On the vulnerability of face recognition systems towards morphed face attacks.
Ulrich ScherhagRamachandra RaghavendraKiran B. RajaMarta Gomez-BarreroChristian RathgebChristoph BuschPublished in: IWBF (2017)
Keyphrases
- face recognition systems
- face images
- face verification
- face recognition
- face matching
- robust face recognition
- face recognition algorithms
- illumination variations
- feret database
- buffer overflow
- security risks
- security vulnerabilities
- facial appearance
- frontal view
- face detection
- human faces
- illumination normalization
- facial expressions
- feature extraction
- facial features
- principal component analysis
- face recognition grand challenge
- computer vision
- face identification
- lighting conditions
- feature vectors
- input image