Nowadays, face morphing represents a big security threat in the context of electronic identity documents as well as an interesting challenge for researchers in the field of face recognition. Despite the good performance obtained by state-of-the-art approaches on digital images, no satisfactory solutions have been identified so far to deal with cross-database testing and printed-scanned images (typically used in many countries for document issuing).To solve this problem, the authors propose new approaches to train Deep Neural Networks for morphing attack detection: in particular the generation of simulated printed-scanned images together with other data augmentation strategies and pre-training on large face recognition datasets, allowed reac...
Face identification is becoming a well-accepted technology for access control applications, whether ...
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
A robust facial recognition system that has soundness and completeness is essential for authorized c...
Nowadays, face morphing represents a big security threat in the context of electronic identity docum...
Identification by biometric features has become more popular in the last decade. High quality video ...
Biometrics has emerged as a promising technology for automated recognition of individuals. The store...
Face recognition in controlled environments is nowadays considered rather reliable, and very good ac...
Background In recent years, fraudsters have begun to use readily accessible digital manipulation te...
Facial recognition has become a critical constituent of common automatic border control gates. Despi...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
Along with the deployment of the Face Recognition Systems (FRS), concerns were raised related to the...
Morphing attack is an important security threat for automatic face recognition systems. High-quality...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
A relatively new type of identity theft uses morphed facial images in identification documents in wh...
In recent years, morphing of facial images has arisen as an important attack vector on biometric sys...
Face identification is becoming a well-accepted technology for access control applications, whether ...
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
A robust facial recognition system that has soundness and completeness is essential for authorized c...
Nowadays, face morphing represents a big security threat in the context of electronic identity docum...
Identification by biometric features has become more popular in the last decade. High quality video ...
Biometrics has emerged as a promising technology for automated recognition of individuals. The store...
Face recognition in controlled environments is nowadays considered rather reliable, and very good ac...
Background In recent years, fraudsters have begun to use readily accessible digital manipulation te...
Facial recognition has become a critical constituent of common automatic border control gates. Despi...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
Along with the deployment of the Face Recognition Systems (FRS), concerns were raised related to the...
Morphing attack is an important security threat for automatic face recognition systems. High-quality...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
A relatively new type of identity theft uses morphed facial images in identification documents in wh...
In recent years, morphing of facial images has arisen as an important attack vector on biometric sys...
Face identification is becoming a well-accepted technology for access control applications, whether ...
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for a...
A robust facial recognition system that has soundness and completeness is essential for authorized c...