3D Face Morphing Attacks: Generation, Vulnerability and Detection.
Jag Mohan SinghRaghavendra RamachandraPublished in: CoRR (2022)
Keyphrases
- attack detection
- automatic detection
- detection algorithm
- anomaly detection
- countermeasures
- detect malicious
- face recognition
- buffer overflow
- security risks
- detection accuracy
- false alarms
- detection rate
- stereo vision
- malicious attacks
- face images
- security vulnerabilities
- human faces
- face detection
- detection method
- computer security
- intrusion detection
- normal traffic
- digital images
- detecting malicious
- feature extraction