Differential Morphed Face Detection Using Deep Siamese Networks

Sobhan Soleymani
Sobhan Soleymani
Baaria Chaudhary
Baaria Chaudhary

ICPR Workshops, pp. 560-572, 2020.

Cited by: 0|Views6
EI

Abstract:

Although biometric facial recognition systems are fast becoming part of security applications, these systems are still vulnerable to morphing attacks, in which a facial reference image can be verified as two or more separate identities. In border control scenarios, a successful morphing attack allows two or more people to use the same p...More

Code:

Data:

Full Text
Bibtex
Your rating :
0

 

Tags
Comments