Cargando...

Face morphing attacks: Investigating detection with humans and computers

BACKGROUND: In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible...

Descripción completa

Guardado en:
Detalles Bibliográficos
Publicado en:Cogn Res Princ Implic
Autores principales: Kramer, Robin S. S., Mireku, Michael O., Flack, Tessa R., Ritchie, Kay L.
Formato: Artigo
Lenguaje:Inglês
Publicado: Springer International Publishing 2019
Materias:
Acceso en línea:https://ncbi.nlm.nih.gov/pmc/articles/PMC6663958/
https://ncbi.nlm.nih.gov/pubmed/31359213
https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1186/s41235-019-0181-4
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!