2017 International Conference of the Biometrics Special Interest Group (BIOSIG) 2017
DOI: 10.23919/biosig.2017.8053499
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
94
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
2

Relationship

5
5

Authors

Journals

citations
Cited by 118 publications
(95 citation statements)
references
References 7 publications
0
94
0
1
Order By: Relevance
“…Additionally, to guarantee high quality of the newly generated dataset constraints of high quality illumination and no pose is imposed before creating the morphs. The guidelines laid out in earlier works [12] [16] are followed to obtain a database of high relevance for morphing attack detection.…”
Section: A Database Generationmentioning
confidence: 99%
“…Additionally, to guarantee high quality of the newly generated dataset constraints of high quality illumination and no pose is imposed before creating the morphs. The guidelines laid out in earlier works [12] [16] are followed to obtain a database of high relevance for morphing attack detection.…”
Section: A Database Generationmentioning
confidence: 99%
“…One approach is to develop increasingly sophisticated computer methods for morph detection (e.g. Makrushin, Neubert, & Dittmann, 2017; Neubert, 2017; Raghavendra, Raja, Venkatesh, & Busch, 2017a, 2017b; Scherhag, Nautsch, et al, 2017; Scherhag, Raghavendra, et al, 2017; Seibold, Samek, Hilsmann, & Eisert, 2017, 2018). For example, inconsistencies between the reflections visible in the eyes and skin could signal a morphed image (Seibold, Hilsmann, & Eisert, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…In addition to the aforementioned metrics and in order to evaluate the quality of the generated database, the Mated Morph Presentation Match Rate as well as the Relative Morph Match Rate (RMMR) [18] were calculated, which indicates the vulnerability of the FRS with respect to the attack. Employing the Cognitec FaceVACS-SDK [19] a ProdAvg-MMPMR of 96.7% ProdAvg-RMMR of 97.7% was computed for testing and training set.…”
Section: Experiments and Resultsmentioning
confidence: 99%