2021
DOI: 10.3390/app11073207
|View full text |Cite
|
Sign up to set email alerts
|

Face Morphing, a Modern Threat to Border Security: Recent Advances and Open Challenges

Abstract: Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting both the technological and human aspects of the problem. Here, after the face morphing attack scenario is presented, the paper provides an overview of the relevant bibliography and recent advances towards two central directions. First, the morphing of face image… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 60 publications
0
11
0
Order By: Relevance
“…A. The process of creating a morphing image faces many challenges, including [13,19]: 1. Using more than one image for several people and producing face morphing is difficult because the differences in the image textures and features will increase.…”
Section: Challenges Facing Face Morphing and Face Recognition Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…A. The process of creating a morphing image faces many challenges, including [13,19]: 1. Using more than one image for several people and producing face morphing is difficult because the differences in the image textures and features will increase.…”
Section: Challenges Facing Face Morphing and Face Recognition Systemmentioning
confidence: 99%
“…The reason for this is that the stored image eMRTD contains modifications, which means when creating a passport, two photos of the traveler and another person are combined, resulting in an image that contains part of the first person and part of the other person. This condition is called a morphing face [13,14]. Figure 1 represent morph image.…”
Section: Introductionmentioning
confidence: 99%
“…With more and more extensive deployment of face recognition technology in security-critical areas, specifically for applications in law enforcement and border control [37]- [39], face image manipulations present a serious threat in these operational contexts and to face recognition processes in general. This in turn has prompted sustained interest and work relating to detection methods for certain face image manipulations [40], in addition to aforementioned regulatory measures [21].…”
Section: A Digital Face Image Manipulationsmentioning
confidence: 99%
“…Face morphs are created by digitally combining images of two or more individuals to create a new image that resembles each of the original identities. The wide availability of face morphing software means that this type of fake image now poses a serious threat to border controls and other face recognition systems used in security settings (see Pikoulis et al 2021), and worryingly, several studies show that people cannot reliably detect face morphs (Kramer et al 2019;Nightingale et al 2021;Robertson et al 2017Robertson et al , 2018. In one recent study, participants attempted to determine whether two face images depicted the same person or not (Robertson et al 2017).…”
Section: Technology Has Blurred the Line Between Real And Fake Imagerymentioning
confidence: 99%