Damer, NaserNaserDamerFang, MeilingMeilingFangSiebke, PatrickPatrickSiebkeKolf, Jan NiklasJan NiklasKolfHuber, MarcoMarcoHuberBoutros, FadiFadiBoutros2023-06-292023-06-292023https://publica.fraunhofer.de/handle/publica/44495010.1109/IWBF57495.2023.10157869Investigating new methods of creating face morphing attacks is essential to foresee novel attacks and help mitigate them. Creating morphing attacks is commonly either performed on the image-level or on the representation-level. The representation-level morphing has been performed so far based on generative adversarial networks (GAN) where the encoded images are interpolated in the latent space to produce a morphed image based on the interpolated vector. Such a process was constrained by the limited reconstruction fidelity of GAN architectures. Recent advances in the diffusion autoencoder models have overcome the GAN limitations, leading to high reconstruction fidelity. This theoretically makes them a perfect candidate to perform representation-level face morphing. This work investigates using diffusion autoencoders to create face morphing attacks by comparing them to a wide range of image-level and representation-level morphs. Our vulnerability analyses on four state-of-the-art face recognition models have shown that such models are highly vulnerable to the created attacks, the MorDIFF, especially when compared to existing representation-level morphs. Detailed detectability analyses are also performed on the MorDIFF, showing that they are as challenging to detect as other morphing attacks created on the image- or representation-level. Data and morphing script are made public. https://github.com/naserdamer/MorDIFFenBranche: Information TechnologyResearch Line: Computer vision (CV)Research Line: Human computer interaction (HCI)LTA: Interactive decision-making support and assistance systemsLTA: Machine intelligence, algorithms, and data structures (incl. semantics)BiometricsFace recognitionMorphing attackMachine learningDeep learningATHENECRISPMorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencodersconference paper