Face recognition in controlled environments is nowadays considered rather reliable, and very good accuracy levels can be achieved by state-of-the-art systems in controlled scenarios. However, even under these desirable conditions, digital image alterations can severely affect the recognition performance. In particular, several studies show that automatic face recognition systems are very sensitive to the so-called face morphing attack, where face images of two individuals are mixed to produce a new face image containing facial features of both subjects. Face morphing represents nowadays a big security threat particularly in the context of electronic identity documents because it can be successfully exploited for criminal intents, for instan...
Face identification is becoming a well-accepted technology for access control applications, whether ...
Along with the deployment of the Face Recognition Systems (FRS), concerns were raised related to the...
Facial recognition has become a critical constituent of common automatic border control gates. Despi...
Face recognition in controlled environments is nowadays considered rather reliable, and very good ac...
Automatic face recognition systems (FRS) are quite sensitive to the well-known face morphing attack,...
Biometrics has emerged as a promising technology for automated recognition of individuals. The store...
Background In recent years, fraudsters have begun to use readily accessible digital manipulation te...
Identification by biometric features has become more popular in the last decade. High quality video ...
A relatively new type of identity theft uses morphed facial images in identification documents in wh...
Nowadays, face morphing represents a big security threat in the context of electronic identity docum...
The vulnerability of facial recognition systems through morphing attacks is a known problem. Since t...
Morphing attacks are a form of presentation attacks that gathered increasing attention in recent yea...
Morphing attack is an important security threat for automatic face recognition systems. High-quality...
A robust facial recognition system that has soundness and completeness is essential for authorized c...
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Face identification is becoming a well-accepted technology for access control applications, whether ...
Along with the deployment of the Face Recognition Systems (FRS), concerns were raised related to the...
Facial recognition has become a critical constituent of common automatic border control gates. Despi...
Face recognition in controlled environments is nowadays considered rather reliable, and very good ac...
Automatic face recognition systems (FRS) are quite sensitive to the well-known face morphing attack,...
Biometrics has emerged as a promising technology for automated recognition of individuals. The store...
Background In recent years, fraudsters have begun to use readily accessible digital manipulation te...
Identification by biometric features has become more popular in the last decade. High quality video ...
A relatively new type of identity theft uses morphed facial images in identification documents in wh...
Nowadays, face morphing represents a big security threat in the context of electronic identity docum...
The vulnerability of facial recognition systems through morphing attacks is a known problem. Since t...
Morphing attacks are a form of presentation attacks that gathered increasing attention in recent yea...
Morphing attack is an important security threat for automatic face recognition systems. High-quality...
A robust facial recognition system that has soundness and completeness is essential for authorized c...
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
Face identification is becoming a well-accepted technology for access control applications, whether ...
Along with the deployment of the Face Recognition Systems (FRS), concerns were raised related to the...
Facial recognition has become a critical constituent of common automatic border control gates. Despi...