Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …
learning make deepfakes highly believable, and very difficult to differentiate between what is …
Mipgan—generating strong and high quality morphing attacks using identity prior driven gan
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
face images derived from multiple data subjects (eg, accomplices and malicious actors) …
Privacy-friendly synthetic data for the development of face morphing attack detectors
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …
solutions be successfully developed based on synthetic data?". Towards that, this work …
Morphing attack detection-database, evaluation platform, and benchmarking
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …
the number of advancements reported in recent works, we note serious open issues such as …
Are GAN-based morphs threatening face recognition?
Morphing attacks are a threat to biometric systems where the biometric reference in an
identity document can be altered. This form of attack presents an important issue in …
identity document can be altered. This form of attack presents an important issue in …
Generation and detection of manipulated multimodal audiovisual content: Advances, trends and open challenges
Generative deep learning techniques have invaded the public discourse recently. Despite
the advantages, the applications to disinformation are concerning as the counter-measures …
the advantages, the applications to disinformation are concerning as the counter-measures …
Pw-mad: Pixel-wise supervision for generalized face morphing attack detection
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …
major vulnerability to processes based on identity verification, such as border checks …
SYN-MAD 2022: Competition on face morphing attack detection based on privacy-aware synthetic training data
This paper presents a summary of the Competition on Face Morphing Attack Detection
Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 In-ternational …
Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 In-ternational …
Mordiff: Recognition vulnerability and attack detectability of face morphing attacks created by diffusion autoencoders
Investigating new methods of creating face morphing attacks is essential to foresee novel
attacks and help mitigate them. Creating morphing attacks is commonly either performed on …
attacks and help mitigate them. Creating morphing attacks is commonly either performed on …