Loading [MathJax]/extensions/MathMenu.js
Attention Aware Wavelet-based Detection of Morphed Face Images | IEEE Conference Publication | IEEE Xplore

Attention Aware Wavelet-based Detection of Morphed Face Images


Abstract:

Morphed images have exploited loopholes in the face recognition checkpoints, e.g., Credential Authentication Technology (CAT), used by Transportation Security Administrat...Show More

Abstract:

Morphed images have exploited loopholes in the face recognition checkpoints, e.g., Credential Authentication Technology (CAT), used by Transportation Security Administration (TSA), which is a non-trivial security concern. To overcome the risks incurred due to morphed presentations, we propose a wavelet-based morph detection methodology which adopts an end-to-end trainable soft attention mechanism. Our attention-based deep neural network (DNN) focuses on the salient Regions of Interest (ROI) which have the most spatial support for morph detector decision function, i.e, morph class binary softmax output. A retrospective of morph synthesizing procedure aids us to speculate the ROI as regions around facial landmarks, particularly for the case of landmark-based morphing techniques. Moreover, our attention-based DNN is adapted to the wavelet space, where inputs of the network are coarse-to-fine spectral representations, 48 stacked wavelet sub-bands to be exact. We evaluate performance of the proposed framework using three datasets, VISAPP17, LMA, and MorGAN. In addition, as attention maps can be a robust indicator whether a probe image under investigation is genuine or counterfeit, we analyze the estimated attention maps for both a bona fide image and its corresponding morphed image. Finally, we present an ablation study on the efficacy of utilizing attention mechanism for the sake of morph detection.
Date of Conference: 04-07 August 2021
Date Added to IEEE Xplore: 20 July 2021
ISBN Information:

ISSN Information:

Conference Location: Shenzhen, China
References is not available for this document.

1. Introduction

Robust, reliable verification systems are the crucial backbones of biometric document authentication protocols, that are to operate flawlessly. Although image morphing is not a new paradigm, it was first identified as a security concern by Ferrara et al. [8], who explained how a criminal can dodge a border control checkpoint using a travel document that was issued with a morphed image. The goal of the face image morphing attack is to synthesize a forged imaged from two composing original images such that the artificially crafted morphed image can be verified against the two original images not only visually, but also in the feature space by a classifier [28]. Moreover, morphed samples can be labeled as hard positive samples in comparison to negative genuine samples because morphed samples are synthesized to intentionally lie on the negative samples’ manifold. Similar to adversarially perturbed data samples that fool classification networks into a wrong predicted class [11], [16], morphed images are crafted to lead a verifier into a false acceptance.

