1. Introduction
Face recognition technique has witnessed remarkable progress in recent years. A variety of face recognition meth-ods [3], [19] are proposed in the literature and applied in prac-tical applications with very high accuracy. However, these methods are vulnerable to several attack [7], [14], [21], [34], one of which is the face morphing attack. A morphing attack is a face image which is purposefully manipulated to be matched with the probe images of more than one identity.