Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins.
Raghavendra RamachandraSushma VenkateshGaurav JaswalGuoqiang LiPublished in: CoRR (2023)
Keyphrases
- buffer overflow
- security risks
- facial asymmetry
- denial of service
- human faces
- case study
- dos attacks
- security vulnerabilities
- test bed
- frequency domain
- countermeasures
- risk assessment
- security threats
- malicious attacks
- gender recognition
- face images
- face identification
- malicious users
- facial expressions
- face recognition