{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T05:34:35Z","timestamp":1648791275800},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T00:00:00Z","timestamp":1576195200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T00:00:00Z","timestamp":1576195200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11623-019-1219-y","type":"journal-article","created":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T09:21:57Z","timestamp":1576228917000},"page":"38-42","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Morphing-Angriffe"],"prefix":"10.1007","volume":"44","author":[{"given":"Johannes","family":"Merkle","sequence":"first","affiliation":[]},{"given":"Christian","family":"Rathgeb","sequence":"additional","affiliation":[]},{"given":"Ulrich","family":"Scherhag","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"key":"1219_CR1","doi-asserted-by":"crossref","unstructured":"M. Ferrara, A. Franco und D. Maltoni, \u201eOn the Effects of Image Alterations on Face Recognition Accuracy,\u201c in Face Recognition Across the Imaging Spectrum, Springer International Publishing, 2016.","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"1219_CR2","doi-asserted-by":"crossref","unstructured":"J. D. Robertson, A. G. Mungall, D. Watson, A. K. Wade, J. S. Nightingale und S. Butler, \u201eDetecting morphed passport photos: a training and individual differences approach,\u201c Cognitive Research: Principles and Implications, 2018.","DOI":"10.1186\/s41235-018-0113-8"},{"key":"1219_CR3","doi-asserted-by":"publisher","first-page":"23012","DOI":"10.1109\/ACCESS.2019.2899367","volume":"7","author":"U Scherhag","year":"2019","unstructured":"U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt, and C. Busch. Face recognition systems under morphing attacks: A survey. IEEE Access, 7:23012\u201323026, 2019.","journal-title":"IEEE Access"},{"key":"1219_CR4","unstructured":"ISO\/IEC JTC1 SC37 Biometrics, ISO\/IEC IS 30107-3:2017, IT \u2013 Biometric presentation attack detection \u2013 Part 3: Testing and Reporting, 2017."},{"key":"1219_CR5","doi-asserted-by":"crossref","unstructured":"U. Scherhag, A. Nautsch, C. Rathgeb, M. Gomez-Barrero, R. N. J. Veldhuis, L. Spreeuwers, M. Schils, D. Maltoni, P. Grother, S. Marcel, R. Breithaupt und R. Ramachandra, \u201eBiometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting,\u201c in Proceedings of the 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), 2017.","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"1219_CR6","unstructured":"R. Ramachandra, K. B. Raja und C. Busch, \u201eDetecting morphed face images,\u201c in Proceedings of the 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), 2016."},{"key":"1219_CR7","doi-asserted-by":"crossref","unstructured":"C. Kraetzer, A. Makrushin, T. Neubert, M. Hildebrandt und J. Dittmann, \u201eModeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing,\u201c in Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security \u2013 IHMMSec \u201817, 2017.","DOI":"10.1145\/3082031.3083244"},{"key":"1219_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-319-64185-0_9","volume-title":"Digital Forensics and Watermarking","author":"Clemens Seibold","year":"2017","unstructured":"C. Seibold, W. Samek, A. Hilsmann und P. Eisert, \u201eDetection of Face Morphing Attacks by Deep Learning,\u201c in Digital Forensics and Watermarking, 2017."},{"key":"1219_CR9","doi-asserted-by":"crossref","unstructured":"U. Scherhag, C. Rathgeb und C. Busch, \u201eTowards detection of morphed face images in electronic travel documents,\u201c in Proceedings of the 13th IAPR Workshop on Document Analysis Systems (DAS), 2018.","DOI":"10.1109\/DAS.2018.11"},{"key":"1219_CR10","doi-asserted-by":"crossref","unstructured":"M. Ferrara, A. Franco und D. Maltoni, \u201eFace Demorphing,\u201c IEEE Transactions on Information Forensics and Security, 2018.","DOI":"10.1109\/TIFS.2017.2777340"},{"key":"1219_CR11","unstructured":"M. Ngan, P. Grother und K. Hanaoka, \u201ePerformance of Automated Facial Morph Detection and Morph Resistant Face Recognition Algorithms,\u201c National Institute of Standards and Technology (NIST), 2018."},{"key":"1219_CR12","unstructured":"International Civil Aviation Organization, ICAO Doc 9303, Machine Readable Travel Documents \u2013 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs (7th edition), 2015."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1219-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-019-1219-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-019-1219-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,12]],"date-time":"2020-12-12T01:05:14Z","timestamp":1607735114000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-019-1219-y"}},"subtitle":["Ein Sicherheitsrisiko f\u00fcr Gesichtserkennungssysteme"],"short-title":[],"issued":{"date-parts":[[2019,12,13]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["1219"],"URL":"https:\/\/doi.org\/10.1007\/s11623-019-1219-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,13]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}