Abstract

Abstract: There is a lot of data traffic that translates and transports data in the digital environment of the World Wide Web. The data is presented as files and photos. Data can morph, so it's important to detect these instances. The suggested method will identify modified photographs and alert the user to the validity of the images. In recent years, the research community has paid a great deal of attention to the problem of morph attack detection. To accurately detect morph attacks, various studies have been done in this area and various methods have been used. Although enough morph images are not readily available for research purposes, a variety of face databases are used to create morph image databases. Attack detection via face morphing is difficult. Automated border control gates utilize both manual inspection and automatic categorization methods to identify morphing attacks. It is vital to comprehend how a machine learning system can recognise altered faces and the most pertinent facial regions.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call