Fig. 2From: Potential advantages and limitations of using information fusion in media forensics—a discussion on the example of detecting face morphing attacksEvaluation concept for MAD in identity verification from [7]Back to article page