2018
DOI: 10.48550/arxiv.1806.04265
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…The landmark based image morphing technique [23,9,38,12] considers the geometry of two bona fide subjects for generating a morphed sample. Every pixel location in both genuine images is warped to preserve the correspondence in the resulting morphed sample, and a convex combination of the warped pixels cross-dissolve the warped pixels in the real images to synthesize that pixel location in the final morphed sample.…”
Section: Morph Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…The landmark based image morphing technique [23,9,38,12] considers the geometry of two bona fide subjects for generating a morphed sample. Every pixel location in both genuine images is warped to preserve the correspondence in the resulting morphed sample, and a convex combination of the warped pixels cross-dissolve the warped pixels in the real images to synthesize that pixel location in the final morphed sample.…”
Section: Morph Generationmentioning
confidence: 99%
“…Some research considers hand-crafted descriptors to detect morphed samples [11,29,34,28], where the fusion of different features has proven to be compelling for morph detection [34,32]. Deep morph detectors utilize the power of convolutional neural networks to detect morphed samples accurately [14,30,37,38,36,22]. Several studies investigate denoising methods for the task of morph attack detection.…”
Section: Morph Detectionmentioning
confidence: 99%
“…Facial morph generation techniques are categorized into two types, i.e., landmark-based morphing [5,8,19,31], and GAN-based morphing [5,37]. In the landmark-based morphing attack, appearance of a resulting morphed image is associated with that of two underlying subject's bona fide face images, while geometric locations of its landmarks are the average of the corresponding landmarks in the two bona fide images [32].…”
Section: Morph Generationmentioning
confidence: 99%
“…One of the first efforts to study the generation of a morph image from two source images [13] has concluded that geometric alterations and digital beautification can cause an increase in the possibility of fooling recognition systems. Morph generation techniques can roughly be categorized into landmark-based [29,43,44] and generative models [10,45]. Landmark-based frameworks focus on detecting the landmarks in both the images, translating these points toward each other, and blending the two face images.…”
Section: Facial Morphingmentioning
confidence: 99%
“…Texture descriptors are the main feature extraction models for single image morph detection [51,47,38,37,34]. Recently, deep learning models have also been considered for this purpose [44,43,33]. The models mentioned can also be employed for differential morph detection when the extracted feature from the two images are compared [35,39,9].…”
Section: Morph Detectionmentioning
confidence: 99%