State-of-the-art face recognition (FR) approaches have shown remarkable results in predicting whether two faces belong to the same identity, yielding accuracies between 92% and 100% depending on the difficulty of the protocol. However, the accuracy drops substantially when exposed to morphed faces, specifically generated to look similar to two identities. To generate morphed faces, we integrate a simple pretrained FR model into a generative adversarial network (GAN) and modify several loss functions for face morphing. In contrast to previous works, our approach and analyses are not limited to pairs of frontal faces with the same ethnicity and gender. Our qualitative and quantitative results affirm that our approach achieves a seamless chang...
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple ide...
Facial image morphing is a technique whereby two or more faces are blended together to create a new ...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
A relatively new type of identity theft uses morphed facial images in identification documents in wh...
Face swapping refers to the task of changing the appearance of a face appearing in an image by ...
With the advancement of machine learning, facial biometric data has been widely adopted for person r...
Image morphing has proven to be very successful at deceiving facial recognition systems. Such a vuln...
Face recognition in controlled environments is nowadays considered rather reliable, and very good ac...
The primary objective of face morphing is to com-bine face images of different data subjects (e.g. a...
Automatic face recognition systems (FRS) are quite sensitive to the well-known face morphing attack,...
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing face images d...
Investigating face recognition with voices and face morphs Humans can easily identify faces at the i...
Morphing attack is an important security threat for automatic face recognition systems. High-quality...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
We show that even when face images are unconstrained and arbitrarily paired, face swapping between t...
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple ide...
Facial image morphing is a technique whereby two or more faces are blended together to create a new ...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
A relatively new type of identity theft uses morphed facial images in identification documents in wh...
Face swapping refers to the task of changing the appearance of a face appearing in an image by ...
With the advancement of machine learning, facial biometric data has been widely adopted for person r...
Image morphing has proven to be very successful at deceiving facial recognition systems. Such a vuln...
Face recognition in controlled environments is nowadays considered rather reliable, and very good ac...
The primary objective of face morphing is to com-bine face images of different data subjects (e.g. a...
Automatic face recognition systems (FRS) are quite sensitive to the well-known face morphing attack,...
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing face images d...
Investigating face recognition with voices and face morphs Humans can easily identify faces at the i...
Morphing attack is an important security threat for automatic face recognition systems. High-quality...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...
We show that even when face images are unconstrained and arbitrarily paired, face swapping between t...
Face morphing attacks aim at creating face images that are verifiable to be the face of multiple ide...
Facial image morphing is a technique whereby two or more faces are blended together to create a new ...
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of ...