Loading [a11y]/accessibility-menu.js
Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection | IEEE Conference Publication | IEEE Xplore

Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection


Abstract:

The primary objective of face morphing is to com-bine face images of different data subjects (e.g. an malicious actor and an accomplice) to generate a face image that can...Show More

Abstract:

The primary objective of face morphing is to com-bine face images of different data subjects (e.g. an malicious actor and an accomplice) to generate a face image that can be equally verified for both contributing data subjects. In this paper, we propose a new framework for generating face morphs using a newer Generative Adversarial Network (GAN) - StyleGAN. In contrast to earlier works, we generate realistic morphs of both high-quality and high resolution of 1024 × 1024 pixels. With the newly created morphing dataset of 2500 morphed face images, we pose a critical question in this work. (i) Can GAN generated morphs threaten Face Recognition Systems (FRS) equally as Landmark based morphs? Seeking an answer, we benchmark the vulnerability of a Commercial-Off-The-Shelf FRS (COTS) and a deep learning-based FRS (ArcFace). This work also benchmarks the detection approaches for both GAN generated morphs against the landmark based morphs using established Morphing Attack Detection (MAD) schemes.
Date of Conference: 29-30 April 2020
Date Added to IEEE Xplore: 04 June 2020
ISBN Information:
Conference Location: Porto, Portugal
Citations are not available for this document.

I. Introduction

Due to the widespread deployment of biometric-based identification and verification of individuals, it is essential to observe a biometric characteristic that is reliable, user-friendly and easy to capture. Face biometrics is well suited for this purpose due to its popularity and widespread use for biometric authentication. Moreover we consider the ease of capturing from a distance in a non-intrusive manner and also the recently achieved high recognition accuracy. These properties further enable that face recognition is to be used in various applications that are attributed with high security requirements like border control. However, biometric face recognition systems (FRS) are known to be highly vulnerable to presentation attacks (aka., spoofing attacks) against the capture device [14]. In addition face recognition system can be deceived during the enrolment process by providing manipulated images [4].

Cites in Papers - |

Cites in Papers - IEEE (50)

