Mordeephy: Face morphing detection via fused classification
I Medvedev, F Shadmand, N Gonçalves - arXiv preprint arXiv:2208.03110, 2022 - arxiv.org
Face morphing attack detection (MAD) is one of the most challenging tasks in the field of
face recognition nowadays. In this work, we introduce a novel deep learning strategy for a …
face recognition nowadays. In this work, we introduce a novel deep learning strategy for a …
Incremental training of face morphing detectors
Recently, the Face Morphing Attack has emerged as a serious and concrete security threat,
and then several Morphing Attack Detectors (MADs) have been proposed in the literature …
and then several Morphing Attack Detectors (MADs) have been proposed in the literature …
Facial de-morphing: Extracting component faces from a single morph
A face morph is created by strategically combining two or more face images corresponding
to multiple identities. The intention is for the morphed image to match with multiple identities …
to multiple identities. The intention is for the morphed image to match with multiple identities …
Revelio: A modular and effective framework for reproducible training and evaluation of morphing attack detectors
Morphing Attack, ie the elusion of face verification systems through a facial morphing
operation between a criminal and an accomplice, has recently emerged as a serious …
operation between a criminal and an accomplice, has recently emerged as a serious …
Automated artifact retouching in morphed images with attention maps
Morphing attack is an important security threat for automatic face recognition systems. High-
quality morphed images, ie images without significant visual artifacts such as ghosts, noise …
quality morphed images, ie images without significant visual artifacts such as ghosts, noise …
Fused Classification For Differential Face Morphing Detection
I Medvedev, JA Pimenta… - Proceedings of the IEEE …, 2024 - openaccess.thecvf.com
Face morphing, a sophisticated presentation attack technique, poses significant security
risks to face recognition systems. Traditional methods struggle to detect morphing attacks …
risks to face recognition systems. Traditional methods struggle to detect morphing attacks …
Combining identity features and artifact analysis for differential morphing attack detection
Due to the importance of the Morphing Attack, the development of new and accurate
Morphing Attack Detection (MAD) systems is urgently needed by private and public …
Morphing Attack Detection (MAD) systems is urgently needed by private and public …
A Real‐Time Biometric Encryption Scheme Based on Fuzzy Logic for IoT
M Moradi, M Moradkhani, MB Tavakoli - Journal of Sensors, 2022 - Wiley Online Library
When milliards of smart devices are connected to the Internet using the Internet of Things
(IoT), robust security methods are required to deliver current information to the objects …
(IoT), robust security methods are required to deliver current information to the objects …
Reliable face morphing attack detection in on-the-fly border control scenario with variation in image resolution and capture distance
JM Singh, R Ramachandra - 2022 IEEE International Joint …, 2022 - ieeexplore.ieee.org
Face Recognition Systems (FRS) are vulnerable to various attacks performed directly and
indirectly. Among these attacks, face morphing attacks are highly potential in deceiving …
indirectly. Among these attacks, face morphing attacks are highly potential in deceiving …
Detecting morphing attacks via continual incremental training
Scenarios in which restrictions in data transfer and storage limit the possibility to compose a
single dataset–also exploiting different data sources–to perform a batch-based training …
single dataset–also exploiting different data sources–to perform a batch-based training …