{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:08:01Z","timestamp":1764688081324,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T00:00:00Z","timestamp":1693785600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,4]]},"DOI":"10.23919\/eusipco58844.2023.10289844","type":"proceedings-article","created":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T13:55:44Z","timestamp":1698846944000},"page":"955-959","source":"Crossref","is-referenced-by-count":8,"title":["Unveiling the Two-Faced Truth: Disentangling Morphed Identities for Face Morphing Detection"],"prefix":"10.23919","author":[{"given":"Eduarda","family":"Caldeira","sequence":"first","affiliation":[{"name":"University of Porto,INESC TEC"}]},{"given":"Pedro C.","family":"Neto","sequence":"additional","affiliation":[{"name":"University of Porto,INESC TEC"}]},{"given":"Tiago","family":"Gon\u00e7alves","sequence":"additional","affiliation":[{"name":"University of Porto,INESC TEC"}]},{"given":"Naser","family":"Damer","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD,TU Darmstadt"}]},{"given":"Ana F.","family":"Sequeira","sequence":"additional","affiliation":[{"name":"University of Porto,INESC TEC"}]},{"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[{"name":"University of Porto,INESC TEC"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.10.081"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3199014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FG52635.2021.9666792"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"ref5","article-title":"Mordeephy: Face morphing detection via fused classification","author":"Medvedev","year":"2022","journal-title":"arXiv preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WACVW54805.2022.00045"},{"key":"ref7","article-title":"Pic-score: Probabilistic interpretable comparison score for optimal matching con-fidence in single-and multi-biometric (face) recognition","author":"Neto","year":"2022","journal-title":"arXiv preprint"},{"key":"ref8","article-title":"Explainable biometrics in the age of deep learning","author":"Neto","year":"2022","journal-title":"arXiv preprint"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90439-5_23"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007950"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BIOSIG55365.2022.9897057"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00167"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF57495.2023.10157869"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10008003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB54206.2022.10007977"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"volume-title":"Face research lab london set","year":"2021","author":"DeBruine","key":"ref18"},{"key":"ref19","article-title":"Vulnerability anal-ysis of face morphing attacks from landmarks and generative adversarial networks","author":"Sarkar","year":"2020","journal-title":"arXiv preprint"},{"key":"ref20","first-page":"12104","article-title":"Training generative adversarial networks with limited data","volume":"33","author":"Karras","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF49977.2020.9107970"},{"key":"ref22","article-title":"debruine\/webmorph: Beta release 2","volume-title":"Zenodo","volume":"5281","author":"DeBruine","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0147"},{"volume-title":"Facemorpher","year":"2019","author":"Quek","key":"ref24"},{"volume-title":"Face morph using opencv - c++ \/ python - learnopencv","year":"2016","author":"Mallick","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52729.2023.00565"},{"key":"ref27","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484374"}],"event":{"name":"2023 31st European Signal Processing Conference (EUSIPCO)","start":{"date-parts":[[2023,9,4]]},"location":"Helsinki, Finland","end":{"date-parts":[[2023,9,8]]}},"container-title":["2023 31st European Signal Processing Conference (EUSIPCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10289698\/10289713\/10289844.pdf?arnumber=10289844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T05:56:41Z","timestamp":1710395801000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10289844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.23919\/eusipco58844.2023.10289844","relation":{},"subject":[],"published":{"date-parts":[[2023,9,4]]}}}