Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins

03/24/2023
by   Raghavendra Ramachandra, et al.
0

Face morphing attacks have emerged as a potential threat, particularly in automatic border control scenarios. Morphing attacks permit more than one individual to use travel documents that can be used to cross borders using automatic border control gates. The potential for morphing attacks depends on the selection of data subjects (accomplice and malicious actors). This work investigates lookalike and identical twins as the source of face morphing generation. We present a systematic study on benchmarking the vulnerability of Face Recognition Systems (FRS) to lookalike and identical twin morphing images. Therefore, we constructed new face morphing datasets using 16 pairs of identical twin and lookalike data subjects. Morphing images from lookalike and identical twins are generated using a landmark-based method. Extensive experiments are carried out to benchmark the attack potential of lookalike and identical twins. Furthermore, experiments are designed to provide insights into the impact of vulnerability with normal face morphing compared with lookalike and identical twin face morphing.

READ FULL TEXT

page 1

page 3

research
11/03/2020

Face Morphing Attack Generation Detection: A Comprehensive Survey

The vulnerability of Face Recognition System (FRS) to various kind of at...
research
09/17/2019

ShamFinder: An Automated Framework for Detecting IDN Homographs

The internationalized domain name (IDN) is a mechanism that enables us t...
research
09/30/2022

Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance

Face Recognition Systems (FRS) are vulnerable to various attacks perform...
research
07/06/2020

On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection

Face morphing attacks have raised critical concerns as they demonstrate ...
research
07/02/2022

Separating and Collapsing Electoral Control Types

[HHM20] discovered, for 7 pairs (C,D) of seemingly distinct standard ele...
research
11/20/2022

Deep Composite Face Image Attacks: Generation, Vulnerability and Detection

Face manipulation attacks have drawn the attention of biometric research...
research
01/22/2022

Long-term Data Sharing under Exclusivity Attacks

The quality of learning generally improves with the scale and diversity ...

Please sign up or login with your details

Forgot password? Click here to reset