Fig. 3From: Face morphing attacks: Investigating detection with humans and computersMorph acceptance for 19 of the pairs in Experiment 3. Both models within each pair are shown, illustrating the acceptance of morph images when presented by both the models they comprisedBack to article page