Finding the Suitable Doppelgänger for a Face Morphing Attack | IEEE Conference Publication | IEEE Xplore