Face morphing attack generation and detection: A comprehensive survey

S Venkatesh, R Ramachandra, K Raja… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Face recognition has been successfully deployed in real-time applications, including secure
applications such as border control. The vulnerability of face recognition systems (FRSs) to …

Deepfakes and beyond: A survey of face manipulation and fake detection

R Tolosana, R Vera-Rodriguez, J Fierrez, A Morales… - Information …, 2020 - Elsevier
The free access to large-scale public databases, together with the fast progress of deep
learning techniques, in particular Generative Adversarial Networks, have led to the …

A comprehensive review of face morph generation and detection of fraudulent identities

M Hamza, S Tehsin, M Humayun, MF Almufareh… - Applied Sciences, 2022 - mdpi.com
A robust facial recognition system that has soundness and completeness is essential for
authorized control access to lawful resources. Due to the availability of modern image …

Privacy-friendly synthetic data for the development of face morphing attack detectors

N Damer, CAF López, M Fang… - Proceedings of the …, 2022 - openaccess.thecvf.com
The main question this work aims at answering is:" can morphing attack detection (MAD)
solutions be successfully developed based on synthetic data?". Towards that, this work …

Morphing attack detection-database, evaluation platform, and benchmarking

K Raja, M Ferrara, A Franco… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite
the number of advancements reported in recent works, we note serious open issues such as …

FedForgery: generalized face forgery detection with residual federated learning

D Liu, Z Dang, C Peng, Y Zheng, S Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the continuous development of deep learning in the field of image generation models, a
large number of vivid forged faces have been generated and spread on the Internet. These …

Are GAN-based morphs threatening face recognition?

E Sarkar, P Korshunov, L Colbois… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
Morphing attacks are a threat to biometric systems where the biometric reference in an
identity document can be altered. This form of attack presents an important issue in …

Pw-mad: Pixel-wise supervision for generalized face morphing attack detection

N Damer, N Spiller, M Fang, F Boutros… - Advances in Visual …, 2021 - Springer
A face morphing attack image can be verified to multiple identities, making this attack a
major vulnerability to processes based on identity verification, such as border checks …

Adversarial attacks against face recognition: A comprehensive study

F Vakhshiteh, A Nickabadi, R Ramachandra - IEEE Access, 2021 - ieeexplore.ieee.org
Face recognition (FR) systems have demonstrated reliable verification performance,
suggesting suitability for real-world applications ranging from photo tagging in social media …

SYN-MAD 2022: Competition on face morphing attack detection based on privacy-aware synthetic training data

M Huber, F Boutros, AT Luu, K Raja… - … Joint Conference on …, 2022 - ieeexplore.ieee.org
This paper presents a summary of the Competition on Face Morphing Attack Detection
Based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 In-ternational …