Cargando…

Face morphing attacks: Investigating detection with humans and computers

BACKGROUND: In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible...

Descripción completa

Detalles Bibliográficos
Autores principales: Kramer, Robin S. S., Mireku, Michael O., Flack, Tessa R., Ritchie, Kay L.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6663958/
https://www.ncbi.nlm.nih.gov/pubmed/31359213
http://dx.doi.org/10.1186/s41235-019-0181-4

Ejemplares similares