Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021‏ - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020‏ - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

Deep face representations for differential morphing attack detection

U Scherhag, C Rathgeb, J Merkle… - IEEE transactions on …, 2020‏ - ieeexplore.ieee.org
The vulnerability of facial recognition systems to face morphing attacks is well known. Many
different approaches for morphing attack detection (MAD) have been proposed in the …

A comprehensive survey on methods for image integrity

P Capasso, G Cattaneo, M De Marsico - ACM Transactions on …, 2024‏ - dl.acm.org
The outbreak of digital devices on the Internet, the exponential diffusion of data (images,
video, audio, and text), along with their manipulation/generation also by artificial intelligence …

Detection of face morphing attacks based on PRNU analysis

U Scherhag, L Debiasi, C Rathgeb… - IEEE Transactions on …, 2019‏ - ieeexplore.ieee.org
Recent research found that attacks based on morphed face images, ie, morphing attacks,
pose a severe security risk to face recognition systems. A reliable morphing attack detection …

Privacy-friendly synthetic data for the development of face morphing attack detectors

N Damer, CAF López, M Fang… - Proceedings of the …, 2022‏ - openaccess.thecvf.com
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …

Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network

N Damer, AM Saladie, A Braun… - 2018 IEEE 9th …, 2018‏ - ieeexplore.ieee.org
Face morphing attacks aim at creating face images that are verifiable to be the face of
multiple identities, which can lead to building faulty identity links in operations like border …

Mordiff: Recognition vulnerability and attack detectability of face morphing attacks created by diffusion autoencoders

N Damer, M Fang, P Siebke, JN Kolf… - … on Biometrics and …, 2023‏ - ieeexplore.ieee.org
Investigating new methods of creating face morphing attacks is essential to foresee novel
attacks and help mitigate them. Creating morphing attacks is commonly either performed on …

Morphing attack detection-database, evaluation platform, and benchmarking

K Raja, M Ferrara, A Franco… - IEEE transactions on …, 2020‏ - ieeexplore.ieee.org
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …

SYN-MAD 2022: Competition on face morphing attack detection based on privacy-aware synthetic training data

M Huber, F Boutros, AT Luu, K Raja… - … Joint Conference on …, 2022‏ - ieeexplore.ieee.org
This paper presents a summary of the Competition on Face Morphing Attack Detection
Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 In-ternational …