{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:55:09Z","timestamp":1725731709840},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1109\/ijcb54206.2022.10007973","type":"proceedings-article","created":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T18:58:35Z","timestamp":1673981915000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Identical Twins Face Morph Database Generation"],"prefix":"10.1109","author":[{"given":"Kelsey","family":"OHaire","sequence":"first","affiliation":[{"name":"West Virginia University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sobhan","family":"Soleymani","sequence":"additional","affiliation":[{"name":"West Virginia University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Baaria","family":"Chaudhary","sequence":"additional","affiliation":[{"name":"West Virginia University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeremy","family":"Dawson","sequence":"additional","affiliation":[{"name":"West Virginia University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nasser M.","family":"Nasrabadi","sequence":"additional","affiliation":[{"name":"West Virginia University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123126"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489113"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00158"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987316"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90439-5_23"},{"volume-title":"debruine\/webmorpher: Beta release 2","year":"2018","author":"DeBruine","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"journal-title":"ISO\/IEC DIS 30107\u20133:2016: Information technology biometric presentation attack detection","article-title":"I. O. for Standardization","year":"2017","key":"ref10"},{"volume-title":"FRONTEX. Best practice technical guidelines for automated border control (ABC) systems","year":"2015","key":"ref11"},{"key":"ref12","article-title":"Explaining and harnessing adversarial examples","volume-title":"Conference on Learning Representations","author":"Goodfellow","year":"2015"},{"journal-title":"International Civil Aviation Organization (ICAO)","article-title":"9303-machine readable travel documents-part 9: De-ployment of biometric identification and electronic storage of data in eMRTDs","year":"2015","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2019.00453"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP42928.2021.9506775"},{"volume-title":"Face morph using opencv - c++\/python","year":"2016","author":"Mallick","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG52210.2021.9548299"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0147"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2296373"},{"volume-title":"Facemorpher","year":"2019","author":"Quek","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173319"},{"key":"ref24","article-title":"Vulnerability analysis of face morphing attacks from land-marks and generative adversarial networks","author":"Sarkar","year":"2020","journal-title":"arXiv preprint"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref27","article-title":"Acces-sorize to a crime: Real and stealthy attacks on state-of-the-art face recognition","volume-title":"ACM SIGSAC Conference on Computer and Communications Security","author":"Sharif","year":"2016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3072349"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"}],"event":{"name":"2022 IEEE International Joint Conference on Biometrics (IJCB)","start":{"date-parts":[[2022,10,10]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2022,10,13]]}},"container-title":["2022 IEEE International Joint Conference on Biometrics (IJCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10007927\/10007928\/10007973.pdf?arnumber=10007973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T06:17:30Z","timestamp":1707459450000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10007973\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ijcb54206.2022.10007973","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]}}}