DeepAI AI Chat
Log In Sign Up

Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance

by   Jag Mohan Singh, et al.

Face Recognition Systems (FRS) are vulnerable to various attacks performed directly and indirectly. Among these attacks, face morphing attacks are highly potential in deceiving automatic FRS and human observers and indicate a severe security threat, especially in the border control scenario. This work presents a face morphing attack detection, especially in the On-The-Fly (OTF) Automatic Border Control (ABC) scenario. We present a novel Differential-MAD (D-MAD) algorithm based on the spherical interpolation and hierarchical fusion of deep features computed from six different pre-trained deep Convolutional Neural Networks (CNNs). Extensive experiments are carried out on the newly generated face morphing dataset (SCFace-Morph) based on the publicly available SCFace dataset by considering the real-life scenario of Automatic Border Control (ABC) gates. Experimental protocols are designed to benchmark the proposed and state-of-the-art (SOTA) D-MAD techniques for different camera resolutions and capture distances. Obtained results have indicated the superior performance of the proposed D-MAD method compared to the existing methods.


page 1

page 3

page 6


Multispectral Imaging for Differential Face Morphing Attack Detection: A Preliminary Study

Face morphing attack detection is emerging as an increasingly challengin...

Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins

Face morphing attacks have emerged as a potential threat, particularly i...

3D Face Morphing Attacks: Generation, Vulnerability and Detection

Face Recognition systems (FRS) have been found vulnerable to morphing at...

Fusion-based Few-Shot Morphing Attack Detection and Fingerprinting

The vulnerability of face recognition systems to morphing attacks has po...

Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance

Face recognition is widely employed in Automated Border Control (ABC) ga...

On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection

Face morphing attacks have raised critical concerns as they demonstrate ...

Conditional Identity Disentanglement for Differential Face Morph Detection

We present the task of differential face morph attack detection using a ...