{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:01:55Z","timestamp":1771956115645,"version":"3.50.1"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1109\/wifs61860.2024.10810695","type":"proceedings-article","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T19:10:25Z","timestamp":1735326625000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["MONOT: High-Quality Privacy-compliant Morphed Synthetic Images for Everyone"],"prefix":"10.1109","author":[{"given":"Guido","family":"Borghi","sequence":"first","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Italy"}]},{"given":"Nicol\u00f2 Di","family":"Domenico","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Italy"}]},{"given":"Matteo","family":"Ferrara","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Italy"}]},{"given":"Annalisa","family":"Franco","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Italy"}]},{"given":"Uzma","family":"Latif","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Italy"}]},{"given":"Davide","family":"Maltoni","sequence":"additional","affiliation":[{"name":"University of Bologna,Department of Computer Science and Engineering,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899367"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3035252"},{"key":"ref4","article-title":"General data protection regulation","author":"GDPR","year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10925-7_31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1561\/2200000056"},{"key":"ref8","article-title":"ISO\/IEC 39794-5 \u2014 Information technology \u2014 Extensible biometric data interchange formats \u2014 Part 5: Face image data","year":"2019","journal-title":"International Organization for Standardization"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01070"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00352"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FG57933.2023.10042627"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007961"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484363"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging8100263"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01800"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00341"},{"key":"ref17","first-page":"8780","article-title":"Diffusion models beat gans on image synthesis","volume":"34","author":"Dhariwal","year":"2021","journal-title":"Advances in neural information processing systems"},{"key":"ref18","first-page":"8162","article-title":"Improved denoising diffusion probabilistic models","volume-title":"International conference on machine learning","author":"Nichol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14049-5_25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00167"},{"key":"ref21","article-title":"ISO\/IEC 19794-5 \u2014 Information technology-Biometric data interchange formats \u2014 Part 5: Face image data","year":"2011","journal-title":"International Organization for Standardization, Standard"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3191463"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3507901"},{"key":"ref24","article-title":"3d face morphing attacks: Generation, vulnerability and detection","author":"Singh","year":"2023","journal-title":"IEEE Transactions on Biometrics, Behavior, and Identity Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3072349"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF49977.2020.9107970"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF57495.2023.10157869"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777340"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3117718"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF62628.2024.10593948"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5220\/0011606100003411"},{"key":"ref32","article-title":"Single morphing attack detection using siamese network and few-shot learning","author":"Tapia","year":"2022","journal-title":"arXiv preprint arXiv:2206.10969"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3328227"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7460330"},{"key":"ref35","article-title":"FVC-onGoing","author":"Biolab"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION49751.2022.9841318"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00177"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68780-9_44"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484355"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2019.2942395"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484398"},{"key":"ref42","first-page":"439","article-title":"Face morphing detection based on a two-stream network with channel attention and residual of multiple color spaces","volume-title":"International Conference on Machine Learning for Cyber Security","author":"Long"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/fg59268.2024.10581986"},{"key":"ref44","article-title":"FaceMorpher morphing algorithm","author":"Quek"},{"key":"ref45","article-title":"Facefusion"},{"key":"ref46","article-title":"Decoupling texture blending and shape warping in face morphing","volume-title":"International Conference of the Biometrics Special Interest Group (BIOSIG)","author":"Ferrara"},{"key":"ref47","article-title":"SURYS web site","author":"Group"},{"key":"ref48","article-title":"INGROUPE web site","author":"INGROUPE"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2023.981933"},{"key":"ref50","article-title":"Arc2face: A foundation model of human faces","author":"Papantoniou","year":"2024","journal-title":"arXiv preprint arXiv:2403.11641"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref52","article-title":"The AR face database: Cvc technical report, 24","author":"Martinez","year":"1998"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref55","article-title":"Vulnerability analysis of face morphing attacks from landmarks and generative adversarial networks","author":"Sarkar","year":"2020","journal-title":"arXiv preprint arXiv:2012.05344"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746477"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43148-7_9"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.11.005"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3035252"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-014-0532-5"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF55382.2022.9794509"},{"key":"ref62","article-title":"Face recognition vendor test (FRVT) 1:1 verification"},{"key":"ref63","article-title":"ISO\/IEC CD 20059.2 Methodologies to evaluate the resistance of biometric recognition systems to morphing attacks","year":"2023","journal-title":"International Organization for Standardization"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2603342"}],"event":{"name":"2024 IEEE International Workshop on Information Forensics and Security (WIFS)","location":"Rome, Italy","start":{"date-parts":[[2024,12,2]]},"end":{"date-parts":[[2024,12,5]]}},"container-title":["2024 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10810660\/10810670\/10810695.pdf?arnumber=10810695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T06:08:24Z","timestamp":1735366104000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10810695\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/wifs61860.2024.10810695","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]}}}