Paper Title : Face Recognition System Under Morphing Attacks
ISSN : 2394-2231
Year of Publication : 2021
MLA Style: S.Jagadeesan M.Sc(CS)., MCA., M.Phil(CS)., ME(CSE)., "Face Recognition System Under Morphing Attacks " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: S.Jagadeesan M.Sc(CS)., MCA., M.Phil(CS)., ME(CSE)., S.Sabitha "Face Recognition System Under Morphing Attacks " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Recently, researchers found that the intended generalizability of face recognition systems increases their vulnerability against attacks. especially , the attacks supported morphed face images pose a severe security risk to face recognition systems. within the previous couple of years, the subject of (face) image morphing and automatic morphing attack detection has sparked the interest of several research laboratories working within the field of biometrics. during this paper, a conceptual categorization and metrics for an evaluation of such methods are presented, followed by a comprehensive survey of relevant publications. additionally , technical considerations and tradeoffs of the surveyed methods are discussed along side open issues and challenges within the field
 W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, ‘‘Face recog nition: A literature survey,’’ ACM Comput. Surv., vol. 35, no. 4, pp. 399–458, Dec. 2003.  S. Z. Li and A. K. Jain, Eds., Handbook of Face Recognition. London, U.K.: Springer, 2011.  F. Schroff, D. Kalenichenko, and J. Philbin, ‘‘FaceNet: A unified embed- ding for face recognition and clustering,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2015, pp. 815–823.  O. M. Parkhi, A. Vedaldi, and A. Zisserman, ‘‘Deep face recognition,’’ in Proc. Brit. Mach. Vis. Conf. (BMVC), 2015, p. 6.  A. Mohammadi, S. Bhattacharjee, and S. Marcel, ‘‘Deeply vulnerable: A study of the robustness of face recognition to presentation attacks,’’ IET Biometrics, vol. 7, no. 1, pp. 15–26, Jan. 2018.  M. Ferrara, A. Franco, and D. Maltoni, ‘‘The magic passport,’’ in Proc. IEEE Int. Joint Conf. Biometrics (IJCB), Sep./Oct. 2014, pp. 1–7.  G. Wolberg, ‘‘Image morphing: A survey,’’ Vis. Comput., vol. 14, nos. 8–9, pp. 360– 372, Dec. 1998.  A. Patel and P. Lapsiwala, ‘‘Image morphing algorithm: A survey,’’ Int. J. Comput. Appl., vol. 5, no. 3, pp. 156–160, 2015.  Information Technology—Biometric Presentation Attack Detection— Part 3: Testing and Reporting, Standard ISO/IEC 30107-3:2017, ISO/IEC JTC1 SC37 Biometrics, International Organization for Standardization, Geneva, Switzerland, 2017.  M. Ferrara, A. Franco, and D. Maltoni, ‘‘On the effects of image alter- ations on face recognition accuracy,’’ in Face Recognition Across the Imaging Spectrum. Cham, Switzerland: Springer, 2016, pp. 195–222.  D. J. Robertson, A. Mungall, D. G. Watson, K. A. Wade, S. J. Nightingale, and S. Butler, ‘‘Detecting morphed passport photos: A training and individual differences approach,’’ Cognit. Res., Principles Implications, vol. 3, no. 1, p. 27, Jun. 2018.  A. Makrushin and A. Wolf, ‘‘An overview of recent advances in assessing and mitigating the face morphing attack,’’ in Proc. 26th Eur. Signal Process. Conf. (EUSIPCO), 2018, pp. 1017–1021.  ICAO Doc 9303, Machine Readable Travel Documents—Part 9: Deploy- ment of Biometric Identification and Electronic Storage of Data in MRTDs, 7th ed., Int. Civil Aviation Org., Montreal, QC, Canada, 2015.  R. Raghavendra, K. B. Raja, and C. Busch, ‘‘Detecting morphed face images,’’ in Proc. IEEE 8th Int. Conf. Biometrics Theory, Appl. Syst. (BTAS), Sep. 2016, pp. 1–7.  I. Craw, D. Tock, and A. Bennett, ‘‘Finding face features,’’ in Computer Vision—ECCV. Berlin, Germany: Springer, 1992, pp. 92–96.  T. F. Cootes, C. J. Taylor, D. H. Cooper, and J. Graham, ‘‘Active shape models-their training and application,’’ Comput. Vis. Image Understand., vol. 61, no. 1, pp. 38–59, Jan. 1995.  L. Wiskott, J.-M. Fellous, N. Krüger, and C. von der Malsburg, ‘‘Face recognition by elastic bunch graph matching,’’ in Computer Analysis of Images and Patterns. Berlin, Germany: Springer, 1997, pp. 456–463.  T. F. Cootes, G. J. Edwards, and C. J. Taylor, ‘‘Active appearance models,’’ IEEE Trans. Pattern Anal. Mach. Intell., vol. 23, no. 6, pp. 681–685, Jun. 2001.  V. Zanella and O. Fuentes, ‘‘An approach to automatic morphing of face images in frontal view,’’ in MICAI 2004: Advances in Artificial Intelligence. Berlin, Germany: Springer, 2004, pp. 679–687.  J. M. Saragih, S. Lucey, and J. F. Cohn, ‘‘Face alignment through sub- space constrained mean-shifts,’’ in Proc. IEEE 12th Int. Conf. Comput. Vis. (ICCV), Sep./Oct. 2009, pp. 1034–1041.
— — Biometrics, face morphing attack, face recognition, image morphing, morphing attack detection.