Loading [MathJax]/extensions/MathMenu.js
Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation | IEEE Journals & Magazine | IEEE Xplore

Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation


Abstract:

Face verification is a popular way for verifying identities in access control systems. In this work, a partial face manipulation-based morphing attack (MA) is proposed to...Show More

Abstract:

Face verification is a popular way for verifying identities in access control systems. In this work, a partial face manipulation-based morphing attack (MA) is proposed to compromise the uniqueness of face templates. Different from existing research, this work changes MA from a holistic face level to component level, and only the most effective facial components (eyes and nose) are used. Therefore, a manipulated face is more similar to a bona fide one in terms of visual quality, texture, and noise characteristics. To validate the effectiveness of the proposed attack, a novel metric called actual mated morph presentation match rate (AMPMR) is proposed to evaluate MA performance under real-world conditions. With a collected dataset containing different attack types, image qualities, and manipulation parameters, the results indicate the proposed attack has better anti-detectability compared with the existing complete, splicing, and combined MAs. Moreover, it has low visual distortion and can reach a better tradeoff among facial biometrics verification, anti-detectability, and visual differences.
Page(s): 72 - 88
Date of Publication: 10 September 2020
Electronic ISSN: 2637-6407

Funding Agency:

References is not available for this document.

I. Introduction

In modern unsupervised access control systems of campuses, corporations, bus and train stations, face authentication has been widely deployed for identity verification. During authentication, an access control system reads a facial biometric reference (e.g., a template) stored in a user’s enrolment record in a database or in his/her personal access card, and then compares it with a trusted live facial image from the same subject. When a similarity score resulting from this comparison process is higher than the system’s threshold, a gate automatically opens to permit passing without human check, and it can significantly reduce users’ transaction time in the access control process. Meanwhile, to simplify the enrolment process, many systems allow users to submit their own photos when applying for access cards. If those photos comply to the predefined image standards [1], on-site data collections are not required. The unsupervised capture process of the enrolment image is convenient for ordinary users, but they also provide potential attack conditions for adversaries, such as morphing attacks (MAs). The goal of face MAs is to compromise the uniqueness of facial biometric templates with non-intrusive ways, to create a template (e.g., a manipulated face) that can match with multiple subjects. Once a manipulated facial image is maliciously injected into an enrolment record as biometric reference, multiple subjects can share and use the access card, which has negative impacts on public security.

