{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:14:46Z","timestamp":1772644486801,"version":"3.50.1"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"German Federal Ministry of Education and Research and the Hessian Ministry of Higher Education, Research, Science and the Arts"},{"name":"National Research Center for Applied Cybersecurity ATHENE"},{"name":"European Union\u2019s Horizon 2020 Research and Innovation Programme under the Marie Sklodowska-Curie Grant","award":["860813\u2014TReSPAsS-ETN"],"award-info":[{"award-number":["860813\u2014TReSPAsS-ETN"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Biom. Behav. Identity Sci."],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1109\/tbiom.2022.3185884","type":"journal-article","created":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T19:28:52Z","timestamp":1657135732000},"page":"91-104","source":"Crossref","is-referenced-by-count":13,"title":["Fun Selfie Filters in Face Recognition: Impact Assessment and Removal"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2039-7319","authenticated-orcid":false,"given":"Cristian","family":"Botezatu","sequence":"first","affiliation":[{"name":"Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7531-806X","authenticated-orcid":false,"given":"Mathias","family":"Ibsen","sequence":"additional","affiliation":[{"name":"Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1901-9468","authenticated-orcid":false,"given":"Christian","family":"Rathgeb","sequence":"additional","affiliation":[{"name":"Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9159-2923","authenticated-orcid":false,"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[{"name":"Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"}]}],"member":"263","reference":[{"key":"ref13","year":"2021","journal-title":"Bloom Camera"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1531326.1531330"},{"key":"ref12","year":"2021","journal-title":"YouCam Fun"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.815261"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977386"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987388"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12029"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-018-9877-6"},{"key":"ref53","first-page":"234","article-title":"U-net: Convolutional networks for biomedical image segmentation","author":"ronneberger","year":"2015","journal-title":"Proc Int Conf Med Image Comput Comput Assist Interv"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref11","year":"2021","journal-title":"B612"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8101115"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.05.001"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24670-1_36"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00457"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299170"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939201"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000254"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref47","first-page":"3523","article-title":"Image segmentation using deep learning: A survey","volume":"44","author":"minaee","year":"2022","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484337"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2019.0196"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561898"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7"},{"key":"ref7","year":"2019","journal-title":"How Instagram Facebook Photo Filters are Creating Challenges for Police When People Go Missing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7_2"},{"key":"ref4","year":"2021","journal-title":"Detroit Police Department Weekly Report on Facial Recognition"},{"key":"ref3","year":"2012","journal-title":"Police Embrace Social Media as Crime-Fighting Tool"},{"key":"ref6","year":"2019","journal-title":"Warum Sucht die Polizei mit Instagram-Foto Nach Rebecca?"},{"key":"ref5","year":"2021","journal-title":"How Police Monitor Social Media to Find Crime and Track Suspects"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00165"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948526"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: From error visibility to structural similarity","volume":"13","author":"zhou","year":"2004","journal-title":"IEEE Trans Image Process"},{"key":"ref34","first-page":"182","article-title":"Impact of facial cosmetics on automatic gender and age estimation algorithms","volume":"2","author":"chen","year":"2014","journal-title":"Proc Int Conf Comput Vis Theory Appl (VISAPP)"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1983.309421"},{"key":"ref37","year":"2020","journal-title":"What Countries Require Masks in Public or Recommend Masks?"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12032"},{"key":"ref31","first-page":"20","article-title":"Recognizing faces with partial occlusion using inpainting","volume":"168","author":"vijayalakshmi","year":"2017","journal-title":"Int J Comput Appl"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.632"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2771408"},{"key":"ref74","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Proc ICLR"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374605"},{"key":"ref77","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2995496"},{"key":"ref76","first-page":"694","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"johnson","year":"2016","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2019.102805"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref39","first-page":"1","article-title":"Custom silicone Face Masks: Vulnerability of commercial face recognition systems & presentation attack detection","author":"raghavendra","year":"2019","journal-title":"Proc 7th Int Workshop Biometrics Forensics (IWBF)"},{"key":"ref38","article-title":"Biometrics in the era of COVID-19: Challenges and opportunities","author":"gomez-barrero","year":"2021","journal-title":"arXiv 2102 09258"},{"key":"ref71","year":"2012"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01400"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref72","year":"2021","journal-title":"ISO\/IEC JTC1 SC37 Biometrics ISO\/IEC 19795-1 2021 Information Technology&#x2014;Biometric Performance Testing and Reporting&#x2014;Part 1 Principles and Framework"},{"key":"ref24","first-page":"375","article-title":"Face occlusion detection based on multi-task convolution neural network","author":"xia","year":"2015","journal-title":"Proc 12th Int Conf Fuzzy Syst Knowl Discov (FSKD)"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00525"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2018.00067"},{"key":"ref67","first-page":"1755","article-title":"Dlib-ml: A machine learning toolkit","volume":"10","author":"king","year":"2009","journal-title":"J Mach Learn Res"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791187"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CGIV.2010.29"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987255"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_87"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3507901"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00408"},{"key":"ref22","first-page":"2082","article-title":"A robust elastic and partial matching metric for face recognition","author":"hua","year":"2009","journal-title":"Proc IEEE 12th Int Conf Comput Vis"},{"key":"ref66","year":"2021","journal-title":"The SNOW"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2005.147"},{"key":"ref65","year":"2021","journal-title":"Sweet Face Camera"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.103"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.191"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296472"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00577"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3072959.3073659"}],"container-title":["IEEE Transactions on Biometrics, Behavior, and Identity Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8423754\/9997805\/09817052.pdf?arnumber=9817052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T19:34:42Z","timestamp":1674502482000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9817052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":79,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tbiom.2022.3185884","relation":{},"ISSN":["2637-6407"],"issn-type":[{"value":"2637-6407","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1]]}}}