1. Introduction
Robust, reliable verification systems are the crucial backbones of biometric document authentication protocols, that are to operate flawlessly. Although image morphing is not a new paradigm, it was first identified as a security concern by Ferrara et al. [8], who explained how a criminal can dodge a border control checkpoint using a travel document that was issued with a morphed image. The goal of the face image morphing attack is to synthesize a forged imaged from two composing original images such that the artificially crafted morphed image can be verified against the two original images not only visually, but also in the feature space by a classifier [28]. Moreover, morphed samples can be labeled as hard positive samples in comparison to negative genuine samples because morphed samples are synthesized to intentionally lie on the negative samples’ manifold. Similar to adversarially perturbed data samples that fool classification networks into a wrong predicted class [11], [16], morphed images are crafted to lead a verifier into a false acceptance.