In recent years, morphing of facial images has arisen as an important attack vector on biometric systems. Detection of morphed images has proven challenging for automated systems and human experts alike. Likewise, in recent years, the importance of efficient (fast) biometric identification has been emphasised by the rapid rise and growth of large-scale biometric systems around the world. In this paper, the aforementioned, hitherto unrelated, topics within the biometrics domain are combined: the properties of morphed images are exploited for the purpose of improving the transaction times of a biometric identification system. Specifically, morphs of two or more samples are used in the pre-selection step of a two-stage biometric identification...
The vulnerability of facial recognition systems through morphing attacks is a known problem. Since t...
Face identification is becoming a well-accepted technology for access control applications, whether ...
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Biometrics has emerged as a promising technology for automated recognition of individuals. The store...
A robust facial recognition system that has soundness and completeness is essential for authorized c...
With the widespread deployment of biometric recognition systems, the interest in attacking these sys...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
Identification by biometric features has become more popular in the last decade. High quality video ...
Face recognition in controlled environments is nowadays considered rather reliable, and very good ac...
Background In recent years, fraudsters have begun to use readily accessible digital manipulation te...
A relatively new type of identity theft uses morphed facial images in identification documents in wh...
Morphing attacks are a form of presentation attacks that gathered increasing attention in recent yea...
Nowadays, face morphing represents a big security threat in the context of electronic identity docum...
Along with the deployment of the Face Recognition Systems (FRS), concerns were raised related to the...
The vulnerability of facial recognition systems through morphing attacks is a known problem. Since t...
Face identification is becoming a well-accepted technology for access control applications, whether ...
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Biometrics has emerged as a promising technology for automated recognition of individuals. The store...
A robust facial recognition system that has soundness and completeness is essential for authorized c...
With the widespread deployment of biometric recognition systems, the interest in attacking these sys...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
Identification by biometric features has become more popular in the last decade. High quality video ...
Face recognition in controlled environments is nowadays considered rather reliable, and very good ac...
Background In recent years, fraudsters have begun to use readily accessible digital manipulation te...
A relatively new type of identity theft uses morphed facial images in identification documents in wh...
Morphing attacks are a form of presentation attacks that gathered increasing attention in recent yea...
Nowadays, face morphing represents a big security threat in the context of electronic identity docum...
Along with the deployment of the Face Recognition Systems (FRS), concerns were raised related to the...
The vulnerability of facial recognition systems through morphing attacks is a known problem. Since t...
Face identification is becoming a well-accepted technology for access control applications, whether ...
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...