Fig. 3From: Potential advantages and limitations of using information fusion in media forensics—a discussion on the example of detecting face morphing attacksOur enhanced evaluation concept—switching from “MAD in identity verification” to “MAD in document issuing” is done by deactivating the dashed boxesBack to article page