Proceedings of International Conference on Computer Science and Communication Engineering (ICCSCE 2025)

CMAD: A CNN-Based model for Morphing Attack Detection

Authors
Pooja Arora1, *, Gurpreet Singh1, Aaisha Makkar2
1University Institute of Computing, Chandigarh University, Gharuan, India
2Department of Computer Science, University of Derby, Derby, United Kingdom
*Corresponding author. Email: poojaarora1418@gmail.com
Corresponding Author
Pooja Arora
Available Online 4 November 2025.
DOI
10.2991/978-94-6463-858-5_16How to use a DOI?
Keywords
morphing; morphing attack detection; Siamese model; CNN
Abstract

Authentication systems play a crucial role in verifying the identity of individuals, whether they are accessing physical spaces, digital platforms, or services. Traditional methods of authentication, such as passwords, PINs, and security questions, have limitations, including vulnerability to theft, guessing, or brute force attacks. Biometric authentication has emerged as a more secure and convenient alternative. Biometrics refers to the use of unique physical characteristics such as fingerprints, facial features, iris patterns, or voice recognition to identify individuals. For the purpose of security, these biometric systems are being employed in the banking sector, healthcare, offices, airports etc. At the airports, Automatic Border Control (ABC) gates are being used which capture a live photo and compare it with the photo in e-MRTD. The traveller is only allowed to pass the gate when both of these photos match. Today, these ABC systems are exposed to face morphing attacks in which a person tries to pass the gates by using a forged photo in his passport. This photo is created by combining two images together which resembles both the participating images and is used to fool the security systems. This problem is alarming as it is a matter of national security. Therefore, the proposed model detects whether a photo is morphed or not. The dataset contains both genuine and morphed images. Various pre-processing techniques is applied on the images to make them ready for the training. Three blocks of convolutional layers followed by a fully connected layer is used in the architecture. Adam optimizer is used for optimization and binary cross entropy is employed as a loss function. The model outperforms in comparison to existing techniques when various performance metrics are applied on the test dataset.

Copyright
© 2025 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of International Conference on Computer Science and Communication Engineering (ICCSCE 2025)
Series
Advances in Computer Science Research
Publication Date
4 November 2025
ISBN
978-94-6463-858-5
ISSN
2352-538X
DOI
10.2991/978-94-6463-858-5_16How to use a DOI?
Copyright
© 2025 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Pooja Arora
AU  - Gurpreet Singh
AU  - Aaisha Makkar
PY  - 2025
DA  - 2025/11/04
TI  - CMAD: A CNN-Based model for Morphing Attack Detection
BT  - Proceedings of International Conference on Computer Science and Communication Engineering (ICCSCE 2025)
PB  - Atlantis Press
SP  - 175
EP  - 186
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-858-5_16
DO  - 10.2991/978-94-6463-858-5_16
ID  - Arora2025
ER  -