Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

A comprehensive review of face morph generation and detection of fraudulent identities

M Hamza, S Tehsin, M Humayun, MF Almufareh… - Applied Sciences, 2022 - mdpi.com
A robust facial recognition system that has soundness and completeness is essential for
authorized control access to lawful resources. Due to the availability of modern image …

Face recognition systems under morphing attacks: A survey

U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …

Mipgan—generating strong and high quality morphing attacks using identity prior driven gan

H Zhang, S Venkatesh, R Ramachandra… - … and Identity Science, 2021 - ieeexplore.ieee.org
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …

Transferable deep-cnn features for detecting digital and print-scanned morphed face images

K Raja, S Venkatesh… - Proceedings of the …, 2017 - openaccess.thecvf.com
Face biometrics is widely used in various applications including border control and
facilitating the verification of travellers' identity claim with respect to his electronic passport …

Privacy-friendly synthetic data for the development of face morphing attack detectors

N Damer, CAF López, M Fang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …

Deep face representations for differential morphing attack detection

U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …

Detection of face morphing attacks based on PRNU analysis

U Scherhag, L Debiasi, C Rathgeb… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …

Face demorphing

M Ferrara, A Franco, D Maltoni - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The morphing attack proved to be a serious threat for modern automated border control
systems where face recognition is used to link the identity of a passenger to his/her e …

Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network

N Damer, AM Saladie, A Braun… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
Face morphing attacks aim at creating face images that are verifiable to be the face of
multiple identities, which can lead to building faulty identity links in operations like border …