IEEE International Joint Conference on Biometrics 2014
DOI: 10.1109/btas.2014.6996240
|View full text |Cite
|
Sign up to set email alerts
|

The magic passport

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
197
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 229 publications
(218 citation statements)
references
References 2 publications
2
197
0
2
Order By: Relevance
“…If we perform identification tasks with state of the art facial recognition software, a good morph will generate high scores for comparisons between morph M and templates of subjects A and B. It is obvious that face morphing poses a severe threat to all processes where face recognition is used to establish the identity of subjects, as first reported in [1]. Also human face recognition is vulnerable, as reported by Robertson et al [2].…”
Section: Introductionmentioning
confidence: 94%
“…If we perform identification tasks with state of the art facial recognition software, a good morph will generate high scores for comparisons between morph M and templates of subjects A and B. It is obvious that face morphing poses a severe threat to all processes where face recognition is used to establish the identity of subjects, as first reported in [1]. Also human face recognition is vulnerable, as reported by Robertson et al [2].…”
Section: Introductionmentioning
confidence: 94%
“…If a morphed photo gets onto an identity credential for example, multiple, if not all constituents of the morph, can use the same identity credential. Morphs can be used to fool both humans [1] [2] and current face recognition systems [3], which presents a vulnerability to current identity verification processes.…”
Section: Executive Summary Backgroundmentioning
confidence: 99%
“…If a morphed photo gets onto an identity credential for example, multiple, if not all constituents of the morph, can use the same identity credential. Morphs can be used to fool both humans [1] [2] and current face recognition systems [3], which presents a vulnerability to current identity verification processes. Figure 1 illustrates the impact of morphed photos on current algorithms from some of the leading face recognition algorithms (labeled as A, B, C, and D) submitted to the NIST Ongoing FRVT 1:1 Verification test.…”
Section: The Frvt Morph Activitymentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, the subjects whose biometric samples were used to create the morphed image can both be matched (accepted) during subsequent biometric recognition transactions with the morphed reference image. This vulnerability was first introduced by Ferrara et al [12] (the so-called "magic passport") and shown to be a feasible attack vector against automated systems and human experts alike [13]. A typical morphing process includes:…”
Section: Morphing Of Facial Imagesmentioning
confidence: 99%