Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
A comprehensive survey on techniques to handle face identity threats: challenges and opportunities
The human face is considered the prime entity in recognizing a person's identity in our
society. Henceforth, the importance of face recognition systems is growing higher for many …
society. Henceforth, the importance of face recognition systems is growing higher for many …
Face recognition systems under morphing attacks: A survey
U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …
systems increases their vulnerability against attacks. In particular, the attacks based on …
Mipgan—generating strong and high quality morphing attacks using identity prior driven gan
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
Privacy-friendly synthetic data for the development of face morphing attack detectors
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …
solutions be successfully developed based on synthetic data?". Towards that, this work …
Deep face representations for differential morphing attack detection
U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …
different approaches for morphing attack detection (MAD) have been proposed in the …
Detection of face morphing attacks based on PRNU analysis
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …
pose a severe security risk to face recognition systems. A reliable morphing attack detection …
Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network
Face morphing attacks aim at creating face images that are verifiable to be the face of
multiple identities, which can lead to building faulty identity links in operations like border …
multiple identities, which can lead to building faulty identity links in operations like border …
Can GAN generated morphs threaten face recognition systems equally as landmark based morphs?-vulnerability and detection
The primary objective of face morphing is to com-bine face images of different data subjects
(eg an malicious actor and an accomplice) to generate a face image that can be equally …
(eg an malicious actor and an accomplice) to generate a face image that can be equally …
Morphing attack detection-database, evaluation platform, and benchmarking
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …
the number of advancements reported in recent works, we note serious open issues such as …