{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:15:46Z","timestamp":1775294146136,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.23919\/eusipco.2018.8553599","type":"proceedings-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T19:36:41Z","timestamp":1543865801000},"page":"1017-1021","source":"Crossref","is-referenced-by-count":21,"title":["An Overview of Recent Advances in Assessing and Mitigating the Face Morphing Attack"],"prefix":"10.23919","author":[{"given":"Andrey","family":"Makrushin","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Openface: A general-purpose face recognition library with mobile applications","author":"amos","year":"2016","journal-title":"CMU School of Computer Science Technical Report CMU-CS"},{"key":"ref38","year":"2018","journal-title":"Cognitech Face vacs"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref32","article-title":"Progressive Growing of GANs for Improved Quality, Stability, and Variation","author":"karras","year":"2018","journal-title":"Proc ICLR"},{"key":"ref31","year":"2018","journal-title":"FERET face dataset"},{"key":"ref30","year":"2018","journal-title":"Biomet"},{"key":"ref37","year":"2018","journal-title":"Eyedea recognition Eyeface sdk"},{"key":"ref36","year":"2018","journal-title":"Luxand Luxand FaceSDK"},{"key":"ref35","year":"2018","journal-title":"Neurotechnology Veri Look Face Verification SDK"},{"key":"ref34","year":"2015","journal-title":"Best Practice Technical Guidelines for Automated Border Control (ABC) Systems"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1145\/2897824.2925871","article-title":"Transfiguring portraits","volume":"35","author":"kemelmacher-shlizerman","year":"2016","journal-title":"ACM Trans on Graphics"},{"key":"ref40","article-title":"Deep face recognition","author":"parkhi","year":"2015","journal-title":"Proc British machine vision conference"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.397"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9280.00088"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"359","DOI":"10.3758\/BF03207733","article-title":"Morphing techniques for manipulating face images","volume":"31","author":"steyvers","year":"1999","journal-title":"Behavior Research Methods"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173319"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-64185-0_10","article-title":"CNNs under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing","author":"wandzik","year":"2017","journal-title":"Proc of the 10th International Workshop on Digital Forensics and Watermarking"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2777340"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0147"},{"key":"ref18","article-title":"The AR Face Database","author":"martinez","year":"1998","journal-title":"Tech Rep #24"},{"key":"ref19","year":"2018","journal-title":"FVC onGoing Face Morphing Challenge"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.42.1.286"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s003710050148"},{"key":"ref27","article-title":"Detection of Face Morphing Attacks by Deep Learning","author":"seibold","year":"2017","journal-title":"Proc IWDW"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083244"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935088"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/38.946630"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"ref8","author":"wolf","year":"2016","journal-title":"ICAO Portrait Quality (Reference Facial Images for MRTD) Version 0 7 Standard"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935087"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272754"},{"key":"ref1","article-title":"Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey","volume":"50","author":"raghavendra","year":"2017","journal-title":"ACM Comput Surv"},{"key":"ref46","year":"2018"},{"key":"ref20","article-title":"Detecting Morphed Facial Images","author":"raghavendra","year":"2016","journal-title":"IEEE Int Conf on Biometrics Theory Applications and Systems (BTAS)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272742"},{"key":"ref42","article-title":"Image Degradation: A First Detection Approach for Face Morphing Forgeries","author":"neubert","year":"2017","journal-title":"Proc IWDW"},{"key":"ref24","year":"2018","journal-title":"Utrecht ECVP face database"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.228"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0006131100390050"},{"key":"ref44","year":"2017","journal-title":"Information Technology - Biometric presentation attack detection - Part 3 Testing and Reporting"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2008.4813399"},{"key":"ref43","article-title":"Topological Data Analysis for Image Tampering Detection","author":"asaad","year":"2017","journal-title":"Proc IWDW"},{"key":"ref25","year":"2018","journal-title":"FEI Face Database"}],"event":{"name":"2018 26th European Signal Processing Conference (EUSIPCO)","location":"Rome","start":{"date-parts":[[2018,9,3]]},"end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 26th European Signal Processing Conference (EUSIPCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537458\/8552938\/08553599.pdf?arnumber=8553599","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T08:34:16Z","timestamp":1775291656000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8553599\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":46,"URL":"https:\/\/doi.org\/10.23919\/eusipco.2018.8553599","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}