Face morphing attack generation and detection: A comprehensive survey
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
applications such as border control. The vulnerability of face recognition systems (FRSs) to …
Deepfakes and beyond: A survey of face manipulation and fake detection
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …
learning techniques, in particular Generative Adversarial Networks, have led to the …
A comprehensive review of face morph generation and detection of fraudulent identities
A robust facial recognition system that has soundness and completeness is essential for
authorized control access to lawful resources. Due to the availability of modern image …
authorized control access to lawful resources. Due to the availability of modern image …
Privacy-friendly synthetic data for the development of face morphing attack detectors
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …
solutions be successfully developed based on synthetic data?". Towards that, this work …
Morphing attack detection-database, evaluation platform, and benchmarking
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …
the number of advancements reported in recent works, we note serious open issues such as …
FedForgery: generalized face forgery detection with residual federated learning
With the continuous development of deep learning in the field of image generation models, a
large number of vivid forged faces have been generated and spread on the Internet. These …
large number of vivid forged faces have been generated and spread on the Internet. These …
Are GAN-based morphs threatening face recognition?
Morphing attacks are a threat to biometric systems where the biometric reference in an
identity document can be altered. This form of attack presents an important issue in …
identity document can be altered. This form of attack presents an important issue in …
Pw-mad: Pixel-wise supervision for generalized face morphing attack detection
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …
major vulnerability to processes based on identity verification, such as border checks …
Adversarial attacks against face recognition: A comprehensive study
Face recognition (FR) systems have demonstrated reliable verification performance,
suggesting suitability for real-world applications ranging from photo tagging in social media …
suggesting suitability for real-world applications ranging from photo tagging in social media …
SYN-MAD 2022: Competition on face morphing attack detection based on privacy-aware synthetic training data
This paper presents a summary of the Competition on Face Morphing Attack Detection
Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 In-ternational …
Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 In-ternational …