Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Signal Processing

West Virginia University

Morph Attacks

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire Jan 2022

Generation Of High Performing Morph Datasets, Kelsey Lynn O'Haire

Graduate Theses, Dissertations, and Problem Reports

Facial recognition systems play a vital role in our everyday lives. We rely on this technology from menial tasks to issues as vital as national security. While strides have been made over the past ten years to improve facial recognition systems, morphed face images are a viable threat to the reliability of these systems. Morphed images are generated by combining the face images of two subjects. The resulting morphed face shares the likeness of the contributing subjects, confusing both humans and face verification algorithms. This vulnerability has grave consequences for facial recognition systems used on international borders or for law …