I. Introduction
Face morphing is the process of creating a composite face image (a morph) by digitally manipulating face images of different individuals, usually two. Under certain circumstances, the composite image looks like both contributors and can be used by one of them (accomplice) to apply for a new ID document. The other contributor (criminal) can then use the ID document to conduct illegal activities and evade justice. This identity sharing scheme is known as a Morphing Attack (MA) and is a serious and urgent security vulnerability, since it is difficult for both human officers and Face Recognition Systems (FRSs) to detect high quality morphs [1] [2]. An example of a MA is shown in Fig. 1.
Example of a morphing attack with the accomplice on the left, the morphed passport image in the middle and the criminal on the right.