Generative deep learning techniques have invaded the public discourse recently. Despite the advantages, the applications to disinformation are concerning as the counter-measures …
Investigating new methods of creating face morphing attacks is essential to foresee novel attacks and help mitigate them. Creating morphing attacks is commonly either performed on …
Generative AI (GAI) models have been rapidly advancing, with a wide range of applications including intelligent networks and mobile AI-generated content (AIGC) services. Despite …
Nowadays image morphing has become one of the important techniques in applications that require a graphical representation of objects. Morphing tools have become very well known …
A morph is a combination of two separate facial images and contains the identity information of two different people. When used in an identity document, both people can be …
M Grimmer, C Busch - 2024 IEEE International Joint …, 2024 - ieeexplore.ieee.org
Face morphing attacks pose a severe security threat to face recognition systems, enabling the morphed face image to be verified against multiple identities. To detect such …
B Zhang, X Zhu, X Zhang, Z Lei - 2023 IEEE International Joint …, 2023 - ieeexplore.ieee.org
Face anti-spoofing is crucial for ensuring the security and reliability of face recognition systems. Several existing face anti-spoofing methods utilize GAN-like networks to detect …
J Cai, Q Duan, M Long, LB Zhang, X Ding - Sensors, 2024 - mdpi.com
Face morphing attacks disrupt the essential correlation between a face image and its identity information, posing a significant challenge to face recognition systems. Despite …