A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities
A robust facial recognition system that has soundness and completeness is essential for authorized control access to lawful resources. Due to the availability of modern image manipulation technology, the current facial recognition systems are vulnerable to different biometric attacks. Image morphing...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-12-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/12/24/12545 |
_version_ | 1827642024462909440 |
---|---|
author | Muhammad Hamza Samabia Tehsin Mamoona Humayun Maram Fahaad Almufareh Majed Alfayad |
author_facet | Muhammad Hamza Samabia Tehsin Mamoona Humayun Maram Fahaad Almufareh Majed Alfayad |
author_sort | Muhammad Hamza |
collection | DOAJ |
description | A robust facial recognition system that has soundness and completeness is essential for authorized control access to lawful resources. Due to the availability of modern image manipulation technology, the current facial recognition systems are vulnerable to different biometric attacks. Image morphing attack is one of these attacks. This paper compares and analyzes state-of-the-art morphing attack detection (MAD) methods. The performance of different MAD methods is also compared on a wide range of source image databases. Moreover, it also describes the morph image generation techniques along with the limitations, strengths, and drawbacks of each morphing technique. Results are investigated and compared with in-depth analysis providing insight into the vulnerabilities of existing systems. This paper provides vital information that is essential for building a next generation morph attack detection system. |
first_indexed | 2024-03-09T17:22:49Z |
format | Article |
id | doaj.art-307ea97da15c468b98fd4164d22bbc4c |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-09T17:22:49Z |
publishDate | 2022-12-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-307ea97da15c468b98fd4164d22bbc4c2023-11-24T13:00:28ZengMDPI AGApplied Sciences2076-34172022-12-0112241254510.3390/app122412545A Comprehensive Review of Face Morph Generation and Detection of Fraudulent IdentitiesMuhammad Hamza0Samabia Tehsin1Mamoona Humayun2Maram Fahaad Almufareh3Majed Alfayad4Department of Computer Science, Bahria University, Shangrilla Road, Sector E-8, Islamabad 44220, PakistanDepartment of Computer Science, Bahria University, Shangrilla Road, Sector E-8, Islamabad 44220, PakistanDepartment of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi ArabiaDepartment of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi ArabiaDepartment of Information Systems, College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi ArabiaA robust facial recognition system that has soundness and completeness is essential for authorized control access to lawful resources. Due to the availability of modern image manipulation technology, the current facial recognition systems are vulnerable to different biometric attacks. Image morphing attack is one of these attacks. This paper compares and analyzes state-of-the-art morphing attack detection (MAD) methods. The performance of different MAD methods is also compared on a wide range of source image databases. Moreover, it also describes the morph image generation techniques along with the limitations, strengths, and drawbacks of each morphing technique. Results are investigated and compared with in-depth analysis providing insight into the vulnerabilities of existing systems. This paper provides vital information that is essential for building a next generation morph attack detection system.https://www.mdpi.com/2076-3417/12/24/12545face morphingbiometric forensicsmorphed identitiesbiometricsface recognition |
spellingShingle | Muhammad Hamza Samabia Tehsin Mamoona Humayun Maram Fahaad Almufareh Majed Alfayad A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities Applied Sciences face morphing biometric forensics morphed identities biometrics face recognition |
title | A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities |
title_full | A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities |
title_fullStr | A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities |
title_full_unstemmed | A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities |
title_short | A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities |
title_sort | comprehensive review of face morph generation and detection of fraudulent identities |
topic | face morphing biometric forensics morphed identities biometrics face recognition |
url | https://www.mdpi.com/2076-3417/12/24/12545 |
work_keys_str_mv | AT muhammadhamza acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities AT samabiatehsin acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities AT mamoonahumayun acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities AT maramfahaadalmufareh acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities AT majedalfayad acomprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities AT muhammadhamza comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities AT samabiatehsin comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities AT mamoonahumayun comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities AT maramfahaadalmufareh comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities AT majedalfayad comprehensivereviewoffacemorphgenerationanddetectionoffraudulentidentities |