... of Applied Sciences.
Further information about our facemorphing research.
(This article was first published on www.innovisions.de )
Face morphing describes the overlapping and combining of two faces in one photo to create one, new face that strongly resembles two ...
... are not talking about amusing apps that swap our relatives’ faces around, superimpose cute puppy-dog masks or display our unmistakable resemblance to a Hollywood star. When performed correctly, face morphing can pose a serious threat.
A single passport, multiple identities
Face morphing can be employed to assign multiple identities to a single ...
... finding weaknesses in biometric photos for some time now. “Face morphing”, as it is called, plays not least into the hands of human ... Sometimes, scammers even go so far as to employ what is known as “face morphing”: By combining two or even more faces, known points of comparison required by the identification ...
... transferred to future applications.
Fraunhofer IGD exposes face morphing
At Fraunhofer IGD, the Smart Living & Biometric Technologies Competence Center is conducting researching into the area of face morphing. Face morphing makes it possible, for example, to reproduce multiple ...
... the current research at the ATHENE Center on the subject of facemorphing.
The German government has passed a draft law to the effect ... against forgery. In concrete terms, this is all about morphing: several faces are merged into one.
Even if the introduction of the biometric ... overcoming border controls under a false identity, known as face morphing.
By combining two or even more faces, known points of ...
The accepted papers are:
Suppressing Gender and Age in Face Templates Using Incremental Variable Elimination
Authors: Philipp ... the persons identity can be deduced from biometric data. Using face templates only, information about gender, age, ethnicity, sexual ... attributes.
To Detect or not to Detect: The Right Faces to Morph
Authors: Naser Damer, Alexandra Moseguí Saladié, ... Fraunhofer IGD)
Abstract: Recent works have studied the face morphing attack detection performance generalization over variations in morphing approaches, image re-digitization, and image source variations. ...
... ID photos
When morphing faces, known points of comparison needed by the algorithms used in ... of business and society as a whole. Online players such as Facebook, Microsoft and Google already earn billions with their services. And ... peril. A recent scandal provides a prime example: A Facebook app shared large volumes of user data with UK-based Cambridge ... lead to errors—a weakness that criminals exploit through face morphing, i.e., when two faces are combined. ATHENE researchers at ...
... photos to be taken by issuing authorities only, one reason being face morphing. Our researchers have tools to detect fakes.