Loading [MathJax]/extensions/MathZoom.js
Evaluating the Integration of Morph Attack Detection in Automated Face Recognition Systems | IEEE Conference Publication | IEEE Xplore

Evaluating the Integration of Morph Attack Detection in Automated Face Recognition Systems


Abstract:

Due to the possibility of automatically verifying an individual’s identity by comparing his/her face with that present in a personal identification document, systems prov...Show More

Abstract:

Due to the possibility of automatically verifying an individual’s identity by comparing his/her face with that present in a personal identification document, systems providing identification must be equipped with digital manipulation detectors. Morphed facial images can be considered a threat among other manipulations because they are visually indistinguishable from authentic facial photos. They can have characteristics of many possible subjects due to the nature of the attack. Thus, morphing attack detection methods (MADs) must be integrated into automated face recognition. Following the recent advances in MADs, we investigate their effectiveness by proposing an integrated system simulator of real application contexts, moving from known to never-seen-before attacks.
Date of Conference: 17-18 June 2024
Date Added to IEEE Xplore: 27 September 2024
ISBN Information:

ISSN Information:

Conference Location: Seattle, WA, USA
References is not available for this document.

1. Introduction

The phenomenon of face spoofing has become increasingly important in biometrics and cybersecurity over the years. Advances in technology, especially in image and video manipulation, have seen the birth of phenomena such as deepfakes, face synthesis, and morphing techniques. The latter consists of gradually transforming a face image into another (Figure 1) and can be used for malicious purposes, for example, to deceive a face recognition system (FRS). In fact, it is possible to obtain false faces containing the characteristics of multiple real faces. The result of this operation can be maliciously exploited to share an identity document [8], as the face resulting from a well-made morphing process can be associated with all the contributing identities by a human operator and an automatic FRS [23]. The problem is even more evident if we consider that such a document can also be used by a terrorist to evade border control.

