2017 5th International Workshop on Biometrics and Forensics (IWBF) 2017
DOI: 10.1109/iwbf.2017.7935087
|View full text |Cite
|
Sign up to set email alerts
|

Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
53
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(53 citation statements)
references
References 11 publications
0
53
0
Order By: Relevance
“…4 (d)). The result of merging all triangles is the average image ( Figure 5(a)), and this process is called the warping process [43], [77], [78].…”
Section: A Morphing Processmentioning
confidence: 99%
“…4 (d)). The result of merging all triangles is the average image ( Figure 5(a)), and this process is called the warping process [43], [77], [78].…”
Section: A Morphing Processmentioning
confidence: 99%
“…With respect to the above attack scenario, it is stressed that a detection of morphed face images becomes even more challenging if images are printed and scanned. Hildebrandt et al [8] suggest employing generic image forgery detection techniques, in particular, multicompression anomaly detection, to reliably detect morphed facial images. Kraetzer et al [12] evaluate the feasibility of detecting facial morphs with key-point descriptors and edge operators.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, attacks on the face, fingerprint and iris recognition systems based on morphed biometric images and templates have been presented [5][6][7][8][9]. Morphed biometric information is an artificially generated sample or template, which blends the biometric information of two different data subjects into one.…”
Section: Introductionmentioning
confidence: 99%
“…Scherhag et al [11] analyzed multiple general purpose image feature extractors in this differential scenario. Further, Hildebrandt et al [12] suggest to employ generic image forgery detection techniques, in particular multi-compression anomaly detection, to reliably detect morphed facial images. Kraetzer et al [13] evaluate the feasibility of detecting facial morphs with keypoint descriptors and edge operators.…”
Section: Introductionmentioning
confidence: 99%