Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Mipgan—generating strong and high quality morphing attacks using identity prior driven gan

H Zhang, S Venkatesh, R Ramachandra… - … and Identity Science, 2021 - ieeexplore.ieee.org
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …

Deep face representations for differential morphing attack detection

U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …

Detection of face morphing attacks based on PRNU analysis

U Scherhag, L Debiasi, C Rathgeb… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …

Morphing attack detection-database, evaluation platform, and benchmarking

K Raja, M Ferrara, A Franco… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …

Pw-mad: Pixel-wise supervision for generalized face morphing attack detection

N Damer, N Spiller, M Fang, F Boutros… - Advances in Visual …, 2021 - Springer
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …

Differential morph face detection using discriminative wavelet sub-bands

B Chaudhary, P Aghdaie… - Proceedings of the …, 2021 - openaccess.thecvf.com
Face recognition systems are extremely vulnerable to morphing attacks, in which a morphed
facial reference image can be successfully verified as two or more distinct identities. In this …

[PDF][PDF] Face recognition vendor test (frvt) part 4: Morph-performance of automated face morph detection

M Ngan, M Ngan, P Grother, K Hanaoka, J Kuo - 2020 - nvlpubs.nist.gov
Background Face morphing and the ability to detect it is an area of high interest to photo-
credential issuance agencies, companies, and organizations employing face recognition for …

Detecting morphed face attacks using residual noise from deep multi-scale context aggregation network

S Venkatesh, R Ramachandra, K Raja… - Proceedings of the …, 2020 - openaccess.thecvf.com
The evolving deployment of face recognition system has raised concerns regarding the
vulnerability of those systems to various attacks. The morphed face attack involves two …

[HTML][HTML] Towards generalized morphing attack detection by learning residuals

K Raja, G Gupta, S Venkatesh, R Ramachandra… - Image and Vision …, 2022 - Elsevier
Face recognition systems (FRS) are vulnerable to different kinds of attacks. Morphing attack
combines multiple face images to obtain a single face image that can verify equally against …