Skip to main content
Fig. 1 | Cognitive Research: Principles and Implications

Fig. 1

From: Face morphing attacks: Investigating detection with humans and computers

Fig. 1

Top: An example of the images used in previous work (adapted from Robertson et al., 2018). Bottom: An example of the images used in the current work (Experiment 3Footnote

We have presented images from Experiment 3 as we did not have permission to publish the images used in Experiments 1 and 2.

). The three faces depict two individuals (left, right) and a morph created using these images (center). The individuals pictured have given permission for their images to be reproduced here

Back to article page