Select All
1.
Guido Borghi, Nicolò Di Domenico, Matteo Ferrara, Annalisa Franco, Uzma Latif, Davide Maltoni, "MONOT: High-Quality Privacy-compliant Morphed Synthetic Images for Everyone", 2024 IEEE International Workshop on Information Forensics and Security (WIFS), pp.1-8, 2024.
2.
Rouqaiah Al-Refai, Clara Biagi, Cong Chen, Kiran Raja, Raghavendra Ramachandra, Christoph Busch, Philipp Terhörst, "On the Trustworthiness of Face Morphing Attack Detectors", 2024 IEEE International Joint Conference on Biometrics (IJCB), pp.1-11, 2024.
3.
Marta Robledo-Moreno, Guido Borghi, Nicolò Di Domenico, Annalisa Franco, Kiran Raja, Davide Maltoni, "Towards Federated Learning for Morphing Attack Detection", 2024 IEEE International Joint Conference on Biometrics (IJCB), pp.1-10, 2024.
4.
Iurii Medvedev, Nuno Gonçalves, "MorFacing: A Benchmark for Estimation Face Recognition Robustness to Face Morphing Attacks", 2024 IEEE International Joint Conference on Biometrics (IJCB), pp.1-10, 2024.
5.
Laurent Colbois, Sébastien Marcel, "Evaluating the Effectiveness of Attack-Agnostic Features for Morphing Attack Detection", 2024 IEEE International Joint Conference on Biometrics (IJCB), pp.1-9, 2024.
6.
Zander W. Blasingame, Chen Liu, "Greedy-DiM: Greedy Algorithms for Unreasonably Effective Face Morphs", 2024 IEEE International Joint Conference on Biometrics (IJCB), pp.1-11, 2024.
7.
Richard E. Neddo, Zander W. Blasingame, Chen Liu, "The Impact of Print-Scanning in Heterogeneous Morph Evaluation Scenarios", 2024 IEEE International Joint Conference on Biometrics (IJCB), pp.1-10, 2024.
8.
Qiaoyun He, Deng Zongyong, Zuyuan He, Qijun Zhao, "Face Morphing via Adversarial Attack-based Adaptive Blending", 2024 International Joint Conference on Neural Networks (IJCNN), pp.1-8, 2024.
9.
Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch, "Generalized Single-Image-Based Morphing Attack Detection Using Deep Representations from Vision Transformer", 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp.1510-1518, 2024.
10.
Mathias Ibsen, L. J. Gonzalez-Soler, Christian Rathgeb, Christoph Busch, "TetraLoss: Improving the Robustness of Face Recognition Against Morphing Attacks", 2024 IEEE 18th International Conference on Automatic Face and Gesture Recognition (FG), pp.1-10, 2024.
11.
Ismail Avcibas, "Morphed Face Detection With Wavelet-Based Co-Occurrence Matrices", IEEE Signal Processing Letters, vol.31, pp.1344-1348, 2024.
12.
Min Long, Qiangqiang Duan, Le-Bing Zhang, Fei Peng, Dengyong Zhang, "Trans-FD: Transformer-Based Representation Interaction for Face De-Morphing", IEEE Transactions on Biometrics, Behavior, and Identity Science, vol.6, no.3, pp.385-397, 2024.
13.
Iurii Medvedev, Nuno Gonçalves, "Quadruplet Loss for Improving the Robustness to Face Morphing Attacks", 2024 12th International Workshop on Biometrics and Forensics (IWBF), pp.01-06, 2024.
14.
Ilias Batskos, Luuk Spreeuwers, "Improving Fully Automated Landmark-based Face Morphing", 2024 12th International Workshop on Biometrics and Forensics (IWBF), pp.1-6, 2024.
15.
Nicoló Di Domenico, Guido Borghi, Annalisa Franco, Davide Maltoni, "Face Restoration for Morphed Images Retouching", 2024 12th International Workshop on Biometrics and Forensics (IWBF), pp.1-6, 2024.
16.
Min Long, Quantao Yao, Le-Bing Zhang, Fei Peng, "Face De-Morphing Based on Diffusion Autoencoders", IEEE Transactions on Information Forensics and Security, vol.19, pp.3051-3063, 2024.
17.
Zander W. Blasingame, Chen Liu, "Leveraging Diffusion for Strong and High Quality Face Morphing Attacks", IEEE Transactions on Biometrics, Behavior, and Identity Science, vol.6, no.1, pp.118-131, 2024.
18.
Jag Mohan Singh, Raghavendra Ramachandra, "3-D Face Morphing Attacks: Generation, Vulnerability and Detection", IEEE Transactions on Biometrics, Behavior, and Identity Science, vol.6, no.1, pp.103-117, 2024.
19.
Min Long, Qihuan Wang, Le-Bing Zhang, Jun Zhou, "CALP-FD: Cross Attention-Based Facial Landmarks Prompt for Face De-Morphing", 2023 9th International Conference on Systems and Informatics (ICSAI), pp.1-6, 2023.
20.
Aravinda Reddy P N, Raghavendra Ramachandra, Krothapalli Sreenivasa Rao, Pabitra Mitra, "MLSD-GAN - Generating Strong High Quality Face Morphing Attacks Using Latent Semantic Disentanglement", 2023 IEEE International Conference on Computer Vision and Machine Intelligence (CVMI), pp.1-6, 2023.
21.
Laurent Colbois, Hatef Otroshi Shahreza, Sébastien Marcel, "Approximating Optimal Morphing Attacks using Template Inversion", 2023 IEEE International Joint Conference on Biometrics (IJCB), pp.1-9, 2023.
22.
Harsh Rachalwar, Meiling Fang, Naser Damer, Abhijit Das, "Depth-guided Robust Face Morphing Attack Detection", 2023 IEEE International Joint Conference on Biometrics (IJCB), pp.1-9, 2023.
23.
Qiaoyun He, Zongyong Deng, Zuyuan He, Qijun Zhao, "Optimal-Landmark-Guided Image Blending for Face Morphing Attacks", 2023 IEEE International Joint Conference on Biometrics (IJCB), pp.1-9, 2023.
24.
Eduarda Caldeira, Pedro C. Neto, Tiago Gonçalves, Naser Damer, Ana F. Sequeira, Jaime S. Cardoso, "Unveiling the Two-Faced Truth: Disentangling Morphed Identities for Face Morphing Detection", 2023 31st European Signal Processing Conference (EUSIPCO), pp.955-959, 2023.
25.
Naser Damer, Meiling Fang, Patrick Siebke, Jan Niklas Kolf, Marco Huber, Fadi Boutros, "MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders", 2023 11th International Workshop on Biometrics and Forensics (IWBF), pp.1-6, 2023.
26.
Jag Mohan Singh, Raghavendra Ramachandra, "Deep Composite Face Image Attacks: Generation, Vulnerability and Detection", IEEE Access, vol.11, pp.76468-76485, 2023.
27.
Poorya Aghdaie, Sobhan Soleymani, Nasser M. Nasrabadi, Jeremy Dawson, "Attention Augmented Face Morph Detection", IEEE Access, vol.11, pp.24281-24298, 2023.
28.
Raghavendra Ramachandra, Sébastien Marcel, "MASK-MORPH: Does Morphing of Custom 3D Face Masks Threatens the Face Recognition Systems?", 2022 18th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp.1-8, 2022.
29.
Sushma Venktatesh, "Multilevel Fusion of Deep Features for Face Morphing Attack Detection", 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), pp.1-7, 2022.
30.
Meiling Fang, Fadi Boutros, Naser Damer, "Unsupervised Face Morphing Attack Detection via Self-paced Anomaly Detection", 2022 IEEE International Joint Conference on Biometrics (IJCB), pp.1-11, 2022.

