{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:25:07Z","timestamp":1725722707339},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1109\/iwbf57495.2023.10157461","type":"proceedings-article","created":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T14:09:54Z","timestamp":1687788594000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins"],"prefix":"10.1109","volume":"50","author":[{"given":"Raghavendra","family":"Ramachandra","sequence":"first","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU),Norway"}]},{"given":"Sushma","family":"Venkatesh","sequence":"additional","affiliation":[{"name":"AiBA AS,Norway"}]},{"given":"Gaurav","family":"Jaswal","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology (IIT),Mandi"}]},{"given":"Guoqiang","family":"Li","sequence":"additional","affiliation":[{"name":"MOBAI AS,Norway"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-017-0231-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024704"},{"article-title":"Deep composite face image attacks: Generation, vulnerability and detection","year":"2022","author":"singh","key":"ref23"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.11.002"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117520"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2016.7791176"},{"journal-title":"Biometrics Special Interest Group (BIOSIG)","article-title":"Decoupling texture blending and shape warping in face morphing","year":"2019","author":"ferrara","key":"ref22"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771395"},{"journal-title":"Lookalike","year":"0","key":"ref21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3215850"},{"key":"ref1","first-page":"1","article-title":"Presentation attack detection methods for face recognition systems: A comprehensive survey","volume":"50","author":"raghavendra","year":"2017","journal-title":"ACM Comput Surv"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1218\/1\/012045"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.226"},{"journal-title":"Facevacs Technology Version 9 4 2","year":"2020","author":"gmbh","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412063"},{"journal-title":"Living Doppelganger","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2015.09.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.celrep.2022.111257"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3072349"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2021.3066254"},{"article-title":"Analyzing human observer ability in morphing attack detection–where do we stand?","year":"2022","author":"godage","key":"ref5"}],"event":{"name":"2023 11th International Workshop on Biometrics and Forensics (IWBF)","start":{"date-parts":[[2023,4,19]]},"location":"Barcelona, Spain","end":{"date-parts":[[2023,4,20]]}},"container-title":["2023 11th International Workshop on Biometrics and Forensics (IWBF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10156869\/10156876\/10157461.pdf?arnumber=10157461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T13:32:26Z","timestamp":1689600746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10157461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iwbf57495.2023.10157461","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]}}}