
bob.paper.icassp2021_morph
Source code for creating morphing attacks and running vulnerability analysis experiments described in the paper 'Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks'.
Source code for creating morphing attacks and running vulnerability analysis experiments described in the paper 'Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks'.