ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2011.02045
  4. Cited By
Face Morphing Attack Generation & Detection: A Comprehensive Survey

Face Morphing Attack Generation & Detection: A Comprehensive Survey

3 November 2020
S. Venkatesh
Raghavendra Ramachandra
Kiran Raja
Christoph Busch
    AAML
    CVBM
ArXivPDFHTML

Papers citing "Face Morphing Attack Generation & Detection: A Comprehensive Survey"

15 / 15 papers shown
Title
diffDemorph: Extending Reference-Free Demorphing to Unseen Faces
diffDemorph: Extending Reference-Free Demorphing to Unseen Faces
Nitish Shukla
Arun Ross
DiffM
169
0
0
20 May 2025
Generalized Single-Image-Based Morphing Attack Detection Using Deep Representations from Vision Transformer
Generalized Single-Image-Based Morphing Attack Detection Using Deep Representations from Vision Transformer
Haoyu Zhang
Raghavendra Ramachandra
Kiran Raja
C. Busch
135
6
0
20 Jan 2025
TetraLoss: Improving the Robustness of Face Recognition against Morphing Attacks
TetraLoss: Improving the Robustness of Face Recognition against Morphing Attacks
M. Ibsen
Lázaro J. González Soler
Christian Rathgeb
C. Busch
CVBM
AAML
77
7
0
31 Dec 2024
SynMorph: Generating Synthetic Face Morphing Dataset with Mated Samples
SynMorph: Generating Synthetic Face Morphing Dataset with Mated Samples
Haoyu Zhang
Raghavendra Ramachandra
Kiran Raja
Christoph Busch
CVBM
50
2
0
09 Sep 2024
MIPGAN -- Generating Strong and High Quality Morphing Attacks Using
  Identity Prior Driven GAN
MIPGAN -- Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN
Haoyu Zhang
S. Venkatesh
Raghavendra Ramachandra
Kiran Raja
Naser Damer
Christoph Busch
GAN
31
15
0
03 Sep 2020
Can GAN Generated Morphs Threaten Face Recognition Systems Equally as
  Landmark Based Morphs? -- Vulnerability and Detection
Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? -- Vulnerability and Detection
S. Venkatesh
Haoyu Zhang
Raghavendra Ramachandra
Kiran Raja
Naser Damer
Christoph Busch
CVBM
37
84
0
07 Jul 2020
On the Influence of Ageing on Face Morph Attacks: Vulnerability and
  Detection
On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection
S. Venkatesh
Kiran Raja
Raghavendra Ramachandra
Christoph Busch
CVBM
26
23
0
06 Jul 2020
Style Your Face Morph and Improve Your Face Morphing Attack Detector
Style Your Face Morph and Improve Your Face Morphing Attack Detector
Clemens Seibold
Anna Hilsmann
Peter Eisert
CVBM
72
23
0
23 Apr 2020
Deep Face Representations for Differential Morphing Attack Detection
Deep Face Representations for Differential Morphing Attack Detection
U. Scherhag
Christian Rathgeb
J. Merkle
Christoph Busch
AAML
CVBM
92
105
0
05 Jan 2020
Robust Morph-Detection at Automated Border Control Gate using Deep
  Decomposed 3D Shape and Diffuse Reflectance
Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance
Jag Mohan Singh
Raghavendra Ramachandra
Kiran B. Raja
Christoph Busch
CVBM
27
19
0
03 Dec 2019
Image2StyleGAN: How to Embed Images Into the StyleGAN Latent Space?
Image2StyleGAN: How to Embed Images Into the StyleGAN Latent Space?
Rameen Abdal
Yipeng Qin
Peter Wonka
GAN
93
1,109
0
05 Apr 2019
Face morphing detection in the presence of printing/scanning and
  heterogeneous image sources
Face morphing detection in the presence of printing/scanning and heterogeneous image sources
Matteo Ferrara
Annalisa Franco
Davide Maltoni
CVBM
20
61
0
25 Jan 2019
FD-GAN: Face-demorphing generative adversarial network for restoring
  accomplice's facial image
FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image
Fei Peng
Le-Bing Zhang
Min Long
CVBM
PICV
GAN
11
59
0
19 Nov 2018
Reflection Analysis for Face Morphing Attack Detection
Reflection Analysis for Face Morphing Attack Detection
Clemens Seibold
Anna Hilsmann
Peter Eisert
CVBM
25
39
0
05 Jul 2018
Accurate and Robust Neural Networks for Security Related Applications
  Exampled by Face Morphing Attacks
Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks
Clemens Seibold
Wojciech Samek
Anna Hilsmann
Peter Eisert
AAML
CVBM
40
30
0
11 Jun 2018
1