共 50 条
- [1] Machine Readable Travel Documents, (2015)
- [2] Ferrara M., Franco A., Maltoni D., The magic passport, Proc. IEEE Int. Joint Conf. Biometrics (IJCB), pp. 1-7, (2014)
- [3] Makrushin A., Neubert T., Dittmann J., Automatic generation and detection of visually faultless facial morphs, Proc. 12th Int. Joint Conf. Comput. Vis. Imag. Comput. Graph. Theory Appl. (VISAPP), pp. 39-50, (2017)
- [4] Neubert T., Makrushin A., Hildebrandt M., Kraetzer C., Dittmann J., Extended stirtrace benchmarking of biometric and forensic qualities of morphed face images, IET Biometrics, 7, 4, pp. 325-332, (2018)
- [5] Damer N., Saladie A.M., Braun A., Kuijper A., MorGAN: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network, Proc. IEEE 9th Int. Conf. Biometrics Theory Appl. Syst. (BTAS), pp. 1-10, (2018)
- [6] Damer N., Boutros F., Saladie A.M., Kirchbuchner F., Kuijper A., Realistic dreams: Cascaded enhancement of GAN-generated images with an example in face morphing attacks, Proc. IEEE 10th Int. Conf. Biometrics Theory Appl. Syst. (BTAS), pp. 1-10, (2019)
- [7] Qian S., Et al., Make a face: Towards arbitrary high fidelity face manipulation, Proc. IEEE/CVF Int. Conf. Comput. Vis. (ICCV), Seoul, South Korea, pp. 10033-10042, (2019)
- [8] Makrushin A., Wolf A., An overview of recent advances in assessing and mitigating the face morphing attack, Proc. 26th Eur. Signal Process. Conf. (EUSIPCO), pp. 1017-1021, (2018)
- [9] Scherhag U., Rathgeb C., Merkle J., Breithaupt R., Busch C., Face recognition systems under morphing attacks: A survey, IEEE Access, 7, pp. 23012-23026, (2019)
- [10] Robertson D.J., Kramer R.S., Burton A.M., Fraudulent ID using face morphs: Experiments on human and automatic recognition, PLoS ONE, 12, 3, (2017)