Evaluating the Effectiveness of Attack-Agnostic Features for Morphing Attack Detection | IEEE Conference Publication | IEEE Xplore

Evaluating the Effectiveness of Attack-Agnostic Features for Morphing Attack Detection


Abstract:

Morphing attacks have diversified significantly over the past years, with new methods based on generative adversarial networks (GANs) and diffusion models posing substant...Show More

Abstract:

Morphing attacks have diversified significantly over the past years, with new methods based on generative adversarial networks (GANs) and diffusion models posing substantial threats to face recognition systems. Recent research has demonstrated the effectiveness of features extracted from large vision models pretrained on bonafide data only (attack-agnostic features) for detecting deep generative images. Building on this, we investigate the potential of these image representations for morphing attack detection (MAD). We develop supervised detectors by training a simple binary linear SVM on the extracted features and one-class detectors by modeling the distribution of bonafide features with a Gaussian Mixture Model (GMM). Our method is evaluated across a comprehensive set of attacks and various scenarios, including generalization to unseen attacks, different source datasets, and print-scan data. Our results indicate that attack-agnostic features can effectively detect morphing attacks, outperforming traditional supervised and one-class detectors from the literature in most scenarios. Additionally, we provide insights into the strengths and limitations of each considered representation and discuss potential future research directions to further enhance the robustness and generalizability of our approach.
Date of Conference: 15-18 September 2024
Date Added to IEEE Xplore: 11 November 2024
ISBN Information:

ISSN Information:

Conference Location: Buffalo, NY, USA

Funding Agency:

References is not available for this document.

1. Introduction

Morphing attacks pose a significant threat to face recognition (FR) systems. These attacks involve creating a composite passport image that merges facial features from two distinct source identities. This manipulated image is then submitted to governmental services for passport applications, a process still allowed in several European countries where applicants can provide their own photographs. In successful morphing attacks, both contributing individuals can then authenticate against the altered image, enabling them to share a single passport. This undermines the security and effectiveness of automated border control (ABC) systems.

Select All
1.
"Face Analysis Technology Evaluation (FATE) MORPH", [online] Available: https://pages.nist.gov/frvt/html/frvtmorph.html.
2.
"Face Research Lab London Set", May 2017.
3.
L. Colbois and S. Marcel, "On the detection of morphing attacks generated by GANs", 2022 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1-5, Sept. 2022.
4.
D. Cozzolino, G. Poggi, R. Corvi, M. Nießner and L. Verdoliva, "Raising the Bar of AI-generated Image Detection with CLIP", Nov. 2023.
5.
N. Damer, M. Fang, P. Siebke, J. N. Kolf, M. Huber and F. Boutros, "MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders", 2023 11th International Workshop on Biometrics and Forensics (IWBF), pp. 1-6, Apr. 2023.
6.
N. Damer, C. A. F. López, M. Fang, N. Spiller, M. V. Pham and F. Boutros, "Privacy-friendly Synthetic Data for the Development of Face Morphing Attack Detectors", 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1605-1616, June 2022.
7.
A. El-Nouby, M. Klein, S. Zhai, M. A. Bautista, A. Toshev, V. Shankar, et al., "Scalable Pretraining of Large Autoregressive Image Models", Jan. 2024.
8.
M. Fang, F. Boutros and N. Damer, "Unsupervised Face Morphing Attack Detection via Self-paced Anomaly Detection", Aug. 2022.
9.
M. Ferrara, A. Franco and D. Maltoni, "The magic passport", IEEE International Joint Conference on Biometrics, pp. 1-7, Sept. 2014.
10.
M. Ivanovska and V. Štruc, "Face Morphing Attack Detection with Denoising Diffusion Probabilistic Models", 2023 11th International Workshop on Biometrics and Forensics (IWBF), pp. 1-6, Apr. 2023.
11.
T. Karras, S. Laine and T. Aila, "A Style-Based Generator Architecture for Generative Adversarial Networks", 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4396-4405, June 2019.
12.
A. Makrushin, T. Neubert and J. Dittmann, "Automatic Generation and Detection of Visually Faultless Facial Morphs", Proceedings of the 12th International Joint Conference on Computer Vision Imaging and Computer Graphics Theory and Applications, pp. 39-50, 2017.
13.
T. Neubert, A. Makrushin, M. Hildebrandt, C. Krätzer and J. Dittmann, "Extended StirTrace benchmarking of biometric and forensic qualities of morphed face images", IET Biom, 2018.
14.
U. Ojha, Y. Li and Y. J. Lee, "Towards Universal Fake Image Detectors that Generalize Across Generative Models", 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 24480-24489, June 2023.
15.
M. Oquab, T. Darcet, T. Moutakanni, H. Vo, M. Szafraniec, V. Khalidov, et al., "DINOv2: Learning Robust Visual Features without Supervision", Apr. 2023.
16.
A. Paszke, S. Gross, F. Massa, A. Lerer, J. Bradbury, G. Chanan, et al., "PyTorch: An Imperative Style High-Performance Deep Learning Library" in Advances in Neural Information Processing Systems, Curran Associates, Inc., vol. 32, 2019.
17.
P. Phillips, P. Flynn, T. Scruggs, K. Bowyer, J. Chang, K. Hoffman, et al., "Overview of the face recognition grand challenge", 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1, pp. 947-954, June 2005.
18.
A. Radford, J. W. Kim, C. Hallacy, A. Ramesh, G. Goh, S. Agarwal, et al., "Learning Transferable Visual Models From Natural Language Supervision", Proceedings of the 38th International Conference on Machine Learning, pp. 8748-8763, July 2021.
19.
K. Raja, M. Ferrara, A. Franco, L. Spreeuwers, I. Batskos, F. De Wit, et al., "Morphing Attack Detection-Database Evaluation Platform and Benchmarking", IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4336-4351, 2021.
20.
E. Sarkar, P. Korshunov, L. Colbois and S. Marcel, "Are GAN-based morphs threatening face recognition?", ICASSP 2022 - 2022 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), pp. 2959-2963, May 2022.
21.
U. Scherhag, C. Rathgeb and C. Busch, "Face Morphing Attack Detection Methods" in Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Cham:Springer International Publishing, pp. 331-349, 2022.
22.
J. E. Tapia and C. Busch, "Face Feature Visualisation of Single Morphing Attack Detection", 2023 11th International Workshop on Biometrics and Forensics (IWBF), pp. 1-6, Apr. 2023.
23.
S. Venkatesh, H. Zhang, R. Ramachandra, K. Raja, N. Damer and C. Busch, "Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection", 2020 8th International Workshop on Biometrics and Forensics (IWBF), pp. 1-6, Apr. 2020.
24.
T. Yang, Z. Huang, J. Cao, L. Li and X. Li, "Deepfake Network Architecture Attribution", Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, no. 4, pp. 4662-4670, June 2022.
25.
H. Zhang, S. Venkatesh, R. Ramachandra, K. Raja, N. Damer and C. Busch, "MIPGAN—Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN", IEEE Transactions on Biometrics Behavior and Identity Science, vol. 3, no. 3, pp. 365-383, July 2021.
Contact IEEE to Subscribe

References

References is not available for this document.