Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Face recognition systems under morphing attacks: A survey

U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019 - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …

Mipgan—generating strong and high quality morphing attacks using identity prior driven gan

H Zhang, S Venkatesh, R Ramachandra… - … and Identity Science, 2021 - ieeexplore.ieee.org
Face morphing attacks target to circumvent Face Recognition Systems (FRS) by employing
face images derived from multiple data subjects (eg, accomplices and malicious actors) …

Automatic generation and detection of visually faultless facial morphs

A Makrushin, T Neubert, J Dittmann - International conference on …, 2017 - scitepress.org
This paper introduces an approach to automatic generation of visually faultless facial
morphs along with a proposal on how such morphs can be automatically detected. It is …

Face morphing, a modern threat to border security: Recent advances and open challenges

EV Pikoulis, ZM Ioannou, M Paschou, E Sakkopoulos - Applied Sciences, 2021 - mdpi.com
Face morphing poses a serious threat to Automatic Border Control (ABC) and Face
Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative …

Border control morphing attack detection with a convolutional neural network de-morphing approach

D Ortega-Delcampo, C Conde… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, the use of biometric identification, automated or semiautomated, is a reality. For
this reason, the number of attacks has increased in such systems. One of the most common …

Landmark enforcement and style manipulation for generative morphing

S Price, S Soleymani… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Morph images threaten Facial Recognition Systems (FRS) by presenting as multiple
individuals, allowing an adversary to swap identities with another subject. Morph generation …

Novel AI Camera Camouflage: Face Cloaking Without Full Disguise

D Noever, F McKee - arXiv preprint arXiv:2412.13507, 2024 - arxiv.org
This study demonstrates a novel approach to facial camouflage that combines targeted
cosmetic perturbations and alpha transparency layer manipulation to evade modern facial …

[PDF][PDF] Face Morphing Attack Generation & Detection: A Comprehensive Survey

SVRRK Raja, C Busch - researchgate.net
Face recognition has been successfully deployed in real-time applications including secure
applications like border control. The vulnerability of Face Recognition System (FRS) to …