Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

[HTML][HTML] Recent advances in the applicability of drugs as corrosion inhibitor on metal surface: A review

S Tanwer, SK Shukla - Current Research in Green and Sustainable …, 2022 - Elsevier
Corrosion is distruction of the metal surface due to the interaction with its environment. It is
due to the exposure of the metal with a gas and a fluid and it turns into a significant issue as …

Face recognition systems under morphing attacks: A survey

U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …

Transferable deep-cnn features for detecting digital and print-scanned morphed face images

K Raja, S Venkatesh… - Proceedings of the …, 2017 - openaccess.thecvf.com
Face biometrics is widely used in various applications including border control and
facilitating the verification of travellers' identity claim with respect to his electronic passport …

Mipgan—generating strong and high quality morphing attacks using identity prior driven gan

H Zhang, S Venkatesh, R Ramachandra… - … and Identity Science, 2021 - ieeexplore.ieee.org
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …

Privacy-friendly synthetic data for the development of face morphing attack detectors

N Damer, CAF López, M Fang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …

Deep face representations for differential morphing attack detection

U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …

Fake face detection methods: Can they be generalized?

A Khodabakhsh, R Ramachandra… - … conference of the …, 2018 - ieeexplore.ieee.org
With advancements in technology, it is now possible to create representations of human
faces in a seamless manner for fake media, leveraging the large-scale availability of videos …

Face demorphing

M Ferrara, A Franco, D Maltoni - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The morphing attack proved to be a serious threat for modern automated border control
systems where face recognition is used to link the identity of a passenger to his/her e …

Detection of face morphing attacks by deep learning

C Seibold, W Samek, A Hilsmann, P Eisert - Digital Forensics and …, 2017 - Springer
Identification by biometric features has become more popular in the last decade. High
quality video and fingerprint sensors have become less expensive and are nowadays …