{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:26:17Z","timestamp":1730265977765,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T00:00:00Z","timestamp":1628035200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,4]]},"DOI":"10.1109\/ijcb52358.2021.9484367","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:34:10Z","timestamp":1626813250000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Face Morphing of Newborns Can Be Threatening Too : Preliminary Study on Vulnerability and Detection"],"prefix":"10.1109","author":[{"given":"Sushma","family":"Venkatesh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Raghavendra","family":"Ramachandra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kiran","family":"Raja","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF49977.2020.9107970"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1109\/TTS.2021.3066254","article-title":"Face morphing attack generation detection: A comprehensive survey","author":"venkatesh","year":"2021","journal-title":"IEEE Transactions on Technology and Society"},{"key":"ref31","first-page":"1","article-title":"On the influence of ageing on face morph attacks: Vulnerability and detection","author":"venkatesh","year":"2020","journal-title":"International Joint Conference on Biometrics (IJCB)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2019.8936088"},{"key":"ref34","article-title":"MIPGAN&#x2013;generating robust and high quality morph attacks using identity prior driven GAN","volume":"2","author":"zhang","year":"2021","journal-title":"IEEE Transactions on Biometrics Behavior and Identity Science"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"ref11","first-page":"1","article-title":"Decoupling texture blending and shape warping in face morphing","author":"ferrara","year":"2019","journal-title":"2019 International Conference of the Biometrics Special Interest Group (BIOSIG)"},{"journal-title":"Best Practice Technical Guidelines for Automated Border Control (ABC) Systems","year":"2015","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8271"},{"key":"ref14","article-title":"The phenomenon of baby factory in nigeria as a new trend of human trafficking","author":"huntley","year":"2013","journal-title":"international crimes database"},{"journal-title":"Information Technology - Biometric presentation attack detection - Part 3 Testing and Reporting","year":"2017","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/car.2420"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553599"},{"key":"ref18","article-title":"Face Recognition Vendor Test (FRVT) Part 4: Performance of Automated Face Morph Detection","author":"mei","year":"2021","journal-title":"Technical Report National Institute of Standards and Technology"},{"key":"ref19","first-page":"87","article-title":"Sold into adoption: The hunan baby trafficking scandal exposes vulnerabilities in chinese adoptions to the united states","volume":"39","author":"meier","year":"2008","journal-title":"Cumb L Rev"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION45008.2020.9190629"},{"journal-title":"U S Passport Photograph Acceptance Guide Children&#x2019;s Photos Addendum","year":"2021","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545742"},{"journal-title":"Requirements for photos","year":"2021","key":"ref3"},{"key":"ref6","article-title":"Guatemala children stolen for illegal adoption, organ trafficking","author":"cawley","year":"0","journal-title":"Retrieved from Insight Crime Organised Crime in the America&#x2019;s"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093488"},{"journal-title":"U S Passports","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref7","first-page":"225","article-title":"Longitudinal study of child face recognition","author":"deb","year":"2018","journal-title":"Proceedings of the International Conference on Biometrics (ICB)"},{"journal-title":"Passports for children The Netherlands","year":"2021","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"journal-title":"Passports for children Norway","year":"2021","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00041"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/10246029.2014.941886"},{"key":"ref24","first-page":"1","article-title":"Towards making morphing attack detection robust using hybrid scale-space colour texture features","author":"raghavendra","year":"2019","journal-title":"IEEE International Conference on Identity Security and Behaviour Analysis (ISBA 2019)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272742"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00040"},{"key":"ref25","article-title":"Morphing attack detection - database, evaluation platform and benchmarking","volume":"3","author":"raja","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security (TIFS)"}],"event":{"name":"2021 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2021,8,4]]},"location":"Shenzhen, China","end":{"date-parts":[[2021,8,7]]}},"container-title":["2021 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9484326\/9484328\/09484367.pdf?arnumber=9484367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:12Z","timestamp":1652197692000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9484367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,4]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ijcb52358.2021.9484367","relation":{},"subject":[],"published":{"date-parts":[[2021,8,4]]}}}