2020
DOI: 10.1049/iet-bmt.2019.0206
|View full text |Cite
|
Sign up to set email alerts
|

Face morph detection for unknown morphing algorithms and image sources: a multi‐scale block local binary pattern fusion approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 40 publications
0
11
0
Order By: Relevance
“…The use of texture descriptors has shown promising results e.g. for no-reference morphing attack detection as reported in [44]. Similarly, forensics-based detection methods, e.g.…”
Section: Manipulation Detection Scenariosmentioning
confidence: 90%
“…The use of texture descriptors has shown promising results e.g. for no-reference morphing attack detection as reported in [44]. Similarly, forensics-based detection methods, e.g.…”
Section: Manipulation Detection Scenariosmentioning
confidence: 90%
“…The single image MAD approaches can be categorised into three classes: texture descriptors, e.g. in [20,24,26], forensic image analysis, e.g. in [23,32], and methods based on deep neural networks, e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Ferrara et al [13] introduced face demorphing to reverse the morphing process to detect altered images. Some research considers hand-crafted descriptors to detect morphed samples [11,29,34,28], where the fusion of different features has proven to be compelling for morph detection [34,32]. Deep morph detectors utilize the power of convolutional neural networks to detect morphed samples accurately [14,30,37,38,36,22].…”
Section: Morph Detectionmentioning
confidence: 99%