Login / Signup
3-D Face Morphing Attacks: Generation, Vulnerability and Detection.
Jag Mohan Singh
Raghavendra Ramachandra
Published in:
IEEE Trans. Biom. Behav. Identity Sci. (2024)
Keyphrases
</>
false positives
detection rate
false alarms
security risks
computer vision
recognition algorithm
countermeasures
malicious attacks
face images
pose estimation
network security
detection accuracy
denial of service
buffer overflow