{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:37:08Z","timestamp":1772642228612,"version":"3.50.1"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1109\/ijcb54206.2022.10007950","type":"proceedings-article","created":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T13:58:35Z","timestamp":1673963915000},"page":"1-10","source":"Crossref","is-referenced-by-count":32,"title":["SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data"],"prefix":"10.1109","author":[{"given":"Marco","family":"Huber","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,Germany"}]},{"given":"Fadi","family":"Boutros","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,Germany"}]},{"given":"Anh Thi","family":"Luu","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,Germany"}]},{"given":"Kiran","family":"Raja","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology,Norway"}]},{"given":"Raghavendra","family":"Ramachandra","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology,Norway"}]},{"given":"Naser","family":"Damer","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,Germany"}]},{"given":"Pedro C.","family":"Neto","sequence":"additional","affiliation":[{"name":"INESC TEC,Portugal"}]},{"given":"Tiago","family":"Goncalves","sequence":"additional","affiliation":[{"name":"INESC TEC,Portugal"}]},{"given":"Ana F.","family":"Sequeira","sequence":"additional","affiliation":[{"name":"INESC TEC,Portugal"}]},{"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[{"name":"INESC TEC,Portugal"}]},{"given":"Joao","family":"Tremoco","sequence":"additional","affiliation":[{"name":"Yoonik,Portugal"}]},{"given":"Miguel","family":"Lourenco","sequence":"additional","affiliation":[{"name":"Yoonik,Portugal"}]},{"given":"Sergio","family":"Serra","sequence":"additional","affiliation":[{"name":"Vaelsys R&#x0026;D,Spain"}]},{"given":"Eduardo","family":"Cermeno","sequence":"additional","affiliation":[{"name":"Vaelsys R&#x0026;D,Spain"}]},{"given":"Marija","family":"Ivanovska","sequence":"additional","affiliation":[{"name":"University of Ljubljana,Slovenia"}]},{"given":"Borut","family":"Batagelj","sequence":"additional","affiliation":[{"name":"University of Ljubljana,Slovenia"}]},{"given":"Andrej","family":"Kronovsek","sequence":"additional","affiliation":[{"name":"University of Ljubljana,Slovenia"}]},{"given":"Peter","family":"Peer","sequence":"additional","affiliation":[{"name":"University of Ljubljana,Slovenia"}]},{"given":"Vitomir","family":"Struc","sequence":"additional","affiliation":[{"name":"University of Ljubljana,Slovenia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ijcb52358.2021.9484374"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw56347.2022.00164"},{"key":"ref3","article-title":"CR-FIQA: face image quality assessment by learning sample rel-ative classifiability","volume-title":"CoRR","volume":"abs\/2112.06592","author":"Boutros","year":"2021"},{"key":"ref4","author":"C\u00e1rabe","journal-title":"Methods to prevent registration using fake face images"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3088786"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613026"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref8","first-page":"518","article-title":"Detecting face morphing at-tacks by analyzing the directed distances of facial landmarks shifts","volume-title":"GCPR","volume":"11269","author":"Damer"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185994"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185995"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw56347.2022.00167"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90439-5_20"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987316"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90439-5_23"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30645-8_32"},{"key":"ref17","volume":"4","author":"DeBruine","year":"2021","journal-title":"Face Research Lab London Set"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"ref19","first-page":"4690","article-title":"Arcface: Ad-ditive angular margin loss for deep face recognition","volume-title":"CVPR","author":"Deng"},{"key":"ref20","article-title":"Sigmoid-weighted lin-ear units for neural network function approximation in rein-forcement learning","volume":"abs\/1702.03118","author":"Elfwing","year":"2017","journal-title":"CoRR"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FG52635.2021.9667051"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777340"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref25","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","volume-title":"Technical Re-port 07\u201349","author":"Huang","year":"2007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00594"},{"key":"ref27","volume-title":"Information Technology - Biometric presen-tation attack detection - P. 3: Testing and reporting","year":"2017"},{"key":"ref28","volume-title":"Information technology - Biometric sample quality - Part 1: Framework. International Organization for Standardization","year":"2016"},{"key":"ref29","article-title":"Face morphing attack detection using privacy-aware training data","volume-title":"Proceedings of the 31st International Electrotechnical and Computer Science Conference (under review)","author":"Ivanovska"},{"key":"ref30","article-title":"Training generative adversarial networks with limited data","volume-title":"NeurIPS","author":"Karras"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2019.00453"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr42600.2020.00813"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.241"},{"key":"ref34","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"King","year":"2009","journal-title":"J. Mach. Learn. Res."},{"key":"ref35","article-title":"Adam: A method for stochastic optimization","volume-title":"ICLR (Poster)","author":"Kingma"},{"issue":"1","key":"ref36","article-title":"Face morph using opencv - c++ \/ python","volume":"1","author":"Mallick","year":"2016","journal-title":"LearnOpenCV"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3096024"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64185-0_8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8292"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484359"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01070"},{"key":"ref42","first-page":"1","article-title":"Detecting mor-phed face images","volume-title":"BTAS","author":"Raghavendra"},{"key":"ref43","first-page":"555","article-title":"Face morphing versus face averaging: Vulnerability and de-tection","volume-title":"IJCB","author":"Raghavendra"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.228"},{"key":"ref45","article-title":"About face: A survey of facial recognition evaluation","volume":"abs\/2102.00813","author":"Raji","year":"2021","journal-title":"CoRR"},{"key":"ref46","first-page":"1","article-title":"Faceforensics++: Learning to detect ma-nipulated facial images","volume-title":"ICCV","author":"R\u00f6ssler"},{"key":"ref47","article-title":"Vul-nerability analysis of face morphing attacks from landmarks and generative adversarial networks","volume":"abs\/2012.05344","author":"Sarkar","year":"2020","journal-title":"CoRR"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.23919\/biosig.2017.8053499"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2994750"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2015.7298682"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00584"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF49977.2020.9107970"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2983686"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1807.06521"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3072349"}],"event":{"name":"2022 IEEE International Joint Conference on Biometrics (IJCB)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2022,10,10]]},"end":{"date-parts":[[2022,10,13]]}},"container-title":["2022 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10007927\/10007928\/10007950.pdf?arnumber=10007950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T01:05:48Z","timestamp":1710378348000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10007950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/ijcb54206.2022.10007950","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]}}}