Cites in Papers - Other Publishers (14)

1.
Roman Kessler, Kiran Raja, Juan Tapia, Christoph Busch, "Towards minimizing efforts for Morphing Attacks—Deep embeddings for morphing pair selection and improved Morphing Attack Detection", PLOS ONE, vol.19, no.5, pp.e0304610, 2024.
2.
Ming Long, Song Chen, Le-Bing Zhang, Fei Peng, Dengyong Zhang, "DFS-Net: StyleGAN2-based dual feature separation for face De-Morphing", Multimedia Tools and Applications, 2024.
3.
Min Long, Jun Zhou, Le‐Bing Zhang, Fei Peng, Dengyong Zhang, "ADFF: Adaptive de‐morphing factor framework for restoring accomplice's facial image", IET Image Processing, 2023.
4.
Maryna Veksler, Clara Caspard, Kemal Akkaya, "Image-to-Image Translation Generative Adversarial Networks for Video Source Camera Falsification", Digital Forensics and Cyber Crime, vol.508, pp.3, 2023.
5.
Ilias Batskos, Luuk Spreeuwers, Raymond Veldhuis, "Visualizing landmark-based face morphing traces on digital images", Frontiers in Computer Science, vol.5, 2023.
6.
Muhammad Hamza, Samabia Tehsin, Mamoona Humayun, Maram Fahaad Almufareh, Majed Alfayad, "A Comprehensive Review of Face Morph Generation and Detection of Fraudulent Identities", Applied Sciences, vol.12, no.24, pp.12545, 2022.
7.
Matteo Ferrara, Annalisa Franco, "Morph Creation and Vulnerability of Face Recognition Systems to Morphing", Handbook of Digital Face Manipulation and Detection, pp.117, 2022.
8.
Biying Fu, Naser Damer, "Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality", IET Biometrics, vol.11, no.5, pp.359, 2022.
9.
Balbir Singh, Ashleigh Gambrell, Joshua Correll, "Face templates for the Chicago Face Database", Behavior Research Methods, 2022.
10.
Le-Bing Zhang, Juan Cai, Fei Peng, Min Long, "MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network", Digital Forensics and Watermarking, vol.13180, pp.17, 2022.
11.
Naser Damer, Noemie Spiller, Meiling Fang, Fadi Boutros, Florian Kirchbuchner, Arjan Kuijper, "PW-MAD: Pixel-Wise Supervision for Generalized Face Morphing Attack Detection", Advances in Visual Computing, vol.13017, pp.291, 2021.
12.
Naser Damer, Kiran Raja, Marius Su?milch, Sushma Venkatesh, Fadi Boutros, Meiling Fang, Florian Kirchbuchner, Raghavendra Ramachandra, Arjan Kuijper, "ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation", Advances in Visual Computing, vol.13017, pp.251, 2021.
13.
Christian Kraetzer, Andrey Makrushin, Jana Dittmann, Mario Hildebrandt, "Potential advantages and limitations of using information fusion in media forensics?a discussion on the example of detecting face morphing attacks", EURASIP Journal on Information Security, vol.2021, no.1, 2021.
14.
Stephanie Autherith, Cecilia Pasquini, "Detecting Morphing Attacks through Face Geometry Features", Journal of Imaging, vol.6, no.11, pp.115, 2020.
Contact IEEE to Subscribe

References

References is not available for this document.