{"id":"https://openalex.org/W3119283265","doi":"https://doi.org/10.1109/ijcb48548.2020.9304878","title":"Finding the Suitable Doppelg\u00e4nger for a Face Morphing Attack","display_name":"Finding the Suitable Doppelg\u00e4nger for a Face Morphing Attack","publication_year":2020,"publication_date":"2020-09-28","ids":{"openalex":"https://openalex.org/W3119283265","doi":"https://doi.org/10.1109/ijcb48548.2020.9304878","mag":"3119283265"},"language":"en","primary_location":{"id":"doi:10.1109/ijcb48548.2020.9304878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcb48548.2020.9304878","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073640537","display_name":"Alexander Rottcher","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Alexander Rottcher","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security (HGI), Ruhr-Universit\u00e4t, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security (HGI), Ruhr-Universit\u00e4t, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058917746","display_name":"Ulrich Scherhag","orcid":"https://orcid.org/0000-0002-6280-048X"},"institutions":[{"id":"https://openalex.org/I107257983","display_name":"Darmstadt University of Applied Sciences","ror":"https://ror.org/047wbd030","country_code":"DE","type":"education","lineage":["https://openalex.org/I107257983"]},{"id":"https://openalex.org/I4210099379","display_name":"Zimmer Biomet (Germany)","ror":"https://ror.org/016731f38","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210099379","https://openalex.org/I4210115238"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ulrich Scherhag","raw_affiliation_strings":["da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Germany","institution_ids":["https://openalex.org/I107257983","https://openalex.org/I4210099379"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017716310","display_name":"Christoph Busch","orcid":"https://orcid.org/0000-0002-9159-2923"},"institutions":[{"id":"https://openalex.org/I4210099379","display_name":"Zimmer Biomet (Germany)","ror":"https://ror.org/016731f38","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210099379","https://openalex.org/I4210115238"]},{"id":"https://openalex.org/I107257983","display_name":"Darmstadt University of Applied Sciences","ror":"https://ror.org/047wbd030","country_code":"DE","type":"education","lineage":["https://openalex.org/I107257983"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christoph Busch","raw_affiliation_strings":["da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Germany","institution_ids":["https://openalex.org/I107257983","https://openalex.org/I4210099379"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5073640537"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":1.0747,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.803455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11094","display_name":"Face Recognition and Perception","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/morphing","display_name":"Morphing","score":0.9638282060623169},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7529420852661133},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.7485046982765198},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.6574735641479492},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5940007567405701},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5791726112365723},{"id":"https://openalex.org/keywords/optimal-distinctiveness-theory","display_name":"Optimal distinctiveness theory","score":0.5776466131210327},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5563035607337952},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5202375650405884},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.4727020263671875},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.40011078119277954},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3618612289428711},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3508278727531433},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.34916621446609497},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17522692680358887},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1384599506855011}],"concepts":[{"id":"https://openalex.org/C50637493","wikidata":"https://www.wikidata.org/wiki/Q1136781","display_name":"Morphing","level":2,"score":0.9638282060623169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7529420852661133},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.7485046982765198},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.6574735641479492},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5940007567405701},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5791726112365723},{"id":"https://openalex.org/C47385372","wikidata":"https://www.wikidata.org/wiki/Q7098943","display_name":"Optimal