A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities
A robust facial recognition system that has soundness and completeness is essential for authorized control access to lawful resources.Due to the availability of modern image manipulation technology, the current facial recognition systems are vulnerable to different biometric attacks.Image morphing attack is one of these Feather Duster attacks.This