2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS) 2016
DOI: 10.1109/btas.2016.7791169
|View full text |Cite
|
Sign up to set email alerts
|

Detecting morphed face images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
110
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 119 publications
(113 citation statements)
references
References 10 publications
3
110
0
Order By: Relevance
“…Given the residual image, we extract the deep textural features computed using a pre-trained off-the-shelf AlexNet. We have used the features from fully connected layer f c6 to compute the feature from the residual noise 1 https://www.imageclef.org/photodata images. These computed features are then classified using a Probabilistic Collaborative Representation Classifier (P-CRC) [32].…”
Section: Feature Extraction and Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Given the residual image, we extract the deep textural features computed using a pre-trained off-the-shelf AlexNet. We have used the features from fully connected layer f c6 to compute the feature from the residual noise 1 https://www.imageclef.org/photodata images. These computed features are then classified using a Probabilistic Collaborative Representation Classifier (P-CRC) [32].…”
Section: Feature Extraction and Detectionmentioning
confidence: 99%
“…The morphed face image generated using the face image from an attacker and a accomplice can easily be verified against both contributing subjects with existing commercial FRS. Also a human expert such as a trained border guard can be confused [14,15,1,16,17,18,19,20]. This scenario becomes critical, when attackers intentionally morph their face image with a non-blacklisted subject, in order to gain access to a protected/secured area.…”
Section: Introductionmentioning
confidence: 99%
“…Creation of good datasets with morphed face images is one of the most important steps in the development of reliable face morphing detection methods. In [5] 450 morphed faces are created manually from a database comprised of 110 subjects. The face region is detected with Viola Jones detection.…”
Section: Bona Fide Presentation Classification Error Rate (Bpcer) Promentioning
confidence: 99%
“…This means a morph in the training set may share a contributing subject with a morph in the test or validation set. In [7] the experiments from [5] are repeated, but instead the morphing detection process at a passport control is simulated by printing and scanning the face images. Morphing attack detection performance was analysed before and after printing and scanning.…”
Section: Bona Fide Presentation Classification Error Rate (Bpcer) Promentioning
confidence: 99%
“…Several researchers become aware of the danger of morphing attacks and developed different forensic methods to detect this kind of fraud. In contrast to the already proposed methods, which are based on image degeneration [4], Binarized Statistical Image Features (BSIF) [5], neural networks [6], [7] or JPEG compression artifacts [8], we propose a method that is based on a physical illumination model. Illumination estimation to detect frauds was already studied in detail by [9], [10] to detect compositions of multiple photographs.…”
Section: Introductionmentioning
confidence: 99%