Face Morphing Attack Generation and Detection: A State-of-the-Art Review

IF 5
Davide Antonutti;Justin Ilyes;Laurenz Ruzicka;Silvia Poletti;Marcel Hasenbalg;Martin Boyer;David Fischinger
{"title":"Face Morphing Attack Generation and Detection: A State-of-the-Art Review","authors":"Davide Antonutti;Justin Ilyes;Laurenz Ruzicka;Silvia Poletti;Marcel Hasenbalg;Martin Boyer;David Fischinger","doi":"10.1109/TBIOM.2026.3655515","DOIUrl":null,"url":null,"abstract":"Face morphing attacks pose a significant threat to the security and reliability of biometric identity verification systems, particularly in real-world applications such as passport issuance and border control. In a morphing attack, facial features from two or more individuals are blended into a single image that can deceive face recognition systems, allowing multiple individuals to share a biometric identity. This survey provides a comprehensive overview of the literature on face morphing attack detection (MAD). It begins by introducing the practical implications of morphing attacks and their relevance in operational contexts. The paper then explores a wide range of morphing generation techniques, including both classical landmark-based approaches and modern deep learning-based methods such as GANs and diffusion models. The work proceeds with an extensive review and categorization of existing MAD techniques, grouped into meaningful categories based on their underlying principles, ranging from texture-based and quality-based methods to deep learning and hybrid approaches. By organizing the literature and identifying current trends, strengths, and limitations, this survey offers valuable insight for researchers and practitioners seeking to understand, evaluate, or develop robust solutions against face morphing attacks.","PeriodicalId":73307,"journal":{"name":"IEEE transactions on biometrics, behavior, and identity science","volume":"8 3","pages":"412-430"},"PeriodicalIF":5.0000,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11357967","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE transactions on biometrics, behavior, and identity science","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/11357967/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2026/1/19 0:00:00","PubModel":"Epub","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Face morphing attacks pose a significant threat to the security and reliability of biometric identity verification systems, particularly in real-world applications such as passport issuance and border control. In a morphing attack, facial features from two or more individuals are blended into a single image that can deceive face recognition systems, allowing multiple individuals to share a biometric identity. This survey provides a comprehensive overview of the literature on face morphing attack detection (MAD). It begins by introducing the practical implications of morphing attacks and their relevance in operational contexts. The paper then explores a wide range of morphing generation techniques, including both classical landmark-based approaches and modern deep learning-based methods such as GANs and diffusion models. The work proceeds with an extensive review and categorization of existing MAD techniques, grouped into meaningful categories based on their underlying principles, ranging from texture-based and quality-based methods to deep learning and hybrid approaches. By organizing the literature and identifying current trends, strengths, and limitations, this survey offers valuable insight for researchers and practitioners seeking to understand, evaluate, or develop robust solutions against face morphing attacks.
面部变形攻击的生成与检测:最新进展综述
面部变形攻击对生物识别身份验证系统的安全性和可靠性构成重大威胁,特别是在护照签发和边境控制等现实应用中。在变形攻击中,来自两个或更多个体的面部特征被混合成一张图像,可以欺骗面部识别系统,允许多个个体共享生物识别身份。本文对人脸变形攻击检测(MAD)的相关文献进行了综述。首先介绍变形攻击的实际含义及其在操作环境中的相关性。然后,本文探讨了广泛的变形生成技术,包括经典的基于里程碑的方法和现代基于深度学习的方法,如gan和扩散模型。研究人员对现有的MAD技术进行了广泛的回顾和分类,并根据其基本原理将其分为有意义的类别,从基于纹理和基于质量的方法到深度学习和混合方法。通过整理文献并确定当前的趋势、优势和局限性,本调查为寻求理解、评估或开发针对面部变形攻击的健壮解决方案的研究人员和实践者提供了有价值的见解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
10.90
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书