Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Face Morphing Attack Generation & Detection: A Comprehensive Survey

S Venkatesh, R Ramachandra, K Raja… - arXiv preprint arXiv …, 2020 - arxiv.org
The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct
and in-direct attacks) and face morphing attacks has received a great interest from the …

Face Morphing Attack Generation & Detection: A Comprehensive Survey

S Venkatesh, R Ramachandra, K Raja… - arXiv e …, 2020 - ui.adsabs.harvard.edu
Abstract The vulnerability of Face Recognition System (FRS) to various kind of attacks (both
direct and in-direct attacks) and face morphing attacks has received a great interest from the …