Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/14857
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKenneth, Mary Ogbuka-
dc.contributor.authorBashif, Sulaimon Adebayo-
dc.contributor.authorAbdulhamid, Shafii Muhammad-
dc.contributor.authorLaud, Ochei Charles-
dc.date.accessioned2022-08-27T14:11:42Z-
dc.date.available2022-08-27T14:11:42Z-
dc.date.issued2022-
dc.identifier.citationKenneth, M. O., Bashir, S. A., Abdulhamid, S. M., & Ochei, L. C. (2022). A Systematic Literature Review on Face Morphing Attack Detection (MAD). Illumination of Artificial Intelligence in Cybersecurity and Forensics, 139-172.en_US
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/14857-
dc.description.abstractMorphing attacks involve generating a single artificial facial photograph that represents two distinct qualities and utilizing it as a reference photograph on a document. The high quality of the morph raises the question of how vulnerable facial recognition systems are to morph attacks. Morphing Attack Detection (MAD) systems have aroused a lot of interest in recent years, owing to the freely available digital alteration tools that criminals can employ to perform face morphing attacks. There is, however, little research that critically reviews the methodology and performance metrics used to evaluate MAD systems. The goal of this study is to find MAD methodologies, feature extraction techniques, and performance assessment metrics that can help MAD systems become more robust. To fulfill this study’s goal, a Systematic Literature Review was done. A manual search of 9 well-known databases yielded 2089 papers. Based on the study topic, 33 primary studies were eventually considered.Anovel taxonomyofthe strategies utilized inMADfor feature extraction is one of the research’s contributions. The study also discovered that (1) single and differential image-based approaches are the commonly used approaches for MAD; (2) texture and keypoint feature extraction methods are more widely used than other feature extraction techniques; and (3) Bona-fide Presentation Classification Error Rate and Attack Presentation Classification Error Rate are the commonly used performance metrics for evaluating MAD systems. This paper addresses open issues and includes additional pertinent information on MAD, making it a valuable resource for researchers developing and evaluating MAD systems.en_US
dc.publisherSpringer Chamen_US
dc.subjectFace morphing · Morphing attack detection · Systematic literature review ·en_US
dc.subjectFeature extraction techniques · Performance metricsen_US
dc.titleA Systematic Literature Review on Face Morphing Attack Detection (MAD)en_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
SystematicReviewMAD.pdf3.1 MBAdobe PDFView/Open
IlluminationinAIandForensicfrontmatter.pdf1.24 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.