Authors
Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
Publication date
2021/3/17
Source
IEEE transactions on technology and society
Volume
2
Issue
3
Pages
128-145
Publisher
IEEE
Description
Face recognition has been successfully deployed in real-time applications, including secure applications such as border control. The vulnerability of face recognition systems (FRSs) to various kinds of attacks (both direct and indirect attacks) and face morphing attacks has received great interest from the biometric community. The goal of a morphing attack is to subvert an FRS at an automatic border control (ABC) gate by presenting an electronic machine-readable travel document (eMRTD) or e-passport that is obtained based on a morphed face image. Since the application process for an e-passport in the majority of countries requires a passport photograph to be presented by the applicant, a malicious actor and an accomplice can generate a morphed face image to obtain the e-passport. An e-passport with a morphed face image can be used by both the malicious actor and the accomplice to cross a border, as the …
Total citations
202120222023202410364325
Scholar articles
S Venkatesh, R Ramachandra, K Raja, C Busch - IEEE transactions on technology and society, 2021