distinctiveness theory","level":2,"score":0.5776466131210327},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5563035607337952},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5202375650405884},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.4727020263671875},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.40011078119277954},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3618612289428711},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3508278727531433},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34916621446609497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17522692680358887},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1384599506855011},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcb48548.2020.9304878","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcb48548.2020.9304878","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Joint Conference on Biometrics (IJCB)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1973614050","https://openalex.org/W1976230226","https://openalex.org/W2027248950","https://openalex.org/W2068115726","https://openalex.org/W2115252128","https://openalex.org/W2222512263","https://openalex.org/W2513140567","https://openalex.org/W2599085778","https://openalex.org/W2759430372","https://openalex.org/W2783693055","https://openalex.org/W2902126751","https://openalex.org/W2913239513","https://openalex.org/W2969985801","https://openalex.org/W3006386710","https://openalex.org/W3024925547","https://openalex.org/W3210232381","https://openalex.org/W4235234911","https://openalex.org/W6677618333","https://openalex.org/W6725923168","https://openalex.org/W6803376173"],"related_works":["https://openalex.org/W1679315481","https://openalex.org/W3151495635","https://openalex.org/W4385170164","https://openalex.org/W4225552138","https://openalex.org/W2032875729","https://openalex.org/W4236870338","https://openalex.org/W2016917053","https://openalex.org/W3046185751","https://openalex.org/W1580681114","https://openalex.org/W51472912"],"abstract_inverted_index":{"ID":[0,105],"cards":[1],"are":[2],"uniquely":[3],"linked":[4],"to":[5,74,95],"one":[6],"individual":[7],"via":[8],"a":[9,46,51,88,123,141,146,170],"printed":[10],"or":[11,97],"electronically":[12],"provided":[13],"facial":[14,90],"image.":[15],"Even":[16],"though":[17],"the":[18,76,79,107,120,131,152,189,207],"face":[19,193],"is":[20,93,126,182],"treated":[21],"as":[22,45],"universal":[23],"and":[24,118,175],"distinctive":[25],"characteristic,":[26],"twins":[27],"can":[28,65,111],"weaken":[29],"this":[30,58,185],"distinctiveness":[31],"because":[32],"of":[33,61,78,122,135,145,154,173,191,204,209],"their":[34],"biological":[35,59],"similarity.":[36],"Also,":[37],"humans":[38],"might":[39],"falsely":[40],"recognise":[41],"an":[42,104,201],"unknown":[43],"person":[44],"friend":[47],"-":[48],"colloquially":[49],"named":[50],"Dop-pelg\u00e4nger.":[52],"Recently":[53],"it":[54,197],"was":[55],"demonstrated":[56],"that":[57,184,200],"effect":[60],"similar":[62,94],"data":[63,99],"subjects":[64],"be":[66,112],"purposefully":[67],"established":[68],"between":[69],"two":[70,96],"individuals":[71,117],"in":[72,169],"order":[73],"improve":[75],"vulnerability":[77,190],"so-called":[80],"morphing":[81,212],"attack.":[82],"This":[83,128],"image":[84,91,110],"manipulation":[85],"technique":[86],"creates":[87],"melted":[89],"which":[92],"more":[98],"subjects.":[100],"If":[101],"embedded":[102],"into":[103],"card,":[106],"manipulated":[108],"reference":[109],"used":[113],"by":[114],"all":[115],"participating":[116],"thus":[119],"concept":[121],"unique":[124],"link":[125],"broken.":[127],"work":[129],"elaborates":[130],"rather":[132],"neglected":[133],"part":[134],"selecting":[136],"morph":[137,179],"pairs":[138,205],"based":[139],"on":[140],"similarity":[142],"score":[143],"instead":[144],"simple":[147],"random":[148],"assignment.":[149],"It":[150,181],"discusses":[151],"applicability":[153],"different":[155],"possible":[156],"algorithms.":[157,213],"The":[158],"finally":[159],"developed":[160],"approach":[161],"considers":[162],"complex":[163],"real-world":[164],"constraints":[165],"while":[166],"being":[167],"executable":[168],"reasonable":[171],"amount":[172],"time":[174],"producing":[176],"acceptable":[177],"large":[178],"sets.":[180],"shown":[183],"algorithm":[186],"greatly":[187],"increases":[188],"automated":[192],"recognition":[194],"systems.":[195],"Surprisingly,":[196],"also":[198],"proves":[199],"effective":[202],"pre-selection":[203],"questions":[206],"need":[208],"in-depth":[210],"optimized":[211]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
