{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:46:49Z","timestamp":1765039609501,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030876630"},{"type":"electronic","value":"9783030876647"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":30,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Face recognition in controlled environments is nowadays considered rather reliable, and very good accuracy levels can be achieved by state-of-the-art systems in controlled scenarios. However, even under these desirable conditions, digital image alterations can severely affect the recognition performance. In particular, several studies show that automatic face recognition systems are very sensitive to the so-called face morphing attack, where face images of two individuals are mixed to produce a new face image containing facial features of both subjects. Face morphing represents nowadays a big security threat particularly in the context of electronic identity documentsbecause it can be successfully exploited for criminal intents, for instance to fool Automated Border Control (ABC) systems thus overcoming security controls at the borders. This chapter will describe the face morphing process, in an overview ranging from the traditional techniques based on geometry warping and texture blending to the most recent and innovative approaches based on deep neural networks. Moreover, the sensitivity of state-of-the-art face recognition algorithms to the face morphing attack will be assessed using morphed images of different quality generated using various morphing methods to identify possible factors influencing the probability of success of the attack.<\/jats:p>","DOI":"10.1007\/978-3-030-87664-7_6","type":"book-chapter","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T09:03:06Z","timestamp":1643619786000},"page":"117-137","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Morph Creation and Vulnerability of Face Recognition Systems to Morphing"],"prefix":"10.1007","author":[{"given":"Matteo","family":"Ferrara","sequence":"first","affiliation":[]},{"given":"Annalisa","family":"Franco","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/142920.134003","volume":"26","author":"T Beier","year":"1992","unstructured":"Beier T (1992) Feature-based image metamorphosis. Comput Graph 26:35\u201342","journal-title":"Comput Graph"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Steyvers M (1999) Morphing techniques for manipulating face images. Behav Res Meth Instrum Comput 359\u2013369","DOI":"10.3758\/BF03207733"},{"key":"6_CR3","unstructured":"J\u00e4ger T, Seiler KH, Mecklinger A (2005) Picture database of morphed faces (MoFa): technical report. Experimental neuropsychology unit. Department of Psychology, Saarland University, Saarbr\u00fccken, Germany"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Ferrara M, Franco A, Maltoni D (2014) The magic passport. In: International joint conference on biometrics, clearwater (FL), pp 1\u20137","DOI":"10.1109\/BTAS.2014.6996240"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Ferrara M, Franco A, Maltoni D (2016) On the effects of image alterations on face recognition accuracy. In: Face recognition across the imaging spectrum, pp 195\u2013222","DOI":"10.1007\/978-3-319-28501-6_9"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Robertson DJ et al. (2018) Detecting morphed passport photos: a training and individual differences approach. Cogn Res Princ Implic 3(27)","DOI":"10.1186\/s41235-018-0113-8"},{"key":"6_CR7","unstructured":"Robertson DJ (2020) Morphed passport photo detection by human observers. In: International conference on biometrics for borders. Warsaw"},{"key":"6_CR8","unstructured":"Spiegel (2021) Aktivisten schmuggeln Fotomontage in Reisepass. https:\/\/www.spiegel.de\/netzwelt\/netzpolitik\/biometrie-im-reisepass-peng-kollektiv-schmuggelt-fotomontage-in-ausweis-a-1229418.html"},{"key":"6_CR9","unstructured":"Monroy M (2021) Laws against morphing. https:\/\/digit.site36.net\/2020\/01\/10\/laws-against-morphing\/"},{"key":"6_CR10","unstructured":"The Peng! Collective (2021) Mask.ID Part II\u2014We