Fig. 1
From: Face morphing attacks: Investigating detection with humans and computers

Top: An example of the images used in previous work (adapted from Robertson et al., 2018). Bottom: An example of the images used in the current work (Experiment 3Footnote
We have presented images from Experiment 3 as we did not have permission to publish the images used in Experiments 1 and 2.
). The three faces depict two individuals (left, right) and a morph created using these images (center). The individuals pictured have given permission for their images to be reproduced here