{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T15:00:04Z","timestamp":1777734004473,"version":"3.51.4"},"reference-count":128,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"IEEE Access by waiving the APC"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3578199","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T17:35:48Z","timestamp":1749490548000},"page":"105952-105981","source":"Crossref","is-referenced-by-count":5,"title":["Deep Learning Techniques for Detecting Morphed Face Images: A Literature Review"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5962-0386","authenticated-orcid":false,"given":"Pedro","family":"Morais","sequence":"first","affiliation":[{"name":"Coimbra Institute of Engineering, Polytechnic University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2334-7280","authenticated-orcid":false,"given":"In\u00eas","family":"Domingues","sequence":"additional","affiliation":[{"name":"Coimbra Institute of Engineering, Polytechnic University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9660-2011","authenticated-orcid":false,"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[{"name":"Coimbra Institute of Engineering, Polytechnic University of Coimbra, Coimbra, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FG59268.2024.10581988"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10610-020-09441-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0304610"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899367"},{"key":"ref5","volume-title":"Face Morph Tool","year":"2025"},{"key":"ref6","volume-title":"Social Media Post on Threads","year":"2025"},{"key":"ref7","volume-title":"Rihanna at the Fenty Beauty Launch in Paris","year":"2025"},{"key":"ref8","volume-title":"Beyonce at the 55th Annual Grammy Awards","author":"Mujahed","year":"2013"},{"key":"ref9","volume-title":"Rihanna Makeup at Christian Dior Front Row, Paris Fashion Week","year":"2015"},{"key":"ref10","volume-title":"Face Compare Tool","year":"2025"},{"key":"ref11","volume-title":"Check Icon","year":"2025"},{"key":"ref12","volume-title":"Delete Icon","year":"2025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2022.3231450"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5220\/0011606100003411"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW60836.2024.00114"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00158"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43148-7_9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2023.1182375"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-023-01424-2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2023.3324684"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"ref22","first-page":"14","article-title":"Morphing attack detection\u2014State of the art and challenges","volume-title":"20th IAPR\/IEEE Int. Summer School Adv. Stud. Biometrics","author":"Busch"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2398817"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2019.2942395"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13808-w"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s21103466"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007987"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/bme2.12021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7_15"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2021.3066254"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2019.00028"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5220\/0006131100390050"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746477"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3403\/30255472"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3035252"},{"key":"ref37","article-title":"Liveness detection and robust recognition in iris and fingerprint biometric systems","author":"Sequeira","year":"2015"},{"key":"ref38","article-title":"Improving presentation attack detection for ID cards on remote verification systems","author":"Gonzalez","year":"2023","journal-title":"arXiv:2301.09542"},{"issue":"17","key":"ref39","doi-asserted-by":"crossref","first-page":"5686","DOI":"10.3390\/s21175686","article-title":"On the effectiveness of impedance-based fingerprint presentation attack detection","volume":"21","author":"Kolberg","year":"2021","journal-title":"Sensors"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921803"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093488"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994112"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90439-5_23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00158"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG61931.2024.10786732"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB62174.2024.10744532"},{"key":"ref47","volume-title":"FRLL-Morphs Dataset","author":"Inst","year":"2024"},{"key":"ref48","volume-title":"AMSL Face Morph Image Dataset","year":"2025"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0147"},{"key":"ref50","volume-title":"VGGFace2 Dataset","author":"Cao","year":"2024"},{"key":"ref51","article-title":"Vulnerability analysis of face morphing attacks from landmarks and generative adversarial networks","author":"Sarkar","year":"2020","journal-title":"arXiv:2012.05344"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777340"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00167"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS61860.2024.10810695"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-87660-8_26"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484355"},{"key":"ref58","volume-title":"Psychological Image Collection at Stirling (PICS)","year":"2024"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3328227"},{"key":"ref60","volume-title":"ChiMo