{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:38:10Z","timestamp":1772642290907,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,4]]},"DOI":"10.1109\/ijcb52358.2021.9484355","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:34:10Z","timestamp":1626813250000},"page":"1-8","source":"Crossref","is-referenced-by-count":27,"title":["Conditional Identity Disentanglement for Differential Face Morph Detection"],"prefix":"10.1109","author":[{"given":"Sudipta","family":"Banerjee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arun","family":"Ross","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777340"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0006131100390050"},{"key":"ref13","article-title":"Conditional Generative Adversarial Nets","author":"mirza","year":"2014"},{"key":"ref14","article-title":"Laws against morphing","author":"monroy","year":"0","journal-title":"Appeared in Security Architectures and the Police Collaboration in the EU 10\/01\/2020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0147"},{"key":"ref16","article-title":"Face Recognition Vendor Test (FRVT) Part 4: MORPH - Performance of Automated Face Morph Detection","author":"ngan","year":"2021","journal-title":"NISTIR 8292 Draft Supplement"},{"key":"ref17","article-title":"Privacy of Facial Soft Biometrics: Suppressing Gender But Retaining Identity","author":"othman","year":"2014","journal-title":"European Conf on Comp Vision Workshop"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920713"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-94211-7_48","article-title":"Detecting Morphed Face Images Using Facial Landmarks","author":"scherhag","year":"2018","journal-title":"International Conference on Image and Signal Processing"},{"key":"ref28","article-title":"MIPGAN - Generating Robust and High Quality Morph Attacks Using Identity Prior Driven GAN","author":"zhang","year":"2021","journal-title":"IEEE Transaction on Biometrics"},{"key":"ref4","article-title":"Morphing Attack Detection - Database, Evaluation Platform and Benchmarking","author":"raja","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1109\/TTS.2021.3066254","article-title":"Face Morphing Attack Generation & Detection: A Comprehensive Survey","author":"venkatesh","year":"2021","journal-title":"IEEE Transactions on Technology and Society"},{"key":"ref3","year":"0","journal-title":"image Manipulation Attack Resolving Solutions (iMARS)"},{"key":"ref6","article-title":"Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts","author":"damer","year":"2018","journal-title":"German Conference on Pattern Recognition"},{"key":"ref5","first-page":"88","article-title":"Focused LRP: Explainable AI for Face Morphing Attack Detection","author":"clemens seibold","year":"2021","journal-title":"IEEE Winter Conference on Applications of Computer Vision"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185994"},{"key":"ref2","year":"0","journal-title":"Face morpher"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref1","year":"0","journal-title":"AMSL Face Morph Image Data Set"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2018.11"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-319-64185-0_9","article-title":"Detection of face morphing attacks by deep learning","author":"seibold","year":"2017","journal-title":"Digital Forensics and Watermarking"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2994750"},{"key":"ref24","first-page":"1731","article-title":"Mutual Information Maximization on Disentangled Representations for Differential Morph Detection","author":"soleymani","year":"2021","journal-title":"IEEE Winter Conference on Applications of Computer Vision"},{"key":"ref23","article-title":"Image-level Iris Morph Attack","author":"sharma","year":"2021","journal-title":"IEEE 28th International Conference on Image Processing"},{"key":"ref26","first-page":"2029","article-title":"Visualizing Deep Similarity Networks","author":"stylianou","year":"2019","journal-title":"IEEE Winter Conference on Applications of Computer Vision"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3758\/BF03207733"}],"event":{"name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","location":"Shenzhen, China","start":{"date-parts":[[2021,8,4]]},"end":{"date-parts":[[2021,8,7]]}},"container-title":["2021 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9484326\/9484328\/09484355.pdf?arnumber=9484355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:12Z","timestamp":1652197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9484355\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcb52358.2021.9484355","relation":{},"subject":[],"published":{"date-parts":[[2021,8,4]]}}}