Select All
1.
Machine Readable Travel Documents, Montreal, QC, Canada, 2015.
2.
M. Ferrara, A. Franco and D. Maltoni, "The magic passport", Proc. IEEE Int. Joint Conf. Biometrics (IJCB), pp. 1-7, 2014.
3.
A. Makrushin, T. Neubert and J. Dittmann, "Automatic generation and detection of visually faultless facial morphs", Proc. 12th Int. Joint Conf. Comput. Vis. Imag. Comput. Graph. Theory Appl. (VISAPP), pp. 39-50, 2017.
4.
T. Neubert, A. Makrushin, M. Hildebrandt, C. Kraetzer and J. Dittmann, "Extended stirtrace benchmarking of biometric and forensic qualities of morphed face images", IET Biometrics, vol. 7, no. 4, pp. 325-332, Jul. 2018.
5.
N. Damer, A. M. Saladie, A. Braun and A. Kuijper, "MorGAN: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network", Proc. IEEE 9th Int. Conf. Biometrics Theory Appl. Syst. (BTAS), pp. 1-10, 2018.
6.
N. Damer, F. Boutros, A. M. Saladie, F. Kirchbuchner and A. Kuijper, "Realistic dreams: Cascaded enhancement of GAN-generated images with an example in face morphing attacks", Proc. IEEE 10th Int. Conf. Biometrics Theory Appl. Syst. (BTAS), pp. 1-10, 2019.
7.
S. Qian et al., "Make a face: Towards arbitrary high fidelity face manipulation", Proc. IEEE/CVF Int. Conf. Comput. Vis. (ICCV), pp. 10033-10042, 2019.
8.
A. Makrushin and A. Wolf, "An overview of recent advances in assessing and mitigating the face morphing attack", Proc. 26th Eur. Signal Process. Conf. (EUSIPCO), pp. 1017-1021, 2018.
9.
U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt and C. Busch, "Face recognition systems under morphing attacks: A survey", IEEE Access, vol. 7, pp. 23012-23026, 2019.
10.
D. J. Robertson, R. S. Kramer and A. M. Burton, "Fraudulent ID using face morphs: Experiments on human and automatic recognition", PLoS ONE, vol. 12, no. 3, 2017.
11.
R. S. Kramer, M. O. Mireku, T. R. Flack and K. L. Ritchie, "Face morphing attacks: Investigating detection with humans and computers", Cogn. Res. Principles Implications, vol. 4, no. 1, pp. 28, 2019.
12.
X. Zhang, F. Peng and M. Long, "Robust coverless image steganography based on DCT and LDA topic classification", IEEE Trans. Multimedia, vol. 20, no. 12, pp. 3223-3238, Dec. 2018.
13.
R. Raghavendra, K. Raja, S. Venkatesh and C. Busch, "Face morphing versus face averaging: Vulnerability and detection", Proc. IEEE Int. Joint Conf. Biometrics (IJCB), pp. 555-563, 2017.
14.
S. Venkatesh, H. Zhang, R. Raghavendra, K. B. Raja, N. Damer and C. Busch, "Can GAN generated morphs threaten face recognition systems equally as landmark based morphs?—Vulnerability and detection", Proc. 8th Int. Workshop Biometrics Forensics (IWBF), pp. 1-16, 2020.
15.
J. T. Andrews, T. Tanay and L. D. Griffin, "Multiple-identity image attacks against face-based identity verification", 2019, [online] Available: http://www.arXiv:1906.08507.
16.
C. Seibold, A. Hilsmann and P. Eisert, "Style your face morph and improve your face morphing attack detector", Proc. Int. Conf. Biometrics Spec. Interest Group (BIOSIG), pp. 1-6, 2019.
17.
S. Mosaddegh, L. Simon and F. Jurie, "Photorealistic face de-identification by aggregating donors’ face components", Proc. Asian Conf. Comput. Vis. (ACCV), pp. 159-174, 2014.
18.
C. Kraetzer and J. Dittmann, "Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels?", Proc. 13th Int. Conf. Availability Rel. Security (ARES), pp. 11, 2018.
19.
P. Majumdar, A. Agarwal, R. Singh and M. Vatsa, "Evading face recognition via partial tampering of faces", Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. Workshops (CVPRW), pp. 1-10, 2019.
20.
N. Damer et al., "Detecting face morphing attacks by analyzing the directed distances of facial landmarks shifts", Proc. German Conf. Pattern Recognit. (GCPR), pp. 518-534, 2018.
21.
M. Ferrara, A. Franco and D. Maltoni, "Face demorphing", IEEE Trans. Inf. Forensics Security, vol. 13, pp. 1008-1017, 2018.
22.
F. Peng, L. Zhang and M. Long, "FD-GAN: Face de-morphing generative adversarial network for restoring accomplice’s facial image", IEEE Access, vol. 7, pp. 75122-75131, 2019.
23.
U. Scherhag, C. Rathgeb, J. Merkle and C. Busch, "Deep face representations for differential morphing attack detection", IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3625-3639, 2020.
24.
R. Raghavendra, K. B. Raja and C. Busch, "Detecting morphed face images", Proc. IEEE 8th Int. Conf. Biometrics Theory Appl. Syst. (BTAS), pp. 1-7, 2016.
25.
L. Zhang, F. Peng and M. Long, "Face morphing detection using fourier spectrum of sensor pattern noise", Proc. IEEE Int. Conf. Multimedia Expo (ICME), pp. 1-6, 2018.
26.
U. Scherhag, L. Debiasi, C. Rathgeb, C. Busch and A. Uhl, "Detection of face morphing attacks based on PRNU analysis", IEEE Trans. Biometrics Behav. Identity Sci., vol. 1, no. 4, pp. 302-317, Oct. 2019.
27.
T. Neubert, "Face morphing detection: An approach based on image degradation analysis", Proc. Int. Workshop Digit. Watermarking (IWDW), pp. 93-106, 2017.
28.
T. Neubert, C. Kraetzer and J. Dittmann, "A face morphing detection concept with a frequency and a spatial domain feature space for images on eMRTD", Proc. ACM Workshop Inf. Hiding Multimedia Security (IH), pp. 95-100, 2019.
29.
R. Raghavendra, K. B. Raja, S. Venkatesh and C. Busch, "Transferable deep-CNN features for detecting digital and print-scanned morphed face images", Proc. Conf. Comput. Vis. Pattern Recognit. Workshops (CVPRW), pp. 1822-1830, 2017.
30.
C. Seibold, W. Samek, A. Hilsmann and P. Eisert, "Detection of face morphing attacks by deep learning", Proc. Int. Workshop Digit. Watermarking (IWDW), pp. 107-120, 2017.
Contact IEEE to Subscribe

References

References is not available for this document.