Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
Mipgan—generating strong and high quality morphing attacks using identity prior driven gan
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
Deep face representations for differential morphing attack detection
U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …
different approaches for morphing attack detection (MAD) have been proposed in the …
Detection of face morphing attacks based on PRNU analysis
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …
pose a severe security risk to face recognition systems. A reliable morphing attack detection …
Morphing attack detection-database, evaluation platform, and benchmarking
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …
the number of advancements reported in recent works, we note serious open issues such as …
Pw-mad: Pixel-wise supervision for generalized face morphing attack detection
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …
major vulnerability to processes based on identity verification, such as border checks …
Differential morph face detection using discriminative wavelet sub-bands
B Chaudhary, P Aghdaie… - Proceedings of the …, 2021 - openaccess.thecvf.com
Face recognition systems are extremely vulnerable to morphing attacks, in which a morphed
facial reference image can be successfully verified as two or more distinct identities. In this …
facial reference image can be successfully verified as two or more distinct identities. In this …
[PDF][PDF] Face recognition vendor test (frvt) part 4: Morph-performance of automated face morph detection
M Ngan, M Ngan, P Grother, K Hanaoka, J Kuo - 2020 - nvlpubs.nist.gov
Background Face morphing and the ability to detect it is an area of high interest to photo-
credential issuance agencies, companies, and organizations employing face recognition for …
credential issuance agencies, companies, and organizations employing face recognition for …
Detecting morphed face attacks using residual noise from deep multi-scale context aggregation network
The evolving deployment of face recognition system has raised concerns regarding the
vulnerability of those systems to various attacks. The morphed face attack involves two …
vulnerability of those systems to various attacks. The morphed face attack involves two …
[HTML][HTML] Towards generalized morphing attack detection by learning residuals
Face recognition systems (FRS) are vulnerable to different kinds of attacks. Morphing attack
combines multiple face images to obtain a single face image that can verify equally against …
combines multiple face images to obtain a single face image that can verify equally against …