2021
DOI: 10.1109/tts.2021.3066254
|View full text |Cite
|
Sign up to set email alerts
|

Face Morphing Attack Generation and Detection: A Comprehensive Survey

Abstract: Face recognition has been successfully deployed in real-time applications, including secure applications such as border control. The vulnerability of face recognition systems (FRSs) to various kinds of attacks (both direct and indirect attacks) and face morphing attacks has received great interest from the biometric community. The goal of a morphing attack is to subvert an FRS at an automatic border control (ABC) gate by presenting an electronic machine-readable travel document (eMRTD) or e-passport that is ob… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
65
0
3

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 100 publications
(70 citation statements)
references
References 88 publications
2
65
0
3
Order By: Relevance
“…There has been recently a large amount of research in the field of face morphing. Comprehensive surveys have been published in [70,74] including both morphing techniques and also morphing attack detectors. In general, the following three consecutive stages are considered in the generation process of face morphing images: (i) determining correspondences between the face images of the different subjects.…”
Section: Face Morphingmentioning
confidence: 99%
“…There has been recently a large amount of research in the field of face morphing. Comprehensive surveys have been published in [70,74] including both morphing techniques and also morphing attack detectors. In general, the following three consecutive stages are considered in the generation process of face morphing images: (i) determining correspondences between the face images of the different subjects.…”
Section: Face Morphingmentioning
confidence: 99%
“…The resulting images are of high quality without artefact in the background. As we mentioned before, after creation of the morphed images, all the faces were cropped using a modified dlib face detector implementation 6 . Figure 6 shows examples of the FERET cropped face database.…”
Section: Databasesmentioning
confidence: 99%
“…A morphing attack's success depends on the decision of human observers, especially a passport identification expert. The real-life application for a border police expert who compares the passport reference image of the traveller (digital extracted from the embedded chip) with the facial appearance of the traveller [6] is too hard because of the improvements of the morphing tools and because of the difficulty for the human expert to localise facial areas, in which morphing artefacts are present. This work proposes to add an extra stage of feature selection after feature extraction based on Mutual Information M I to estimate and keep the most relevant and remove the most redundant features from the face images to separate bona fide and morphed images on a S-MAD scenario.…”
Section: Introductionmentioning
confidence: 99%
“…Overall, existing works have demonstrated, beyond doubt, that “morphing” is a threat for face recognition systems. Several survey papers have also highlighted the vulnerability of face recognition algorithm against digital manipulation and limitations of existing detection algorithms ( Akhtar et al, 2019 ; Scherhag et al, 2019 ; Singh et al, 2020 ; Tolosana et al, 2020 ; Venkatesh et al, 2020 ). The survey papers bring out the boundaries of existing detection algorithms such as non-generalizability against manipulation types and image resolution and computationally inefficiency.…”
Section: Related Workmentioning
confidence: 99%