I. Introduction
In modern unsupervised access control systems of campuses, corporations, bus and train stations, face authentication has been widely deployed for identity verification. During authentication, an access control system reads a facial biometric reference (e.g., a template) stored in a user’s enrolment record in a database or in his/her personal access card, and then compares it with a trusted live facial image from the same subject. When a similarity score resulting from this comparison process is higher than the system’s threshold, a gate automatically opens to permit passing without human check, and it can significantly reduce users’ transaction time in the access control process. Meanwhile, to simplify the enrolment process, many systems allow users to submit their own photos when applying for access cards. If those photos comply to the predefined image standards [1], on-site data collections are not required. The unsupervised capture process of the enrolment image is convenient for ordinary users, but they also provide potential attack conditions for adversaries, such as morphing attacks (MAs). The goal of face MAs is to compromise the uniqueness of facial biometric templates with non-intrusive ways, to create a template (e.g., a manipulated face) that can match with multiple subjects. Once a manipulated facial image is maliciously injected into an enrolment record as biometric reference, multiple subjects can share and use the access card, which has negative impacts on public security.