Face morphing attack detection and localization based on feature-wise supervision

L Qin, F Peng, M Long - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
To strengthen the security of face recognition systems to morphing attacks (MAs), many
countermeasures were proposed. However, in the existing face morphing attack detection …

Morph detection enhanced by structured group sparsity

P Aghdaie, B Chaudhary… - Proceedings of the …, 2022 - openaccess.thecvf.com
In this paper, we consider the challenge of face morphing attacks, which substantially
undermine the integrity of face recognition systems such as those adopted for use in border …

Leveraging diffusion for strong and high quality face morphing attacks

ZW Blasingame, C Liu - IEEE Transactions on Biometrics …, 2024 - ieeexplore.ieee.org
Face morphing attacks seek to deceive a Face Recognition (FR) system by presenting a
morphed image consisting of the biometric qualities from two different identities with the aim …

Fast-dim: Towards fast diffusion morphs

ZW Blasingame, C Liu - IEEE Security & Privacy, 2024 - ieeexplore.ieee.org
Fast-DiM: Towards Fast Diffusion Morphs Page 1 1540-7993/24©2024IEEE Copublished by
the IEEE Computer and Reliability Societies July/August 2024 103 SYNTHETIC REALITIES …

Face Morphing Detection in Social Media Content

A Agarwal, N Ratha - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
Face being an active medium of communication is a significant part of our social media life;
however, faces are vulnerable to manipulations. Among various manipulations, face …

The Impact of Print-Scanning in Heterogeneous Morph Evaluation Scenarios

RE Neddo, ZW Blasingame… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Face morphing attacks pose an increasing threat to face recognition (FR) systems. A
morphed photo contains biometric information from two different subjects to take advantage …

Greedy-DiM: Greedy Algorithms for Unreasonably Effective Face Morphs

ZW Blasingame, C Liu - arXiv preprint arXiv:2404.06025, 2024 - arxiv.org
Morphing attacks are an emerging threat to state-of-the-art Face Recognition (FR) systems,
which aim to create a single image that contains the biometric information of multiple …

The Impact of Print-and-Scan in Heterogeneous Morph Evaluation Scenarios

RE Neddo, ZW Blasingame, C Liu - arXiv preprint arXiv:2404.06559, 2024 - arxiv.org
Face morphing attacks present an emerging threat to the face recognition system. On top of
that, printing and scanning the morphed images could obscure the artifacts generated …

Exploring the Design Space of Diffusion Autoencoders for Face Morphing

Z Blasingame, C Liu - arXiv preprint arXiv:2310.09484, 2023 - arxiv.org
Face morphs created by Diffusion Autoencoders are a recent innovation and the design
space of such an approach has not been well explored. We explore three axes of the design …

Deep Face Morph Detection Based on Wavelet Decomposition

P Aghdaie - 2023 - search.proquest.com
Morphed face images are maliciously used by criminals to circumvent the official process for
receiving a passport where a look-alike accomplice embarks on requesting a passport …