Dataset","author":"Lab","year":"2023"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB62174.2024.10744518"},{"key":"ref62","volume-title":"FEI Face Database","year":"2024"},{"key":"ref63","volume-title":"FEI-Morph Dataset","author":"Lab","year":"2023"},{"key":"ref64","volume-title":"Face Recognition Technology (FERET)","year":"2024"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10008003"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484383"},{"key":"ref67","volume-title":"Face Recognition Grand Challenge (FRGC)","year":"2024"},{"key":"ref68","volume-title":"Face Research Lab London Set","author":"London","year":"2017"},{"key":"ref69","first-page":"598","article-title":"FaceScape: A large-scale high quality 3D face dataset and detailed riggable 3D face prediction","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR)","author":"Yang"},{"issue":"12","key":"ref70","doi-asserted-by":"crossref","first-page":"14528","DOI":"10.1109\/TPAMI.2023.3307338","article-title":"FaceScape: 3D facial dataset and benchmark for single-view 3D face reconstruction","volume":"45","author":"Zhu","year":"2023","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref71","volume-title":"FaceScape","author":"Zhu","year":"2024"},{"key":"ref72","volume-title":"Flickr-Faces-HQ Dataset (FFHQ)","author":"Karras","year":"2024"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920713"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00037"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68780-9_44"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561898"},{"key":"ref77","volume-title":"ND-IIITD Retouched Face Database","year":"2024"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3212276"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8292"},{"key":"ref80","volume-title":"Scface\u2014Surveillance Cameras Face Database","author":"Grgic","year":"2024"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.16"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref87","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","author":"Tan","year":"2019","journal-title":"arXiv:1905.11946"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.5555\/3298023.3298188"},{"key":"ref90","first-page":"5105","article-title":"PointNet++: Deep hierarchical feature learning on point sets in a metric space","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Qi"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.00167"},{"key":"ref94","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.5244\/c.29.41"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.3390\/app9214500"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1017\/dsj.2020.9"},{"key":"ref101","first-page":"1","article-title":"Generative adversarial networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"3","author":"Goodfellow"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.5220\/0011115100003179"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS46853.2019.9185994"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/B978-0-12-822688-9.00015-3","article-title":"Learning to weight similarity measures with Siamese networks: A case study on optimum-path forest","volume-title":"Optimum-Path Forest","author":"de Rosa","year":"2022"},{"key":"ref105","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv:2010.11929"},{"key":"ref106","volume-title":"StyleGAN2","year":"2024"},{"key":"ref107","volume-title":"FaceMorpher","year":"2024"},{"key":"ref108","volume-title":"OpenCV","author":"Team","year":"2024"},{"key":"ref109","doi-asserted-by":"crossref","DOI":"10.1016\/j.imavis.2021.104109","article-title":"A survey of iris datasets","volume":"108","author":"Omelina","year":"2021","journal-title":"Image Vis. Comput."},{"key":"ref110","volume-title":"Twins Day Dataset 2010\u20132015","author":"Univ","year":"2019"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2010.5543237"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771395"},{"key":"ref113","volume-title":"FVC-onGoing\u2014BOEP","author":"Laboratory","year":"2025"},{"key":"ref114","volume-title":"FVC-onGoing","author":"Lab","year":"2025"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_74"},{"key":"ref116","volume-title":"Face Analysis Technology Evaluation (FATE) MORPH","year":"2025"},{"key":"ref117","volume-title":"State of the Art of Morphing Detection (SOTAMD)","year":"2025"},{"key":"ref118","volume-title":"FVC-onGoing\u2014Background","author":"Laboratory","year":"2025"},{"key":"ref119","article-title":"Unveiling synthetic faces: How synthetic datasets can expose real identities","author":"Shahreza","year":"2024","journal-title":"arXiv:2410.24015"},{"key":"ref120","first-page":"1","article-title":"Towards robust blind face restoration with codebook lookup transformer","volume-title":"Proc. NeurIPS","author":"Zhou"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF62628.2024.10593948"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.5555\/2946645.2946704"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.244"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00894"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3465416.3483305"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01218"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB62174.2024.10744469"},{"key":"ref128","article-title":"On the opportunities and risks of foundation models","author":"Bommasani","year":"2021","journal-title":"arXiv:2108.07258"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11028996.pdf?arnumber=11028996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T05:25:16Z","timestamp":1750829116000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11028996\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":128,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3578199","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}