{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:54:02Z","timestamp":1774968842767,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/tifs.2017.2777340","type":"journal-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T19:08:18Z","timestamp":1511464098000},"page":"1008-1017","source":"Crossref","is-referenced-by-count":146,"title":["Face Demorphing"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4020-1419","authenticated-orcid":false,"given":"Matteo","family":"Ferrara","sequence":"first","affiliation":[]},{"given":"Annalisa","family":"Franco","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6329-6756","authenticated-orcid":false,"given":"Davide","family":"Maltoni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"2017","journal-title":"Information Technology&#x2014;Biometric Presentation Attack Detection&#x2014;Part 3 Testing and Reporting"},{"key":"ref32","year":"2017","journal-title":"Biometric System Laboratory"},{"key":"ref31","year":"2017","journal-title":"Sqirlz Morph 2 1"},{"key":"ref30","year":"2017","journal-title":"FVC-on Going"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64185-0_8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64185-0_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.228"},{"key":"ref13","year":"2017","journal-title":"Morphing"},{"key":"ref14","year":"2017","journal-title":"Image Warping"},{"key":"ref15","author":"wolberg","year":"1994","journal-title":"Digital Image Warping"},{"key":"ref16","author":"rogers","year":"1989","journal-title":"Mathematical Elements for Computer Graphics"},{"key":"ref17","first-page":"793","article-title":"Sur la sph&#x00E8;re vide. A la m&#x00E9;moire de Georges Vorono&#x00EF;","author":"delaunay","year":"1934","journal-title":"Bulletin de l&#x2019;Acad&#x00E9;mie des Sciences de l&#x2019;URSS Classe des Sciences Math&#x00E9;matiques et Naturelles"},{"key":"ref18","year":"2011","journal-title":"Information Technology&#x2014;Biometric Data Interchange Formats&#x2014;Part 5 Face Image Data"},{"key":"ref19","year":"2011","journal-title":"Best Practice Guidelines on the Design Deployment and Operation of Automated Border Crossing Systems"},{"key":"ref28","year":"2017","journal-title":"Neurotechnology"},{"key":"ref4","year":"2014","journal-title":"The Global Automated Border Control Industry Report Airport eGates & Kiosks"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639345"},{"key":"ref3","year":"2012","journal-title":"Best Practice Technical Guidelines for Automated Border Control (ABC) Systems&#x2014;V2 0"},{"key":"ref6","year":"2017","journal-title":"FIDELITY European Project Web Site"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_74"},{"key":"ref5","year":"2017","journal-title":"IATA Automated Border Control"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935088"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.04.007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref20","year":"2017","journal-title":"GNU Image Manipulation Program"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173319"},{"key":"ref21","year":"2017","journal-title":"GIMP Animation Package"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref23","article-title":"The AR face database","author":"mart\u00ednez","year":"1998"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8245900\/08119561.pdf?arnumber=8119561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:23:14Z","timestamp":1642004594000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8119561\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":34,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2777340","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}