Face Morphing Attack Generation Detection: A Comprehensive Survey

11/03/2020
by   Sushma Venkatesh, et al.
0

The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community. The goal of a morphing attack is to subvert the FRS at Automatic Border Control (ABC) gates by presenting the Electronic Machine Readable Travel Document (eMRTD) or e-passport that is obtained based on the morphed face image. Since the application process for the e-passport in the majority countries requires a passport photo to be presented by the applicant, a malicious actor and the accomplice can generate the morphed face image and to obtain the e-passport. An e-passport with a morphed face images can be used by both the malicious actor and the accomplice to cross the border as the morphed face image can be verified against both of them. This can result in a significant threat as a malicious actor can cross the border without revealing the track of his/her criminal background while the details of accomplice are recorded in the log of the access control system. This survey aims to present a systematic overview of the progress made in the area of face morphing in terms of both morph generation and morph detection. In this paper, we describe and illustrate various aspects of face morphing attacks, including different techniques for generating morphed face images but also the state-of-the-art regarding Morph Attack Detection (MAD) algorithms based on a stringent taxonomy and finally the availability of public databases, which allow to benchmark new MAD algorithms in a reproducible manner. The outcomes of competitions/benchmarking, vulnerability assessments and performance evaluation metrics are also provided in a comprehensive manner. Furthermore, we discuss the open challenges and potential future works that need to be addressed in this evolving field of biometrics.

READ FULL TEXT

page 1

page 2

page 3

page 7

page 9

page 14

research
03/24/2023

Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins

Face morphing attacks have emerged as a potential threat, particularly i...
research
12/09/2020

Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks

Morphing attacks is a threat to biometric systems where the biometric re...
research
05/29/2023

Towards minimizing efforts for Morphing Attacks – Deep embeddings for morphing pair selection and improved Morphing Attack Detection

Face Morphing Attacks pose a threat to the security of identity document...
research
07/07/2020

Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? – Vulnerability and Detection

The primary objective of face morphing is to combine face images of diff...
research
01/24/2021

Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey

Biometric recognition is a trending technology that uses unique characte...
research
09/29/2022

Digital and Physical Face Attacks: Reviewing and One Step Further

With the rapid progress over the past five years, face authentication ha...
research
12/03/2019

Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance

Face recognition is widely employed in Automated Border Control (ABC) ga...

Please sign up or login with your details

Forgot password? Click here to reset