Author:
Chalini G. R.,Kanimozhi K. V.
Publisher
Springer Nature Switzerland
Reference25 articles.
1. Wolberg, G.: Image morphing: a survey. Vis. Comput. 14(8–9), 360–3720 (1998)
2. Patel, A., Lapsiwala, P.: Image morphing algorithm: a survey. Int. J. Comput. Appl. 5(3), 156–160 (2015)
3. Scherhag, U., Rathgeb, C., Merkle, J., Breithaupt, R., Busch, C.: Face recognition systems under morphing attacks: a survey. IEEE Access. 7, 23012–23026 (2019). https://doi.org/10.1109/ACCESS.2019.2899367
4. Gonzalez, S., Valenzuela, A., Tapia, J.: Hybrid two-stage architecture for tampering detection of chipless id cards. IEEE Trans. Biom. Behav. Identity Sci. 3(1), 89–100 (2020)
5. Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: Proc. IEEE Int. Joint Conf. Biometrics, pp. 1–7. IEEE (2014)