{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:10:19Z","timestamp":1775067019700,"version":"3.50.1"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f?r Bildung und Forschung","doi-asserted-by":"publisher","award":["ATHENE"],"award-info":[{"award-number":["ATHENE"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003495","name":"Hessisches Ministerium f?r Wissenschaft und Kunst","doi-asserted-by":"publisher","award":["ATHENE"],"award-info":[{"award-number":["ATHENE"]}],"id":[{"id":"10.13039\/501100003495","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Biom. Behav. Identity Sci."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1109\/tbiom.2024.3371502","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T19:05:42Z","timestamp":1709233542000},"page":"290-303","source":"Crossref","is-referenced-by-count":22,"title":["SFace2: Synthetic-Based Face Recognition With w-Space Identity-Driven Sampling"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4516-9128","authenticated-orcid":false,"given":"Fadi","family":"Boutros","sequence":"first","affiliation":[{"name":"Department of Smart Living and Biometric Technologies, Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3413-6291","authenticated-orcid":false,"given":"Marco","family":"Huber","sequence":"additional","affiliation":[{"name":"Department of Smart Living and Biometric Technologies, Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"given":"Anh","family":"Thi Luu","sequence":"additional","affiliation":[{"name":"Department of Smart Living and Biometric Technologies, Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2732-5049","authenticated-orcid":false,"given":"Patrick","family":"Siebke","sequence":"additional","affiliation":[{"name":"Department of Smart Living and Biometric Technologies, Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7910-7895","authenticated-orcid":false,"given":"Naser","family":"Damer","sequence":"additional","affiliation":[{"name":"Department of Smart Living and Biometric Technologies, Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.90"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3170561"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ijcb52358.2021.9484374"},{"key":"ref4","first-page":"4690","article-title":"ArcFace: Additive angular margin loss for deep face recognition","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Deng"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw56347.2022.00164"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108473"},{"key":"ref7","first-page":"5900","article-title":"CurricularFace: Adaptive curriculum learning loss for deep face recognition","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Huang"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/fg.2018.00020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_6"},{"key":"ref10","volume-title":"On synthetic data: A brief introduction for data protection law dummies.","author":"Fontanillo L\u00f3pez","year":"2022"},{"key":"ref11","article-title":"About face: A survey of facial recognition evaluation","author":"Raji","year":"2021","journal-title":"arXiv:2102.00813"},{"key":"ref12","volume-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2016"},{"issue":"2","key":"ref13","first-page":"1","article-title":"Privacy measures of biometrics businesses","volume":"13","author":"Shigeru","year":"2018","journal-title":"NEC Techn. J."},{"key":"ref14","volume-title":"Biometric information privacy act (BIPA)","year":"2008"},{"key":"ref15","volume-title":"Article 9 of the General Data Protection Regulation","year":"2016"},{"key":"ref16","volume-title":"Article 9(2) of the General Data Protection Regulation","year":"2016"},{"key":"ref17","volume-title":"Article 9(4)of the General Data Protection Regulation","year":"2016"},{"key":"ref18","volume-title":"Article 30 of the General Data Protection Regulation","year":"2016"},{"key":"ref19","volume-title":"Article 35(3) of the General Data Protection Regulation","year":"2016"},{"key":"ref20","volume-title":"Article 37(1) of the General Data Protection Regulation","year":"2016"},{"key":"ref21","volume-title":"Article 22(4) of the General Data Protection Regulation","year":"2016"},{"key":"ref22","volume-title":"Article 27(2) of the General Data Protection Regulation","year":"2016"},{"key":"ref23","volume-title":"Article 6(4) of the General Data Protection Regulation","year":"2016"},{"key":"ref24","volume-title":"Article 26 of the General Data Protection Regulation","year":"2016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2021.3096024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"ref27","first-page":"1","volume-title":"Differential Privacy","author":"Dowrk","year":"2006"},{"issue":"1","key":"ref28","doi-asserted-by":"crossref","first-page":"59","DOI":"10.29012\/jpc.v1i1.566","article-title":"Secure multiparty computation for privacy-preserving data mining","volume":"1","author":"Lindell","year":"2009","journal-title":"J. Privacy Confid."