A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities

A robust facial recognition system that has soundness and completeness is essential for authorized control access to lawful resources. Due to the availability of modern image manipulation technology, the current facial recognition systems are vulnerable to different biometric attacks. Image morphing...

Full description

Bibliographic Details
Main Authors: Muhammad Hamza, Samabia Tehsin, Mamoona Humayun, Maram Fahaad Almufareh, Majed Alfayad
Format: Article
Language:English
Published: MDPI AG 2022-12-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/24/12545
_version_ 1827642024462909440
author Muhammad Hamza
Samabia Tehsin
Mamoona Humayun
Maram Fahaad Almufareh
Majed Alfayad
author_facet Muhammad Hamza
Samabia Tehsin
Mamoona Humayun
Maram Fahaad Almufareh
Majed Alfayad
author_sort Muhammad Hamza
collection DOAJ
description A robust facial recognition system that has soundness and completeness is essential for authorized control access to lawful resources. Due to the availability of modern image manipulation technology, the current facial recognition systems are vulnerable to different biometric attacks. Image morphing attack is one of these attacks. This paper compares and analyzes state-of-the-art morphing attack detection (MAD) methods. The performance of different MAD methods is also compared on a wide range of source image databases. Moreover, it also describes the morph image generation techniques along with the limitations, strengths, and drawbacks of each morphing technique. Results are investigated and compared with in-depth analysis providing insight into the vulnerabilities of existing systems. This paper provides vital information that is essential for building a next generation morph attack detection system.
first_indexed 2024-03-09T17:22:49Z
format Article
id doaj.art-307ea97da15c468b98fd4164d22bbc4c
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-09T17:22:49Z
publishDate 2022-12-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-307ea97da15c468b98fd4164d22bbc4c2023-11-24T13:00:28ZengMDPI AGApplied Sciences2076-34172022-12-0112241254510.3390/app122412545A Comprehensive Review of Face Morph Generation and Detection of Fraudulent IdentitiesMuhammad Hamza0Samabia Tehsin1Mamoona Humayun2Maram Fahaad Almufareh3Majed Alfayad4Department of Computer Science, Bahria University, Shangrilla Road, Sector E-8, Islamabad 44220, PakistanDepartment of Computer Science, Bahria University, Shangrilla Road, Sector E-8, Islamabad 44220, PakistanDepartment of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi ArabiaDepartment of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi ArabiaDepartment of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi ArabiaA robust facial recognition system that has soundness and completeness is essential for authorized control access to lawful resources. Due to the availability of modern image manipulation technology, the current facial recognition systems are vulnerable to different biometric attacks. Image morphing attack is one of these attacks. This paper compares and analyzes state-of-the-art morphing attack detection (MAD) methods. The performance of different MAD methods is also compared on a wide range of source image databases. Moreover, it also describes the morph image generation techniques along with the limitations, strengths, and drawbacks of each morphing technique. Results are investigated and compared with in-depth analysis providing insight into the vulnerabilities of existing systems. This paper provides vital information that is essential for building a next generation morph attack detection system.https://www.mdpi.com/2076-3417/12/24/12545face morphingbiometric forensicsmorphed identitiesbiometricsface recognition
spellingShingle Muhammad Hamza
Samabia Tehsin
Mamoona Humayun
Maram Fahaad Almufareh
Majed Alfayad
A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities
Applied Sciences
face morphing
biometric forensics
morphed identities
biometrics
face recognition
title A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities
title_full A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities
title_fullStr A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities
title_full_unstemmed A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities
title_short A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities
title_sort comprehensive review of face morph generation and detection of fraudulent identities
topic face morphing
biometric forensics
morphed identities
biometrics
face recognition
url https://www.mdpi.com/2076-3417/12/24/12545
work_keys_str_mv AT muhammadhamza acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities
AT samabiatehsin acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities
AT mamoonahumayun acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities
AT maramfahaadalmufareh acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities
AT majedalfayad acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities
AT muhammadhamza comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities
AT samabiatehsin comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities
AT mamoonahumayun comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities
AT maramfahaadalmufareh comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities
AT majedalfayad comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities