Fig. 1From: Face morphing attacks: Investigating detection with humans and computersTop: An example of the images used in previous work (adapted from Robertson et al., 2018). Bottom: An example of the images used in the current work (Experiment 3FootnoteWe have presented images from Experiment 3 as we did not have permission to publish the images used in Experiments 1 and 2.). The three faces depict two individuals (left, right) and a morph created using these images (center). The individuals pictured have given permission for their images to be reproduced hereBack to article page