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2992821"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2023.104688"},{"key":"ref31","volume-title":"Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data","author":"El Emam","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.527"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48881-3_2"},{"key":"ref34","first-page":"1022","article-title":"Benchmarking robustness of 3D object detection to common corruptions in autonomous driving","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Dong"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00839"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104007"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/iccv48922.2021.01070"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/icpr56361.2022.9955645"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/iccvw.2019.00454"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw56347.2022.00167"},{"key":"ref41","first-page":"1061","article-title":"SynthASpoof: Developing face presentation attack detection based on privacy-friendly synthetic data","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Fang"},{"key":"ref42","first-page":"5153","article-title":"Disentangled and controllable face image generation via 3D imitative-contrastive learning","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Deng"},{"key":"ref43","first-page":"14063","article-title":"GAN-control: Explicitly controllable GANs","volume-title":"Proc. IEEE\/CVF Int. Conf. Comput. Vis. (ICCV)","author":"Shoshan"},{"key":"ref44","first-page":"1","article-title":"On the quality and diversity of synthetic face data and its relation to the generator training data","volume-title":"Proc. 11th Int. Workshop Biom. Forensics (IWBF)","author":"Fu"},{"key":"ref45","first-page":"1","article-title":"Unsupervised face recognition using unlabeled synthetic data","volume-title":"Proc. 17th IEEE Int. Conf. Automat. Face Gesture Recognit. (FG)","author":"Boutros"},{"key":"ref46","first-page":"1","article-title":"SFace: Privacy-friendly and accurate face recognition using synthetic data","volume-title":"Proc. IEEE Int. Joint Conf. Biom. (IJCB)","author":"Boutros"},{"key":"ref47","first-page":"806","article-title":"Identity-driven three-player generative adversarial network for synthetic-based face recognition","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Kolf"},{"key":"ref48","first-page":"12104","article-title":"Training generative adversarial networks with limited data","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Karras"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB57857.2023.10449036"},{"key":"ref50","first-page":"3515","article-title":"DigiFace-1M: 1 million digital face images for face recognition","volume-title":"Proc. IEEE\/CVF Winter Conf. Appl. Comput. Vis. (WACV)","author":"Bae"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01800"},{"key":"ref52","first-page":"12715","article-title":"DCFace: Synthetic face generation with dual condition diffusion model","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Kim"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007933"},{"key":"ref54","first-page":"1","article-title":"cGANs with projection discriminator","volume-title":"Proc. 6th Int. Conf. Learn. Represent. (ICLR)","author":"Miyato"},{"key":"ref55","first-page":"8107","article-title":"Analyzing and improving the image quality of StyleGAN","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Karras"},{"key":"ref56","first-page":"4401","article-title":"A style-based generator architecture for generative adversarial networks","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Karras"},{"key":"ref57","first-page":"9240","article-title":"Interpreting the latent space of GANs for semantic face editing","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Shen"},{"key":"ref58","first-page":"5265","article-title":"CosFace: Large margin cosine loss for deep face recognition","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Wang"},{"key":"ref59","article-title":"Learning face representation from scratch","author":"Yi","year":"2014","journal-title":"arXiv:1411.7923"},{"key":"ref60","first-page":"694","article-title":"Perceptual losses for real-time style transfer and super-resolution","volume-title":"Proc. 14th Eur. Conf. Comput. Vis. (ECCV)","author":"Johnson"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2016.2603342"},{"key":"ref62","first-page":"7","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","volume-title":"Proc. Workshop Faces \u2019Real-Life\u2019Images Detect., Alignment, Recognit.","author":"Huang"},{"key":"ref63","article-title":"Cross-age LFW: A database for studying cross-age face recognition in unconstrained environments","author":"Zheng","year":"2017","journal-title":"arXiv:1708.08197"},{"key":"ref64","article-title":"Cross-pose LFW: A database for studying cross-pose face recognition in unconstrained environments","author":"Zheng","year":"2018"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477558"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.250"},{"key":"ref67","first-page":"8024","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Paszke"},{"key":"ref68","volume-title":"Best Practice Technical Guidelines for Automated Border Control (ABC) Systems","year":"2015"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00610"}],"container-title":["IEEE Transactions on Biometrics, Behavior, and Identity Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8423754\/10604462\/10454585.pdf?arnumber=10454585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T17:46:46Z","timestamp":1724435206000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10454585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":69,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tbiom.2024.3371502","relation":{},"ISSN":["2637-6407"],"issn-type":[{"value":"2637-6407","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7]]}}}