Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
[HTML][HTML] Recent advances in the applicability of drugs as corrosion inhibitor on metal surface: A review
S Tanwer, SK Shukla - Current Research in Green and Sustainable …, 2022 - Elsevier
Corrosion is distruction of the metal surface due to the interaction with its environment. It is
due to the exposure of the metal with a gas and a fluid and it turns into a significant issue as …
due to the exposure of the metal with a gas and a fluid and it turns into a significant issue as …
Face recognition systems under morphing attacks: A survey
U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …
systems increases their vulnerability against attacks. In particular, the attacks based on …
Transferable deep-cnn features for detecting digital and print-scanned morphed face images
K Raja, S Venkatesh… - Proceedings of the …, 2017 - openaccess.thecvf.com
Face biometrics is widely used in various applications including border control and
facilitating the verification of travellers' identity claim with respect to his electronic passport …
facilitating the verification of travellers' identity claim with respect to his electronic passport …
Mipgan—generating strong and high quality morphing attacks using identity prior driven gan
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
Privacy-friendly synthetic data for the development of face morphing attack detectors
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …
solutions be successfully developed based on synthetic data?". Towards that, this work …
Deep face representations for differential morphing attack detection
U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …
different approaches for morphing attack detection (MAD) have been proposed in the …
Fake face detection methods: Can they be generalized?
A Khodabakhsh, R Ramachandra… - … conference of the …, 2018 - ieeexplore.ieee.org
With advancements in technology, it is now possible to create representations of human
faces in a seamless manner for fake media, leveraging the large-scale availability of videos …
faces in a seamless manner for fake media, leveraging the large-scale availability of videos …
Detection of face morphing attacks by deep learning
Identification by biometric features has become more popular in the last decade. High
quality video and fingerprint sensors have become less expensive and are nowadays …
quality video and fingerprint sensors have become less expensive and are nowadays …