Differential Morphed Face Detection Using Deep Siamese Networks
ICPR Workshops, pp. 560-572, 2020.
Although biometric facial recognition systems are fast becoming part of security applications, these systems are still vulnerable to morphing attacks, in which a facial reference image can be verified as two or more separate identities. In border control scenarios, a successful morphing attack allows two or more people to use the same p...More
PPT (Upload PPT)