
(Fig. 10b), class 2 is Prabhas (Fig. 10c), class
3 is Salman khan (Fig. 10d), class 4 is morph
image of Aamir khan and Amitabh bachchan
(Fig. 10e), class 5 is morph image of Aamir khan
and Prabhas (Fig. 10f), class 6 is morph image
of Aamir khan and Salman khan (Fig. 10g),
class 7 is morph image of Amitabh bachchan
and Prabhas (Fig. 10h), class 8 is morph image
of Amitabh bachchan and Salman khan (Fig.
10i), and class 9 is morph image of Prabhas and
Salman khan (Fig. 10j).
The total number of testing samples used
were 5779, out of which, the number of correctly
classified were 2631. Hence, the accuracy came
out to be 45.53%.
4.4 Comparative Performance Analysis
To validate the performance of the proposed Resnet-
152 model, we compare it with pre-trained VGG16
and Alexnet models. VGG16 and Alexnet were
trained and tested on our dataset, with input sizes of
224 × 224 and 227 × 227, respectively, while Resnet-
152 used 256 × 256 images. All models were trained
for 30 epochs, with batch size 64 and a learning rate
of 0.001. VGG16 is a 16-layer model using transfer
learning, and Alexnet is an 8-layer CNN. While using
pre-trained models yielded better results, Alexnet was
implemented from scratch to reduce overfitting. We
found that Alexnet performed well for binary clas-
sification but struggled as the number of classes in-
creased. Overall, Resnet-152 proved to be the most
efficient model.
5 CONCLUSION
In this paper, a model is proposed to detect face
morphing attacks. Various experiment scenarios,
i.e. simple face morphs, face morphs with beards,
face morphs with eyeglasses, and face morphs with a
combination of beards and eyeglasses are considered
to validate the proposed model. A dataset covering
these scenarios is also contributed to carry out the
experiments. Further, a comparative performance
analysis using the dataset is done with the popular
pre-existing CNN models: Alexnet and VGG16. As
a whole, the proposed Resnet-152 has shown better
performance in terms of accuracy. In future, we
plan to extend this model for more possible attack
scenarios and test the scalability with other available
benchmark datasets.
REFERENCES
E-loan app: Woman sent morphed pic. https://timesofindia.
indiatimes.com/city/mumbai/e-loan-app-woman-sen
t-morphed-pic/articleshow/91930043.cms. [Online;
accessed 01-Jun-2022].
Bayometric. How biometric identification for airport and
border security can deter illegal border crossings? ht
tps://www.bayometric.com/biometric-identificatio
n-for-airport-and-border-security/. [Online; accessed
02-August-2022].
Biometrika. Introduction to biometric systems. http://ww
w.biometrika.it/eng/wp biointro.html. [Online; ac-
cessed 02-August-2022].
Ferrara, M., Franco, A., and Maltoni, D. (2014). The magic
passport. IJCB 2014 - 2014 IEEE/IAPR International
Joint Conference on Biometrics.
findbiometrics. Border control and airport biometrics. https:
//findbiometrics.com/applications/border-control-air
ports/. [Online; accessed 02-August-2022].
Fox news, y. Fox news aired a bizarre fake photo replac-
ing jeffrey epstein with the judge who signed off on
trump’s search warrant. https://www.yahoo.com/ne
ws/fox- news-aired-bizarre-fake-153544605.html.
[Online; accessed 02-August-2022].
J
¨
ager, T., Seiler, K., and Mecklinger, A. (2005). Picture
database of morphed faces (mofa): technical report.
http://psydok.sulb.uni-saarland.de/volltexte/2005/50
5/.
Kramer, R. S., Mireku, M. O., Flack, T. R., and Ritchie,
K. L. (2019). Face morphing attacks: Investigating
detection with humans and computers. Cognitive re-
search: principles and implications, 4(1):1–15.
Neubert, T. (2017). Face morphing detection: An approach
based on image degradation analysis. In Kraetzer,
C., Shi, Y.-Q., Dittmann, J., and Kim, H. J., editors,
Digital Forensics and Watermarking, pages 93–106,
Cham. Springer International Publishing.
Scherhag, U., Rathgeb, C., Merkle, J., Breithaupt, R., and
Busch, C. (2019). Face recognition systems under
morphing attacks: A survey. IEEE Access, 7:23012–
23026.
Seibold, C., Hilsmann, A., and Eisert, P. (2018). Reflec-
tion analysis for face morphing attack detection. In
2018 26th European Signal Processing Conference
(EUSIPCO), pages 1022–1026. IEEE.
Spreeuwers, L., Schils, M., and Veldhuis, R. (2018). To-
wards robust evaluation of face morphing detection.
In 2018 26th European Signal Processing Conference
(EUSIPCO), pages 1027–1031.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
734