-title":"Proceedings of the 11th IEEE International Symposium on Multimedia (ISM)"},{"key":"ref16","first-page":"370","article-title":"Verifying user identities in distance learning courses: Do we know who is sitting and submitting behind the screen?","volume":"15","author":"paullet","year":"2014","journal-title":"Issues in Information Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.03.027"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMIA48430.2020.9074955"},{"key":"ref19","article-title":"Enhancing trust in eassessment - the tesla system solution","author":"bhattacharjee","year":"2018","journal-title":"International Technology Enhanced Assessment Conference (TEA2018)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899367"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA48886.2019.9040132"},{"key":"ref27","first-page":"1","article-title":"Presentation attack detection methods for face recognition systems: A comprehensive survey","volume":"50","author":"raghavendra","year":"2017","journal-title":"Computing Surveys (CSUR)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68548-9_35"},{"key":"ref6","first-page":"32","article-title":"A smart approach for bimodal biometric authentication in home-exams (sabbah model)","volume":"4","author":"sabbah","year":"2012","journal-title":"CiiT Int Journal of Biometrics and Bioinformatics"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8162-6_17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEES.2016.7888025"},{"key":"ref2","first-page":"1","article-title":"Biometric technologies for elearning: State-of-the-art, issues and challenges","author":"rathgeb","year":"2020","journal-title":"Emerging eLearning Technologies & Applications (ICETA)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1186\/s41235-018-0113-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.12.007"},{"journal-title":"EU-H2020 An Adaptive Trust-based e-assesment System for Learning (TeSLA)","year":"2016","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92627-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"journal-title":"EU-FP7 Trusted Biometrics Under Spoofing Attacks (TABULA RASA)","year":"2016","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2437652"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2381273"},{"journal-title":"ODNI IARPA","year":"2016","key":"ref25"}],"event":{"name":"2021 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2021,4,21]]},"location":"Vienna, Austria","end":{"date-parts":[[2021,4,23]]}},"container-title":["2021 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9453798\/9453843\/09454128.pdf?arnumber=9454128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T04:03:40Z","timestamp":1725249820000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9454128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,21]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/educon46332.2021.9454128","relation":{},"subject":[],"published":{"date-parts":[[2021,4,21]]}}}