Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Face recognition systems under morphing attacks: A survey

U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …

Weaponized AI for cyber attacks

MM Yamin, M Ullah, H Ullah, B Katt - Journal of Information Security and …, 2021 - Elsevier
Artificial intelligence (AI)-based technologies are actively used for purposes of cyber
defense. With the passage of time and with decreasing complexity in implementing AI-based …

Deep face representations for differential morphing attack detection

U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …

Detection of face morphing attacks based on PRNU analysis

U Scherhag, L Debiasi, C Rathgeb… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …

Makeup presentation attacks: Review and detection performance benchmark

C Rathgeb, P Drozdowski, C Busch - IEEE Access, 2020 - ieeexplore.ieee.org
The application of facial cosmetics may cause substantial alterations in the facial
appearance, which can degrade the performance of facial biometrics systems. Additionally …

Morphing attack detection-database, evaluation platform, and benchmarking

K Raja, M Ferrara, A Franco… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …

Detecting morphed face images using facial landmarks

U Scherhag, D Budhrani, M Gomez-Barrero… - Image and Signal …, 2018 - Springer
With the widespread deployment of automatic biometric recognition systems, some security
issues have been unveiled. In particular, face recognition systems have been recently …

Differential morph face detection using discriminative wavelet sub-bands

B Chaudhary, P Aghdaie… - Proceedings of the …, 2021 - openaccess.thecvf.com
Face recognition systems are extremely vulnerable to morphing attacks, in which a morphed
facial reference image can be successfully verified as two or more distinct identities. In this …

[PDF][PDF] Face recognition vendor test (frvt) part 4: Morph-performance of automated face morph detection

M Ngan, M Ngan, P Grother, K Hanaoka, J Kuo - 2020 - nvlpubs.nist.gov
Background Face morphing and the ability to detect it is an area of high interest to photo-
credential issuance agencies, companies, and organizations employing face recognition for …