send our passports to Libya. https:\/\/pen.gg\/campaign\/mask-id-2\/"},{"key":"6_CR11","unstructured":"GIMP (2021) GIMP animation package. https:\/\/www.gimp.org\/news\/2009\/06\/05\/gimp-animation-package-260-released\/"},{"key":"6_CR12","unstructured":"Luxand (2021) FaceMorpher. http:\/\/www.facemorpher.com\/"},{"key":"6_CR13","unstructured":"Abrosoft (2021) FantaMorph. https:\/\/www.fantamorph.com\/"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Scherhag U, Rathgeb C, Merkle J, Breithaupt R, Busch C (2019) Face recognition systems under morphing attacks: a survey. IEEE Access, pp 23012\u201323026","DOI":"10.1109\/ACCESS.2019.2899367"},{"key":"6_CR15","unstructured":"(2021) Dlib C++ Library. http:\/\/dlib.net\/"},{"key":"6_CR16","unstructured":"Wikipedia (2021) Image warping. http:\/\/en.wikipedia.org\/wiki\/Image_warping"},{"key":"6_CR17","volume-title":"Digital image warping","author":"G Wolberg","year":"1994","unstructured":"Wolberg G (1994) Digital image warping, 1st edn. IEEE Computer Society Press, Los Alamitos, CA, USA","edition":"1"},{"key":"6_CR18","unstructured":"Rogers DF, Adams JA (1989) Mathematical elements for computer graphics, 2nd ed. McGraw-Hill Higher Education"},{"key":"6_CR19","first-page":"793","volume":"6","author":"BN Delaunay","year":"1934","unstructured":"Delaunay BN (1934) Sur la sph\u00e8re vide. Bulletin de l\u2019Acad\u00e9mie des sciences de l\u2019URSS, Classe des sciences math\u00e9matiques et naturelles 6:793\u2013800","journal-title":"Bulletin de l'Acad\u00e9mie des sciences de l'URSS, Classe des sciences math\u00e9matiques et naturelles"},{"key":"6_CR20","unstructured":"Ferrara M, Franco A, Maltoni D (2019) Decoupling texture blending and shape warping in face morphing. In: International conference of the biometrics special interest group (BIOSIG), Darmstadt, pp 1\u20135"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Lai M, Oru\u00e7 I, Barton JS (2013) The role of skin texture and facial shape in representations of age and identity. Cortex, pp 252\u2013265","DOI":"10.1016\/j.cortex.2011.09.010"},{"key":"6_CR22","unstructured":"Gonzalez RC, Woods RE (2017) Digital image processing, 4th ed. Pearson"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Damer N, Saladi AM, Braun A, Kuijper A (2018) Morgan: recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In: Internationa conference on biometrics theory, applications and systems, pp 1\u201310","DOI":"10.1109\/BTAS.2018.8698563"},{"key":"6_CR24","unstructured":"Donahue J, Kr\u00e4henb\u00fchl P, Darrell T (2017) Adversarial feature learning. https:\/\/arxiv.org\/abs\/1605.09782"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Venkatesh S et al. (2020) Can gan generated morphs threaten face recognition systems equally as landmark based morphs?\u2014vulnerability and detection. In: 8th International workshop on biometrics and forensics (IWBF). Porto Portugal, pp 1\u20136","DOI":"10.1109\/IWBF49977.2020.9107970"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Karras T, Laine S, Aila T (2019) A style-based generator architecture for generative adversarial networks. In: IEEE conference on computer vision and pattern recognition, pp 4401\u20134410","DOI":"10.1109\/CVPR.2019.00453"},{"key":"6_CR27","unstructured":"Zhang H et al. (2020) MIPGAN\u2014generating robust and high quality morph attacks using GAN. https:\/\/arxiv.org\/abs\/2009.01729"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Karras T et al. (2020) Analysing and improving the image quality of StileGAN. In: IEEE\/CVF conference on computer vision and pattern recognition, pp 8110\u20138119","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"6_CR29","unstructured":"NIST (2021) Face recognition vendor test (FRVT) 1:1 verification. https:\/\/pages.nist.gov\/frvt\/html\/frvt11.html"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Grother P, Ngan M, Hanaoka K (2021) Ongoing face recognition vendor test (FRVT)\u2014Part 1: verification. NIST, Gaithersburg, MD","DOI":"10.6028\/NIST.IR.8381"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"FRONTEX\u2014R&D Unit (2015) Best practice technical