2022
DOI: 10.1007/978-3-030-87664-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Face Morphing Attack Detection Methods

Abstract: Morphing attacks pose a serious threat to face recognition systems, especially in the border control scenario. In order to guarantee a secure operation of face recognition algorithms in the future, it is necessary to be able to reliably detect morphed facial images and thus be able to reject them during enrolment or verification. This chapter provides an overview of morphing attack detection algorithms and metrics to measure and compare their performance. Different concepts of morphing attack detection are int… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…However wide-scale implementation across government departments requires significant testing, training, and implementation investments. As discussed previously, there are also significant limitations that need to be overcome in order to develop a robust and reliable algorithm appropriate for implementation across official departments (Scherhag et al, 2022). In the meantime, we propose a simple, quick, and reliable form of training that requires minimal effort to implement.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…However wide-scale implementation across government departments requires significant testing, training, and implementation investments. As discussed previously, there are also significant limitations that need to be overcome in order to develop a robust and reliable algorithm appropriate for implementation across official departments (Scherhag et al, 2022). In the meantime, we propose a simple, quick, and reliable form of training that requires minimal effort to implement.…”
Section: Discussionmentioning
confidence: 99%
“…As the quality of face morphs increases, they are likely to become even more difficult to detect. A growing body of literature has shown there is potential to develop increasingly sophisticated computer algorithms that can detect face morphs (Makrushin et al, 2017;Neubert, 2017;Raghavendra et al, 2017aRaghavendra et al, , 2017bScherhag et al, 2017Scherhag et al, , 2019Scherhag et al, , 2022Seibold et al, 2018;Venkatesh et al, 2021).…”
Section: The Role Of Computer Algorithms In Face Morph Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…They described the work in this field as "a cat and mouse game"; whereas the detection techniques are improved, the manipulation methods are improved. Many researches have been introduced tackling the manipulation detection issue; however, to the current date, there is no global reliable face manipulation detection technique, which means this field is still nascent [48][49][50]. One of the limitations that have been mentioned in [48] is the low detection accuracy in the GAN-based methods [51][52][53][54] when bad-quality input images are tested such as images in bad lighting conditions, noisy, blurry, and other low-resolution images.…”
Section: Introductionmentioning
confidence: 99%