{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T06:02:39Z","timestamp":1759384959791,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.23919\/eusipco.2019.8902533","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:39:38Z","timestamp":1574707178000},"page":"1-5","source":"Crossref","is-referenced-by-count":12,"title":["Dempster-Shafer Theory for Fusing Face Morphing Detectors"],"prefix":"10.23919","author":[{"given":"Andrey","family":"Makrushin","sequence":"first","affiliation":[{"name":"University of Magdeburg,Magdeburg,Germany"}]},{"given":"Christian","family":"Kraetzer","sequence":"additional","affiliation":[{"name":"University of Magdeburg,Magdeburg,Germany"}]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[{"name":"University of Magdeburg,Magdeburg,Germany"}]},{"given":"Clemens","family":"Seibold","sequence":"additional","affiliation":[{"name":"Fraunhofer HHI,Berlin,Germany"}]},{"given":"Anna","family":"Hilsmann","sequence":"additional","affiliation":[{"name":"Fraunhofer HHI,Berlin,Germany"}]},{"given":"Peter","family":"Eisert","sequence":"additional","affiliation":[{"name":"Fraunhofer HHI & Humboldt University,Berlin,Germany"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks","author":"seibold","year":"2018","journal-title":"CoRR abs\/1806 04265"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1002\/9781118914564","author":"kuncheva","year":"2014","journal-title":"Combining Pattern Classifiers - Methods and Algorithms"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0147"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5220\/0006131100390050"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3230820.3230822"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553599"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2018.11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"ref18","first-page":"612","article-title":"Practical uses of belief functions","volume":"99","author":"smets","year":"1999","journal-title":"Proc 15th Conf on Uncertainty in Artificial Intelligence"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2014.2361437"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2010.11.008"},{"key":"ref3","first-page":"1","volume":"lncs 1857","author":"dietterich","year":"2000","journal-title":"Ensemble Methods in Machine Learning Multiple Classifier Systems"},{"journal-title":"A Mathematical Theory of Evidence Princeton University Press","year":"1976","author":"shafer","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/095400996116839"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553375"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3082031.3083244"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2017.7935088"},{"key":"ref9","first-page":"107","article-title":"Detection of Face Morphing Attacks by Deep Learning","author":"seibold","year":"2017","journal-title":"Proc IWDW"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1007\/11949619_84","article-title":"Dempster-Shafer Theory based Classifier Fusion for Improved Fingerprint Verification Performance","volume":"lncs 4338","author":"singh","year":"2006","journal-title":"Computer Vision Graphics and Image Processing"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248727"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1093\/lpr\/mgw002"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-319-64185-0_10","article-title":"CNNs under Attack On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing","author":"wandzik","year":"2017","journal-title":"Proc 15th Int Workshop Digit -Forensics Watermarking (IWDW)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/int.20083"},{"journal-title":"ICAO Portrait Quality (Reference Facial Images for MRTD) Version 10 Standard International Civil Aviation organization","year":"2018","author":"wolf","key":"ref25"}],"event":{"name":"2019 27th European Signal Processing Conference (EUSIPCO)","start":{"date-parts":[[2019,9,2]]},"location":"A Coruna, Spain","end":{"date-parts":[[2019,9,6]]}},"container-title":["2019 27th European Signal Processing Conference (EUSIPCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8893974\/8902336\/08902533.pdf?arnumber=8902533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T09:21:36Z","timestamp":1695460896000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8902533\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.23919\/eusipco.2019.8902533","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}