An Efficient Ensemble Explainable AI (XAI) Approach for Morphed Face Detection

04/23/2023
by   Rudresh Dwivedi, et al.
0

The extensive utilization of biometric authentication systems have emanated attackers / imposters to forge user identity based on morphed images. In this attack, a synthetic image is produced and merged with genuine. Next, the resultant image is user for authentication. Numerous deep neural convolutional architectures have been proposed in literature for face Morphing Attack Detection (MADs) to prevent such attacks and lessen the risks associated with them. Although, deep learning models achieved optimal results in terms of performance, it is difficult to understand and analyse these networks since they are black box/opaque in nature. As a consequence, incorrect judgments may be made. There is, however, a dearth of literature that explains decision-making methods of black box deep learning models for biometric Presentation Attack Detection (PADs) or MADs that can aid the biometric community to have trust in deep learning-based biometric systems for identification and authentication in various security applications such as border control, criminal database establishment etc. In this work, we present a novel visual explanation approach named Ensemble XAI integrating Saliency maps, Class Activation Maps (CAM) and Gradient-CAM (Grad-CAM) to provide a more comprehensive visual explanation for a deep learning prognostic model (EfficientNet-B1) that we have employed to predict whether the input presented to a biometric authentication system is morphed or genuine. The experimentations have been performed on three publicly available datasets namely Face Research Lab London Set, Wide Multi-Channel Presentation Attack (WMCA), and Makeup Induced Face Spoofing (MIFS). The experimental evaluations affirms that the resultant visual explanations highlight more fine-grained details of image features/areas focused by EfficientNet-B1 to reach decisions along with appropriate reasoning.

READ FULL TEXT

page 2

page 4

page 8

page 9

research
12/14/2022

A Novel Active Solution for Two-Dimensional Face Presentation Attack Detection

Identity authentication is the process of verifying one's identity. Ther...
research
09/28/2018

Explainable Black-Box Attacks Against Model-based Authentication

Establishing unique identities for both humans and end systems has been ...
research
02/07/2019

FaceSpoof Buster: a Presentation Attack Detector Based on Intrinsic Image Properties and Deep Learning

Nowadays, the adoption of face recognition for biometric authentication ...
research
10/21/2019

The SWAX Benchmark: Attacking Biometric Systems with Wax Figures

A face spoofing attack occurs when an intruder attempts to impersonate s...
research
12/23/2022

Security and Interpretability in Automotive Systems

The lack of any sender authentication mechanism in place makes CAN (Cont...
research
06/11/2018

Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks

Artificial neural networks tend to learn only what they need for a task....
research
10/31/2022

Synthetic ID Card Image Generation for Improving Presentation Attack Detection

Currently, it is ever more common to access online services for activiti...

Please sign up or login with your details

Forgot password? Click here to reset