Select All
1.
R. Abdal, Y. Qin and P. Wonka, "Image2stylegan: How to embed images into the stylegan latent space?", Proceedings of the IEEE/CVF International Conference on Computer Vision, pp. 4432-4441, 2019.
2.
P. Aghdaie, B. Chaudhary, S. Soleymani, J. Dawson and N. M. Nasrabadi, "Detection of morphed face images using discriminative wavelet sub-bands", 2021.
3.
H. Bay, T. Tuytelaars and L. Van Gool, "Surf: Speeded up robust features", European conference on computer vision, pp. 404-417, 2006.
4.
B. Chaudhary, P. Aghdaie, S. Soleymani, J. Dawson and N. M. Nasrabadi, "Differential morph face detection using discriminative wavelet sub-bands", Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1425-1434, 2021.
5.
N. Damer, A. M. Saladie, A. Braun and A. Kuijper, "Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network", 2018 IEEE 9th International Conference on Biometrics Theory Applications and Systems (BTAS), pp. 1-10, 2018.
6.
L. Debiasi, N. Damer, A. M. Saladié, C. Rathgeb, U. Scherhag, C. Busch, et al., "On the detection of gan-based face morphs using established morph detectors", International Conference on Image Analysis and Processing, pp. 345-356, 2019.
7.
L. Debiasi, C. Rathgeb, U. Scherhag, A. Uhl and C. Busch, "Prnu variance analysis for morphed face image detection", 2018 IEEE 9th International Conference on Biometrics Theory Applications and Systems (BTAS), pp. 1-9, 2018.
8.
M. Ferrara, A. Franco and D. Maltoni, "The magic passport", IEEE International Joint Conference on Biometrics, pp. 1-7, 2014.
9.
M. Ferrara, A. Franco and D. Maltoni, "Face morphing detection in the presence of printing/scanning and heterogeneous image sources", 2019.
10.
H. Fukui, T. Hirakawa, T. Yamashita and H. Fujiyoshi, "Attention branch network: Learning of attention mechanism for visual explanation", Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 10705-10714, 2019.
11.
I. J. Goodfellow, J. Shlens and C. Szegedy, "Explaining and harnessing adversarial examples", 2014.
12.
K. He, X. Zhang, S. Ren and J. Sun, "Deep residual learning for image recognition", Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770-778, 2016.
13.
S. Jetley, N. A. Lord, N. Lee and P. H. Torr, "Learn to pay attention", 2018.
14.
J. Kannala and E. Rahtu, "Bsif: Binarized statistical image features", Proceedings of the 21st international conference on pattern recognition (ICPR2012), pp. 1363-1366, 2012.
15.
T. Karras, S. Laine and T. Aila, "A style-based generator architecture for generative adversarial networks", Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 4401-4410, 2019.
16.
A. Kurakin, I. Goodfellow, S. Bengio et al., Adversarial examples in the physical world, 2016.
17.
Y. Li, J. Zeng, S. Shan and X. Chen, "Occlusion aware facial expression recognition using cnn with attention mechanism", IEEE Transactions on Image Processing, vol. 28, no. 5, pp. 2439-2450, 2018.
18.
D. G. Lowe, "Object recognition from local scale-invariant features", Proceedings of the seventh IEEE international conference on computer vision, vol. 2, pp. 1150-1157, 1999.
19.
A. Makrushin, T. Neubert and J. Dittmann, "Automatic generation and detection of visually faultless facial morphs", International Conference on Computer Vision Theory and Applications, vol. 7, pp. 39-50, 2017.
20.
V. Mnih, N. Heess, A. Graves and K. Kavukcuoglu, "Recurrent models of visual attention", 2014.
21.
M. Ngan, M. Ngan, P. Grother, K. Hanaoka and J. Kuo, "Face recognition vendor test (frvt) part 4: Morph-performance of automated face morph detection", US Department of Commerce National Institute of Standards and Technology, 2020.
22.
T. Ojala, M. Pietikainen and D. Harwood, "Performance evaluation of texture measures with classification based on kull-back discrimination of distributions", Proceedings of 12th International Conference on Pattern Recognition, vol. 1, pp. 582-585, 1994.
23.
R. Raghavendra, K. Raja, S. Venkatesh and C. Busch, "Face morphing versus face averaging: Vulnerability and detection", 2017 IEEE International Joint Conference on Biometrics (IJCB), pp. 555-563, 2017.
24.
R. Raghavendra, K. B. Raja and C. Busch, "Detecting morphed face images", 2016 IEEE 8th International Conference on Biometrics Theory Applications and Systems (BTAS), pp. 1-7, 2016.
25.
K. Raja, S. Venkatesh, R. Christoph Busch et al., "Transferable deep-cnn features for detecting digital and print-scanned morphed face images", Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 10-18, 2017.
26.
U. Scherhag, D. Budhrani, M. Gomez-Barrero and C. Busch, "Detecting morphed face images using facial landmarks", International Conference on Image and Signal Processing, pp. 444-452, 2018.
27.
U. Scherhag, L. Debiasi, C. Rathgeb, C. Busch and A. Uhl, "Detection of face morphing attacks based on prnu analysis", IEEE Transactions on Biometrics Behavior and Identity Science, vol. 1, no. 4, pp. 302-317, 2019.
28.
U. Scherhag, R. Raghavendra, K. B. Raja, M. Gomez-Barrero, C. Rathgeb and C. Busch, "On the vulnerability of face recognition systems towards morphed face attacks", 2017 5th International Workshop on Biometrics and Forensics (IWBF), pp. 1-6, 2017.
29.
U. Scherhag, C. Rathgeb and C. Busch, "Morph deterction from single face image: A multi-algorithm fusion approach", Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, pp. 6-12, 2018.
30.
C. Seibold, A. Hilsmann and P. Eisert, "Reflection analysis for face morphing attack detection", 2018 26th European Signal Processing Conference (EUSIPCO), pp. 1022-1026, 2018.

Contact IEEE to Subscribe

References

References is not available for this document.