Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/14857
Title: A Systematic Literature Review on Face Morphing Attack Detection (MAD)
Authors: Kenneth, Mary Ogbuka
Bashif, Sulaimon Adebayo
Abdulhamid, Shafii Muhammad
Laud, Ochei Charles
Keywords: Face morphing · Morphing attack detection · Systematic literature review ·
Feature extraction techniques · Performance metrics
Issue Date: 2022
Publisher: Springer Cham
Citation: Kenneth, M. O., Bashir, S. A., Abdulhamid, S. M., & Ochei, L. C. (2022). A Systematic Literature Review on Face Morphing Attack Detection (MAD). Illumination of Artificial Intelligence in Cybersecurity and Forensics, 139-172.
Abstract: Morphing attacks involve generating a single artificial facial photograph that represents two distinct qualities and utilizing it as a reference photograph on a document. The high quality of the morph raises the question of how vulnerable facial recognition systems are to morph attacks. Morphing Attack Detection (MAD) systems have aroused a lot of interest in recent years, owing to the freely available digital alteration tools that criminals can employ to perform face morphing attacks. There is, however, little research that critically reviews the methodology and performance metrics used to evaluate MAD systems. The goal of this study is to find MAD methodologies, feature extraction techniques, and performance assessment metrics that can help MAD systems become more robust. To fulfill this study’s goal, a Systematic Literature Review was done. A manual search of 9 well-known databases yielded 2089 papers. Based on the study topic, 33 primary studies were eventually considered.Anovel taxonomyofthe strategies utilized inMADfor feature extraction is one of the research’s contributions. The study also discovered that (1) single and differential image-based approaches are the commonly used approaches for MAD; (2) texture and keypoint feature extraction methods are more widely used than other feature extraction techniques; and (3) Bona-fide Presentation Classification Error Rate and Attack Presentation Classification Error Rate are the commonly used performance metrics for evaluating MAD systems. This paper addresses open issues and includes additional pertinent information on MAD, making it a valuable resource for researchers developing and evaluating MAD systems.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/14857
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
SystematicReviewMAD.pdf3.1 MBAdobe PDFView/Open
IlluminationinAIandForensicfrontmatter.pdf1.24 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.