{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:00:08Z","timestamp":1772643608229,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SOTAMD Project"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tifs.2020.3035252","type":"journal-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T15:58:50Z","timestamp":1604332730000},"page":"4336-4351","source":"Crossref","is-referenced-by-count":65,"title":["Morphing Attack Detection-Database, Evaluation Platform, and Benchmarking"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9489-5161","authenticated-orcid":false,"given":"Kiran","family":"Raja","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4020-1419","authenticated-orcid":false,"given":"Matteo","family":"Ferrara","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Annalisa","family":"Franco","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luuk","family":"Spreeuwers","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3389-0535","authenticated-orcid":false,"given":"Ilias","family":"Batskos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2315-6935","authenticated-orcid":false,"given":"Florens","family":"de Wit","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4581-5353","authenticated-orcid":false,"given":"Marta","family":"Gomez-Barrero","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6280-048X","authenticated-orcid":false,"given":"Ulrich","family":"Scherhag","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Fischer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8557-0314","authenticated-orcid":false,"given":"Sushma Krupa","family":"Venkatesh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8901-6791","authenticated-orcid":false,"given":"Jag Mohan","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guoqiang","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Loic","family":"Bergeron","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sergey","family":"Isadskiy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0484-3956","authenticated-orcid":false,"given":"Raghavendra","family":"Ramachandra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1901-9468","authenticated-orcid":false,"given":"Christian","family":"Rathgeb","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dinusha","family":"Frings","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1415-2342","authenticated-orcid":false,"given":"Uwe","family":"Seidel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fons","family":"Knopjes","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0381-5235","authenticated-orcid":false,"given":"Raymond","family":"Veldhuis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Davide","family":"Maltoni","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9159-2923","authenticated-orcid":false,"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_74"},{"key":"ref38","year":"2020","journal-title":"FRVT MORPH Web Site"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553018"},{"key":"ref32","first-page":"106","article-title":"Robust morph-detection at automated border control gate using deep decomposed 3D shape & diffuse reflectance","author":"singh","year":"2019","journal-title":"Proc 15th Int Conf Signal-Image Technol Internet-Based Syst (SITIS)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935087"},{"key":"ref30","article-title":"Openface: A general-purpose face recognition library with mobile applications","author":"amos","year":"2016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093488"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IPTA.2019.8936088"},{"key":"ref35","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2019.8778488"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935086"},{"key":"ref61","year":"2015","journal-title":"Best Practice Technical Guidelines for Automated Border Control (ABC) Systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.76"},{"key":"ref27","year":"2020","journal-title":"Luxand SDK 4 0"},{"key":"ref29","first-page":"1","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"Proc ICLR"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF49977.2020.9107970"},{"key":"ref22","year":"2020","journal-title":"Department of Internal Affairs (DIA) NZ"},{"key":"ref21","year":"2020"},{"key":"ref24","year":"2020","journal-title":"Photo for a Passport or Identity-Card"},{"key":"ref23","year":"2020","journal-title":"OCI Services"},{"key":"ref26","year":"2020","journal-title":"NeuroTechnology VeriEye SDK"},{"key":"ref25","author":"martinez","year":"2000","journal-title":"AR Face Database"},{"key":"ref50","author":"gmbh","year":"2020","journal-title":"Facevacs Technology"},{"key":"ref51","first-page":"120","article-title":"The OpenCV library","volume":"25","author":"bradski","year":"2000","journal-title":"Dr Dobb&#x2019;s J Softw Tools"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.41"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00659"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94211-7_48"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2018.11"},{"key":"ref52","year":"2017"},{"key":"ref10","first-page":"518","article-title":"Detecting face morphing attacks by analyzing the directed distances of facial landmarks shifts","author":"damer","year":"2018","journal-title":"Proc German Conf Pattern Recognit"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2019.2942395"},{"key":"ref40","year":"2020","journal-title":"FVC-onGoing Web Site"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2018.8401555"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272742"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777340"},{"key":"ref16","first-page":"1","article-title":"Detecting face morphing attacks with collaborative representation of steerable features","author":"raghavendra","year":"2018","journal-title":"Proc IAPR Int Conf Comput Vis Image Process (CVIP)"},{"key":"ref17","article-title":"Face morphing detection in the presence of printing\/scanning and heterogeneous image sources","author":"ferrara","year":"2019","journal-title":"arXiv 1901 08811"},{"key":"ref18","first-page":"1","article-title":"Decoupling texture blending and shape warping in face morphing","author":"ferrara","year":"2019","journal-title":"Proc Int Conf Biometrics Special Interest Group (BIOSIG)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2994750"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.228"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899367"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935079"},{"key":"ref8","first-page":"2","article-title":"A multi-detector solution towards an accurate and generalized detection of face morphing attacks","author":"damer","year":"2019","journal-title":"Proc 22nd Int Conf Inf Fusion (Fusion)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1201775.882269"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICB45273.2019.8987316"},{"key":"ref46","year":"2020"},{"key":"ref45","author":"king","year":"2020","journal-title":"DLib C++ Library"},{"key":"ref48","first-page":"380","article-title":"Active shape models with sift descriptors and Mars","volume":"2","author":"milborrow","year":"2014","journal-title":"Proc 9th Int Conf Comput Vis Theory Appl"},{"key":"ref47","year":"2020"},{"key":"ref42","year":"2020"},{"key":"ref41","year":"2015","journal-title":"Machine Readable Passports&#x2014;Part 9&#x2013;Deployment of Biometric Identification and Electronic Storage of Data in eMRTDs"},{"key":"ref44","year":"2020","journal-title":"GNU Image Manipulation Program"},{"key":"ref43","year":"2020"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9151439\/09246583.pdf?arnumber=9246583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:40:13Z","timestamp":1641987613000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9246583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/tifs.2020.3035252","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}