Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors

A Firc, K Malinka, P Hanáček - Heliyon, 2023 - cell.com
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …

Mipgan—generating strong and high quality morphing attacks using identity prior driven gan

H Zhang, S Venkatesh, R Ramachandra… - … and Identity Science, 2021 - ieeexplore.ieee.org
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …

Privacy-friendly synthetic data for the development of face morphing attack detectors

N Damer, CAF López, M Fang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …

Morphing attack detection-database, evaluation platform, and benchmarking

K Raja, M Ferrara, A Franco… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …

Are GAN-based morphs threatening face recognition?

E Sarkar, P Korshunov, L Colbois… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
Morphing attacks are a threat to biometric systems where the biometric reference in an
identity document can be altered. This form of attack presents an important issue in …

Generation and detection of manipulated multimodal audiovisual content: Advances, trends and open challenges

H Liz-Lopez, M Keita, A Taleb-Ahmed, A Hadid… - Information …, 2024 - Elsevier
Generative deep learning techniques have invaded the public discourse recently. Despite
the advantages, the applications to disinformation are concerning as the counter-measures …

Pw-mad: Pixel-wise supervision for generalized face morphing attack detection

N Damer, N Spiller, M Fang, F Boutros… - Advances in Visual …, 2021 - Springer
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …

SYN-MAD 2022: Competition on face morphing attack detection based on privacy-aware synthetic training data

M Huber, F Boutros, AT Luu, K Raja… - … Joint Conference on …, 2022 - ieeexplore.ieee.org
This paper presents a summary of the Competition on Face Morphing Attack Detection
Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 In-ternational …

Mordiff: Recognition vulnerability and attack detectability of face morphing attacks created by diffusion autoencoders

N Damer, M Fang, P Siebke, JN Kolf… - … on Biometrics and …, 2023 - ieeexplore.ieee.org
Investigating new methods of creating face morphing attacks is essential to foresee novel
attacks and help mitigate them. Creating morphing attacks is commonly either performed on …