guidelines for automated border control (ABC) systems. FRONTEX, Warsaw, Poland, ISBN: 978\u201392\u201395205\u201350\u20135. https:\/\/doi.org\/10.2819\/39041","DOI":"10.2819\/39041"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Scherhag U et al. (2017) Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: International conference of the biometrics special interest group (BIOSIG). Darmstadt, Germany","DOI":"10.23919\/BIOSIG.2017.8053499"},{"key":"6_CR33","unstructured":"GIMP (2021) GNU image manipulation program web site. http:\/\/www.gimp.org\/"},{"issue":"4","key":"6_CR34","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/TIFS.2017.2777340","volume":"13","author":"M Ferrara","year":"2018","unstructured":"Ferrara M, Franco A, Maltoni D (2018) Face demorphing. IEEE Trans Inf Forensics Secur 13(4):1008\u20131017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6_CR35","unstructured":"Xiberpix (2021) Sqirlz Morph 2.1 web site. http:\/\/www.xiberpix.net\/SqirlzMorph.html"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Raja K et al. (2020) Morphing attack detection - database, evaluation platform and benchmarking. In: IEEE transactions on information forensics and security (TIFS)","DOI":"10.1109\/TIFS.2020.3035252"},{"key":"6_CR37","unstructured":"(2021) AMSL face morph image data set. https:\/\/omen.cs.uni-magdeburg.de\/disclaimer\/index.php"},{"key":"6_CR38","doi-asserted-by":"publisher","unstructured":"DeBruine L, Jones B (2021) Face research lab London set. https:\/\/doi.org\/10.6084\/m9.figshare.5047666.v3","DOI":"10.6084\/m9.figshare.5047666.v3"},{"issue":"4","key":"6_CR39","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1049\/iet-bmt.2017.0147","volume":"7","author":"T Neubert","year":"2018","unstructured":"Neubert T, Makrushin A, Hildebrandt M, Kraetzer C, Dittmann J (2018) Extended stirtrace benchmarking of biometric and forensic qualities of morphed face images. IET Biometrics 7(4):325\u2013332","journal-title":"IET Biometrics"},{"key":"6_CR40","unstructured":"Wolf A (2016) ICAO: portrait quality (reference facial images for MRTD), version 0.7"},{"key":"6_CR41","unstructured":"BioLab (2021) Bologna online evaluation platform web site. https:\/\/biolab.csr.unibo.it\/fvcongoing\/UI\/Form\/BOEP.aspx"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Dorizzi B et al. (2009) Fingerprint and online signature verification competitions at ICB 2009. In: Proceedings 3rd IAPR\/IEEE international conference on biometrics (ICB09). Alghero","DOI":"10.1007\/978-3-642-01793-3_74"},{"key":"6_CR43","unstructured":"BioLab (2021) FVC-ongoing web site. http:\/\/biolab.csr.unibo.it\/fvcongoing"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Robertson DJ, Kramer RSS, Burton AM (2017) Fraudulent ID using face morphs: experiments on human and automatic recognition. PLoS ONE 12(3)","DOI":"10.1371\/journal.pone.0173319"},{"issue":"3","key":"6_CR45","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1177\/0963721416688114","volume":"26","author":"AW Young","year":"2017","unstructured":"Young AW, Burton AM (2017) Recognizing faces. Curr Dir Psychol Sci 26(3):212\u2013217","journal-title":"Curr Dir Psychol Sci"},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Raghavendra R, Raja KB, Venkatesh S, Busch C (2017) Face morphing versus face averaging: vulnerability and detection. In: IEEE international joint conference on biometrics (IJCB). Denver, CO, USA","DOI":"10.1109\/BTAS.2017.8272742"}],"container-title":["Advances in Computer Vision and Pattern Recognition","Handbook of Digital Face Manipulation and Detection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87664-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T07:05:00Z","timestamp":1707462300000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87664-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030876630","9783030876647"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87664-7_6","relation":{},"ISSN":["2191-6586","2191-6594"],"issn-type":[{"type":"print","value":"2191-6586"},{"type":"electronic","value":"2191-6594"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}