A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities

Applied Sciences(2022)

引用 4|浏览4
暂无评分
摘要
A robust facial recognition system that has soundness and completeness is essential for authorized control access to lawful resources. Due to the availability of modern image manipulation technology, the current facial recognition systems are vulnerable to different biometric attacks. Image morphing attack is one of these attacks. This paper compares and analyzes state-of-the-art morphing attack detection (MAD) methods. The performance of different MAD methods is also compared on a wide range of source image databases. Moreover, it also describes the morph image generation techniques along with the limitations, strengths, and drawbacks of each morphing technique. Results are investigated and compared with in-depth analysis providing insight into the vulnerabilities of existing systems. This paper provides vital information that is essential for building a next generation morph attack detection system.
更多
查看译文
关键词
face morphing,biometric forensics,morphed identities,biometrics,face recognition
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要