{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T14:41:45Z","timestamp":1726152105565},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030129385"},{"type":"electronic","value":"9783030129392"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12939-2_36","type":"book-chapter","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T19:07:18Z","timestamp":1550171238000},"page":"518-534","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7910-7895","authenticated-orcid":false,"given":"Naser","family":"Damer","sequence":"first","affiliation":[]},{"given":"Viola","family":"Boller","sequence":"additional","affiliation":[]},{"given":"Yaza","family":"Wainakh","sequence":"additional","affiliation":[]},{"given":"Fadi","family":"Boutros","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Terh\u00f6rst","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Arjan","family":"Kuijper","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,14]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, A., Singh, R., Vatsa, M., Noore, A.: SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1\u20134 October 2017, pp. 659\u2013665. IEEE (2017)","DOI":"10.1109\/BTAS.2017.8272754"},{"key":"36_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-540-24670-1_36","volume-title":"Computer Vision - ECCV 2004","author":"T Ahonen","year":"2004","unstructured":"Ahonen, T., Hadid, A., Pietik\u00e4inen, M.: Face recognition with local binary patterns. In: Pajdla, T., Matas, J. (eds.) ECCV 2004. LNCS, vol. 3021, pp. 469\u2013481. Springer, Heidelberg (2004). \n https:\/\/doi.org\/10.1007\/978-3-540-24670-1_36"},{"key":"36_CR3","unstructured":"Amos, B., Ludwiczuk, B., Satyanarayanan, M.: OpenFace: a general-purpose face recognition library with mobile applications. Technical report, CMU-CS-16-118, CMU School of Computer Science (2016)"},{"key":"36_CR4","unstructured":"Biometix Pty Ltd.: Face morphing dataset (for vulnerability research) (2017). \n http:\/\/www.biometix.com\/2017\/09\/18\/new-face-morphing-dataset-for-vulnerability-research\/"},{"volume-title":"Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society","year":"1998","author":"R Bolle","key":"36_CR5","unstructured":"Bolle, R., Pankanti, S.: Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell (1998)"},{"key":"36_CR6","unstructured":"Cao, X., Wei, Y., Wen, F., Sun, J.: Face alignment by explicit shape regression. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 16\u201321 June 2012, pp. 2887\u20132894. IEEE Computer Society (2012)"},{"key":"36_CR7","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, USA, 20\u201326 June 2005, pp. 886\u2013893. IEEE Computer Society (2005)"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Damer, N., et al.: CrazyFaces: unassisted circumvention of watchlist face identification. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2018, Los Angeles, California, USA, 22\u201325 October 2018. IEEE (2018)","DOI":"10.1109\/BTAS.2018.8698557"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Damer, N., Dimitrov, K.: Practical view on face presentation attack detection. In: Wilson, R.C., Hancock, E.R., Smith, W.A.P. (eds.) Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, 19\u201322 September 2016. BMVA Press (2016)","DOI":"10.5244\/C.30.112"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Damer, N., Saladi\u00e9, A.M., Braun, A., Kuijper, A.: MorGAN: recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2018, Los Angeles, California, USA, 22\u201325 October 2018. IEEE (2018)","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Damer, N., et al.: Deep learning-based face recognition and the robustness to perspective distortion. In: 24th International Conference on Pattern Recognition, ICPR 2018, Beijing, China, August 2018. IEEE (2018)","DOI":"10.1109\/ICPR.2018.8545037"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Dhamecha, T.I., Nigam, A., Singh, R., Vatsa, M.: Disguise detection and face recognition in visible and thermal spectrums. In: Fi\u00e9rrez, J., Kumar, A., Vatsa, M., Veldhuis, R.N.J., Ortega-Garcia, J. (eds.) International Conference on Biometrics, ICB 2013, Madrid, Spain, 4\u20137 June 2013, pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/ICB.2013.6613019"},{"issue":"4","key":"36_CR13","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1109\/TIFS.2016.2639345","volume":"12","author":"M Ferrara","year":"2017","unstructured":"Ferrara, M., Cappelli, R., Maltoni, D.: On the feasibility of creating double-identity fingerprints. IEEE Trans. Inf. Forensics Secur. 12(4), 892\u2013900 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics, Clearwater, IJCB 2014, FL, USA, 29 September\u20132 October 2014, pp. 1\u20137. IEEE (2014)","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"36_CR15","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-28501-6_9","volume-title":"Face Recognition Across the Imaging Spectrum","author":"M Ferrara","year":"2016","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: On the effects of image alterations on face recognition accuracy. In: Bourlai, T. (ed.) Face Recognition Across the Imaging Spectrum, pp. 195\u2013222. Springer, Cham (2016). \n https:\/\/doi.org\/10.1007\/978-3-319-28501-6_9"},{"issue":"4","key":"36_CR16","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/TIFS.2017.2777340","volume":"13","author":"M Ferrara","year":"2018","unstructured":"Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. IEEE Trans. Inf. Forensics Secur. 