{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:50:59Z","timestamp":1761648659694,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/btas.2018.8698557","type":"proceedings-article","created":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T03:48:37Z","timestamp":1556250517000},"page":"1-9","source":"Crossref","is-referenced-by-count":16,"title":["CrazyFaces: Unassisted Circumvention of Watchlist Face Identification"],"prefix":"10.1109","author":[{"given":"Naser","family":"Damer","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"given":"Yaza","family":"Wainakh","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"given":"Viola","family":"Boller","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"given":"Sven von den","family":"Berken","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"given":"Philipp","family":"TerhOrst","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"given":"Andreas","family":"Braun","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"given":"Arjan","family":"Kuijper","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISBA.2016.7477243"},{"key":"ref31","first-page":"5306","volume":"5306","author":"uludag","year":"2004","journal-title":"Attacks on biometric systems a case study in fingerprints"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2017.193"},{"key":"ref10","first-page":"85","article-title":"Personalized face reference from video: Key-face selection and feature-level fusion","author":"damer","year":"2014","journal-title":"Face and Facial Expression Recognition from Real World Videos -International Workshop FFER ICPR 2014 Stockholm Sweden August 24 2014 Revised Selected Papers volume 8912 of Lecture Notes in Computer Science"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545037"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"ref14","article-title":"Face to anti-face","author":"harvey","year":"2013","journal-title":"The New York Times"},{"journal-title":"ISO\/IEC DIS 30107-3 2016 Information Technology Biometric presentation attack detection Part 1 Framework Standard","article-title":"International Organization for Standardization","year":"2017","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.241"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272703"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-932-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2015.0008"},{"key":"ref28","article-title":"Klage gegen spielhallen-betreiber ich bin suchtig, sperrt&#x00FC;mich aus","author":"schulz","year":"2017","journal-title":"Spiegel Online"},{"key":"ref4","article-title":"Facial recognition surveillance test extended at berlin train station","author":"chase","year":"2017","journal-title":"Deutsche Welle"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"journal-title":"Biometrics Personal Identification in Networked Society Personal Identification in Networked Society","year":"1998","author":"bolle","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"On the effectiveness of local binary patterns in face anti-spoofing","volume":"197 of ln","author":"chingovska","year":"2012","journal-title":"In A Bromme and C Busch editors 2012 BIOSIG -Proceedings of the International Conference of Biometrics Special Interest Group"},{"journal-title":"The Yunnan Provincial Public Security Department leverages SenseFace","year":"2018","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6612994"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613026"},{"key":"ref2","article-title":"Openface: A general-purpose face recognition library with mobile applications","author":"amos","year":"2016","journal-title":"CMU School of Computer Science Technical Report CMU-CS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.112"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24670-1_36"},{"journal-title":"Facial Recognition Market by Component (Software Tools and Services) Technology Use Case (Emotion Recognition Attendance Tracking and Monitoring Access Control Law Enforcement) End-User and Region -Global Forecast to 2022","year":"2017","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3038924"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2395951"},{"key":"ref26","first-page":"1822","article-title":"Transferable deep-cnn features for detecting digital and print-scanned morphed face images","author":"ramachandra","year":"2017","journal-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops CVPR Workshops"},{"key":"ref25","first-page":"555","article-title":"Face morphing versus face averaging: Vulnerability and detection","author":"ramachandra","year":"2017","journal-title":"2017 IEEE International Joint Conference on Biometrics IJCB 2017"}],"event":{"name":"2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)","start":{"date-parts":[[2018,10,22]]},"location":"Redondo Beach, CA, USA","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8692576\/8698537\/08698557.pdf?arnumber=8698557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T21:13:56Z","timestamp":1623186836000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8698557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/btas.2018.8698557","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}