I. Introduction
Face recognition systems (FRSs) have become common in a variety of applications, including safe entry authority for the purposes of person identification and verification. The immigration control process, where a traveler’s facial features are matched with an identifier in a travel document or permit card databases to confirm their stated identity [1], is one of many additional uses, such as medical care, security, and ecommerce, that is most pertinent. Face morph has been utilised extensively for over a decade, particularly in the visual animation sector [2], however recent research emphasises the attack possibility against FRSs [3]. Figure 1 shows a morph facial image (B) of subjects 1 (A) and 2 (C).