Face recognition systems (FRS) have been found to be highly vulnerable to face morphing attacks. Due to this severe security risk, morph detection systems do not only need to be robust against classical landmark-based face morphing approach (LMA), but also future attacks such as neural network based morph generation techniques. The focus of this paper lies on an experimental evaluation of the morph detection capabilities of various state-of-the-art morph detectors with respect to a recently presented novel face morphing approach, MorGAN, which is based on Generative Adversarial Networks (GANs). In this work, existing detection algorithms are confronted with different attack scenarios: known and unknown attacks comprising different...
Morphing attack is an important security threat for automatic face recognition systems. High-quality...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
Face morphing attack images are built to be verifiable to multiple identities. Associating such imag...
Face recognition systems (FRS) have been found to be highly vulnerable to face morphing attacks. Due...
The primary objective of face morphing is to com-bine face images of different data subjects (e.g. a...
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple ide...
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing face images d...
It is increasingly easy to automatically swap faces in images and video or morph two faces into one ...
Investigating new methods of creating face morphing attacks is essential to foresee novel attacks an...
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple ide...
Along with the deployment of the Face Recognition Systems (FRS), concerns were raised related to the...
Identification by biometric features has become more popular in the last decade. High quality video ...
Recent works have studied the face morphing attack detection performance generalization over variati...
A robust facial recognition system that has soundness and completeness is essential for authorized c...
It has been shown that Face Recognition Systems (FRSs) are vulnerable to morphing attacks, but most ...
Morphing attack is an important security threat for automatic face recognition systems. High-quality...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
Face morphing attack images are built to be verifiable to multiple identities. Associating such imag...
Face recognition systems (FRS) have been found to be highly vulnerable to face morphing attacks. Due...
The primary objective of face morphing is to com-bine face images of different data subjects (e.g. a...
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple ide...
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing face images d...
It is increasingly easy to automatically swap faces in images and video or morph two faces into one ...
Investigating new methods of creating face morphing attacks is essential to foresee novel attacks an...
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple ide...
Along with the deployment of the Face Recognition Systems (FRS), concerns were raised related to the...
Identification by biometric features has become more popular in the last decade. High quality video ...
Recent works have studied the face morphing attack detection performance generalization over variati...
A robust facial recognition system that has soundness and completeness is essential for authorized c...
It has been shown that Face Recognition Systems (FRSs) are vulnerable to morphing attacks, but most ...
Morphing attack is an important security threat for automatic face recognition systems. High-quality...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
Face morphing attack images are built to be verifiable to multiple identities. Associating such imag...