13(4), 1008\u20131017 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Hildebrandt, M., Neubert, T., Makrushin, A., Dittmann, J.: Benchmarking face morphing forgery detection: application of stirtrace for impact simulation of different processing steps. In: 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, 4\u20135 April 2017, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/IWBF.2017.7935087"},{"key":"36_CR18","unstructured":"International Civil Aviation Organisation (ICAO): ICAO draft technical report: portrait quality (reference facial images for MRTD). Technical report (version), September 2017"},{"key":"36_CR19","unstructured":"International Organization for Standardization: ISO\/IEC DIS 30107\u20133:2016: information technology - biometric presentation attack detection - part 3: testing and reporting. Standard (2017)"},{"key":"36_CR20","unstructured":"K\u00e4hm, O., Damer, N.: 2D face liveness detection: an overview. In: Br\u00f6mme, A., Busch, C. (eds.) Proceedings of the International Conference of Biometrics Special Interest Group, 2012 BIOSIG, Darmstadt, Germany, 6\u20137 September 2012. LNI, vol. 197, pp. 1\u201312. IEEE\/GI (2012)"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, 23\u201328 June 2014, pp. 1867\u20131874. IEEE Computer Society (2014)","DOI":"10.1109\/CVPR.2014.241"},{"key":"36_CR22","unstructured":"Mallick, S.: Face morph using opencv - c++\/python (2016). \n https:\/\/www.learnopencv.com\/face-morph-using-opencv-cpp-python\/"},{"key":"36_CR23","unstructured":"Markets and Markets: Facial recognition market by component (software tools and services), technology, use case (emotion recognition, attendance tracking and monitoring, access control, law enforcement), end-user, and region - global forecast to 2022. Report, November 2017"},{"key":"36_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-64185-0_8","volume-title":"Digital Forensics and Watermarking","author":"T Neubert","year":"2017","unstructured":"Neubert, T.: Face morphing detection: an approach based on image degradation analysis. In: Kraetzer, C., Shi, Y.-Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 93\u2013106. Springer, Cham (2017). \n https:\/\/doi.org\/10.1007\/978-3-319-64185-0_8"},{"issue":"10","key":"36_CR25","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/34.879790","volume":"22","author":"PJ Phillips","year":"2000","unstructured":"Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1090\u20131104 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"5","key":"36_CR26","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0262-8856(97)00070-X","volume":"16","author":"PJ Phillips","year":"1998","unstructured":"Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.J.: The FERET database and evaluation procedure for face-recognition algorithms. Image Vis. Comput. 16(5), 295\u2013306 (1998)","journal-title":"Image Vis. Comput."},{"key":"36_CR27","doi-asserted-by":"crossref","unstructured":"Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Face morphing versus face averaging: vulnerability and detection. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1\u20134 October 2017, pp. 555\u2013563. IEEE (2017)","DOI":"10.1109\/BTAS.2017.8272742"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops, Honolulu, HI, USA, 21\u201326 July 2017, pp. 1822\u20131830. IEEE Computer Society (2017)","DOI":"10.1109\/CVPRW.2017.228"},{"key":"36_CR29","doi-asserted-by":"crossref","unstructured":"Ramachandra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: 8th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, Niagara Falls, NY, USA, 6\u20139 September 2016, pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/BTAS.2016.7791169"},{"key":"36_CR30","doi-asserted-by":"crossref","unstructured":"Rathgeb, C., Busch, C.: On the feasibility of creating morphed iris-codes. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1\u20134 October 2017, pp. 152\u2013157. IEEE (2017)","DOI":"10.1109\/BTAS.2017.8272693"},{"key":"36_CR31","doi-asserted-by":"crossref","unstructured":"Ren, S., Cao, X., Wei, Y., Sun, J.: Face alignment at 3000 FPS via regressing local binary features. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, 23\u201328 June 2014, pp. 1685\u20131692. IEEE Computer Society (2014)","DOI":"10.1109\/CVPR.2014.218"},{"issue":"3","key":"36_CR32","first-page":"1","volume":"12","author":"DJ Robertson","year":"2017","unstructured":"Robertson, D.J., Kramer, R.S.S., Burton, A.M.: Fraudulent ID using face morphs: experiments on human and automatic recognition. PLoS One 12(3), 1\u201312 (2017)","journal-title":"PLoS One"},{"key":"36_CR33","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.imavis.2016.01.002","volume":"47","author":"C Sagonas","year":"2016","unstructured":"Sagonas, C., Antonakos, E., Tzimiropoulos, G., Zafeiriou, S., Pantic, M.: 300 faces in-the-wild challenge: database and results. Image Vis. Comput. 47, 3\u201318 (2016)","journal-title":"Image Vis. Comput."},{"key":"36_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-319-94211-7_48","volume-title":"Image and Signal Processing","author":"U Scherhag","year":"2018","unstructured":"Scherhag, U., Budhrani, D., Gomez-Barrero, M., Busch, C.: Detecting morphed face images using facial landmarks. In: Mansouri, A., El Moataz, A., Nouboud, F., Mammass, D. (eds.) ICISP 2018. LNCS, vol. 10884, pp. 444\u2013452. Springer, Cham (2018). \n https:\/\/doi.org\/10.1007\/978-3-319-94211-7_48"},{"key":"36_CR35","doi-asserted-by":"crossref","unstructured":"Scherhag, U., et al.: Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: Br\u00f6mme, A., Busch, C., Dantcheva, A., Rathgeb, C., Uhl, A. (eds.) International Conference of the Biometrics Special Interest Group, BIOSIG 2017, Darmstadt, Germany, 20\u201322 September 2017. LNI, vol. P-270, pp. 149\u2013159. GI\/IEEE (2017)","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"36_CR36","doi-asserted-by":"crossref","unstructured":"Scherhag, U., Ramachandra, R., Raja, K.B., Gomez-Barrero, M., Rathgeb, C., Busch, C.: On the vulnerability of face recognition systems towards morphed face attacks. In: 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, 4\u20135 April 2017, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/IWBF.2017.7935088"},{"key":"36_CR37","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, 7\u201312 June 2015, pp. 815\u2013823. IEEE Computer Society (2015)","DOI":"10.1109\/CVPR.2015.7298682"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12939-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:36:55Z","timestamp":1558478215000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12939-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129385","9783030129392"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12939-2_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GCPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"German Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stuttgart","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dagm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/gcprvmv2018.vis.uni-stuttgart.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"118","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.92","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}