Fig. 1From: Potential advantages and limitations of using information fusion in media forensics—a discussion on the example of detecting face morphing attacksDocument life-cycle in case of a face morphing attack including the evaluation scenarios “MAD in document issuing” (SC1) and “MAD in identity verification” (SC2) (image derived from [19], combined morph generated based on [12] original face images taken from the ECVP face dataset [20]Back to article page