Face morphing attacks: Investigating detection with humans and computers

Abstract Background In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be...

Full description

Bibliographic Details
Main Authors: Robin S. S. Kramer, Michael O. Mireku, Tessa R. Flack, Kay L. Ritchie
Format: Article
Language:English
Published: SpringerOpen 2019-07-01
Series:Cognitive Research
Subjects:
Online Access:http://link.springer.com/article/10.1186/s41235-019-0181-4