Select All
1.
Information technology — Biometric presentation attack detection — Part 3: Testing and reporting.
2.
G. Bradski, "The OpenCV Library", Dr. Dobb’s Journal of Software Tools, 2000.
3.
Qiong Cao, Li Shen, Weidi Xie, Omkar M. Parkhi and Andrew Zisserman, "Vggface2: A dataset for recognising faces across pose and age", 2018 13th IEEE International Conference on Automatic Face Gesture Recognition (FG 2018), pp. 67-74, 2018.
4.
Oya Çeliktutan, Sezer Ulukaya and Bülent Sankur, "A comparative study of face landmarking techniques", EURASIP Journal on Image and Video Processing, vol. 2013, no. 1, pp. 13, 2013.
5.
Naser Damer, Alexandra Moseguí Saladié, Andreas Braun and Arjan Kuijper, "MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network", 2018 IEEE 9th International Conference on Biometrics Theory Applications and Systems (BTAS), pp. 1-10, 2018.
6.
Luca Debiasi, Ulrich Scherhag, Christian Rathgeb, Andreas Uhl and Christoph Busch, "PRNU-based detection of morphed face images", 2018 International Workshop on Biometrics and Forensics (IWBF), pp. 1-7, 2018.
7.
Jeff Donahue, Philipp Krähenbühl and Trevor Darrell, "Adversarial feature learning", International Conference on Learning Representations, 2017.
8.
Matteo Ferrara, Annalisa Franco and Davide Maltoni, "The magic passport", IEEE International Joint Conference on Biometrics, pp. 1-7, 2014.
9.
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, et al., "Generative Adversarial Nets" in Advances in Neural Information Processing Systems., Curran Associates, Inc., 2014.
10.
Gary B. Huang, Marwan Mattar, Tamara Berg and Eric Learned-Miller, "Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments", Workshop on Faces in ’Real-Life’ Images: Detection Alignment and Recognition, 2008.
11.
Tero Karras, Samuli Laine and Timo Aila, "A Style-Based Generator Architecture for Generative Adversarial Networks", 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4396-4405, 2019.
12.
Tero Karras, Samuli Laine, Miika Aittala, Janne Hellsten, Jaakko Lehtinen and Timo Aila, "Analyzing and improving the image quality of StyleGAN", Proc. CVPR, 2020.
13.
Christian Kraetzer, Andrey Makrushin, Jana Dittmann and Mario Hildebrandt, "Potential advantages and limitations of using information fusion in media forensics—a discussion on the example of detecting face morphing attacks", EURASIP Journal on Information Security, vol. 2021, no. 1, pp. 9, 2021.
14.
Alex Krizhevsky, Ilya Sutskever and Geoffrey E Hinton, "ImageNet Classification with Deep Convolutional Neural Networks" in Advances in Neural Information Processing Systems., Curran Associates, Inc., 2012.
15.
Marco Micheletto, Gian Luca Marcialis, Giulia Orrù and Fabio Roli, "Fingerprint Recognition With Embedded Presentation Attacks Detection: Are We Ready?", IEEE Transactions on Information Forensics and Security, vol. 16, pp. 5338-5351, 2021.
16.
Tom Neubert, Andrey Makrushin, Mario Hildebrandt, Christian Kraetzer and Jana Dittmann, "Extended StirTrace benchmarking of biometric and forensic qualities of morphed face images", IET Biometrics, vol. 7, no. 4, pp. 325-332, 2018.
17.
O. M. Parkhi, A. Vedaldi and A. Zisserman, "Deep face recognition", British Machine Vision Conference, 2015.
18.
P.J. Phillips, P.J. Flynn, T. Scruggs, K.W. Bowyer, Jin Chang, K. Hoffman, et al., "Overview of the face recognition grand challenge", 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1, pp. 947-954, 2005.
19.
John Platt et al., "Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods", Advances in large margin classifiers, vol. 10, no. 3, pp. 61-74, 1999.
20.
R. Raghavendra, Kiran B. Raja and Christoph Busch, "Detecting morphed face images", 2016 IEEE 8th International Conference on Biometrics Theory Applications and Systems (BTAS), pp. 1-7, 2016.
21.
R. Raghavendra, Kiran B. Raja, Sushma Venkatesh and Christoph Busch, "Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images", 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1822-1830, 2017.
22.
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Cham:Springer International Publishing, 2022.
23.
David J. Robertson, Robin S. S. Kramer and A. Mike Burton, "Fraudulent ID using face morphs: Experiments on human and automatic recognition", PLOS ONE, vol. 12, no. 3, pp. e0173319, 2017.
24.
D. Ruprecht and H. Muller, "Image warping with scattered data interpolation", IEEE Computer Graphics and Applications, vol. 15, no. 2, pp. 37-43, 1995.
25.
Eklavya Sarkar, Pavel Korshunov, Laurent Colbois and Sébastien Marcel, "Vulnerability analysis of face morphing attacks from landmarks and generative adversarial networks", 2020.
26.
Ulrich Scherhag, R. Raghavendra, K. B. Raja, M. Gomez-Barrero, C. Rathgeb and C. Busch, "On the vulnerability of face recognition systems towards morphed face attacks", 2017 5th International Workshop on Biometrics and Forensics (IWBF), pp. 1-6, 2017.
27.
Ulrich Scherhag, Christian Rathgeb, Johannes Merkle and Christoph Busch, "Deep face representations for differential morphing attack detection", IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3625-3639, 2020.
28.
Florian Schroff, Dmitry Kalenichenko and James Philbin, "Facenet: A unified embedding for face recognition and clustering", 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815-823, 2015.
29.
K Simonyan and A Zisserman, Very deep convolutional networks for large-scale image recognition, Computational and Biological Learning Society, pp. 1-14, 2015.
30.
Sobhan Soleymani, Baaria Chaudhary, Ali Dabouei, Jeremy Dawson and Nasser M. Nasrabadi, "Differential morphed face detection using deep siamese networks", Pattern Recognition. ICPR International Workshops and Challenges, pp. 560-572, 2021.

Contact IEEE to Subscribe

References

References is not available for this document.