Deep Face Representations for Differential Morphing Attack Detection

01/05/2020
by   Ulrich Scherhag, et al.
0

The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection have been proposed in the scientific literature. However, the morphing attack detection algorithms proposed so far have only been trained and tested on datasets whose distributions of image characteristics are either very limited (e.g. only created with a single morphing tool) or rather unrealistic (e.g. no print-scan transformation). As a consequence, these methods easily overfit on certain image types and the results presented cannot be expected to apply to real-world scenarios. For example, the results of the latest NIST Face Recognition Vendor Test MORPH show that the submitted MAD algorithms lack robustness and performance when considering unseen and challenging datasets. In this work, subsets of the FERET and FRGCv2 face databases are used to create a large realistic database for training and testing of morphing attack detection algorithms, containing a large number of ICAO-compliant bona fide facial images, corresponding unconstrained probe images, and morphed images created with four different tools. Furthermore, multiple post-processings are applied on the reference images, e.g. print-scan and JPEG2000 compression. On this database, previously proposed differential morphing algorithms are evaluated and compared. In addition, the application of deep face representations for differential morphing attack detection algorithms is investigated. It is shown that algorithms based on deep face representations can achieve very high detection performance (less than 3% ) and robustness with respect to various post-processings. Finally, the limitations of the developed methods are analyzed.

READ FULL TEXT

page 1

page 3

page 4

page 5

page 8

page 12

research
03/05/2021

Effects of Image Compression on Face Image Manipulation Detection: A Case Study on Facial Retouching

In the past years, numerous methods have been introduced to reliably det...
research
06/09/2020

Detection of Makeup Presentation Attacks based on Deep Face Representations

Facial cosmetics have the ability to substantially alter the facial appe...
research
10/07/2021

Differential Anomaly Detection for Facial Images

Due to their convenience and high accuracy, face recognition systems are...
research
06/11/2020

Morphing Attack Detection – Database, Evaluation Platform and Benchmarking

Morphing attacks have posed a severe threat to Face Recognition System (...
research
02/24/2022

Analyzing Human Observer Ability in Morphing Attack Detection – Where Do We Stand?

While several works have studied the vulnerability of automated FRS and ...
research
04/07/2023

Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study

Face morphing attack detection is emerging as an increasingly challengin...
research
11/23/2021

Algorithmic Fairness in Face Morphing Attack Detection

Face morphing attacks can compromise Face Recognition System (FRS) by ex...

Please sign up or login with your details

Forgot password? Click here to reset