scholarly journals Preventing face morphing attacks by using legacy face images

2021 ◽  
Author(s):  
Ilias Batskos ◽  
Florens F. Wit ◽  
Luuk J. Spreeuwers ◽  
Raymond J. Veldhuis
Keyword(s):  
Computers ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 117
Author(s):  
Clemens Seibold ◽  
Anna Hilsmann ◽  
Peter Eisert

Detecting morphed face images has become an important task to maintain the trust in automated verification systems based on facial images, e.g., at automated border control gates. Deep Neural Network (DNN)-based detectors have shown remarkable results, but without further investigations their decision-making process is not transparent. In contrast to approaches based on hand-crafted features, DNNs have to be analyzed in complex experiments to know which characteristics or structures are generally used to distinguish between morphed and genuine face images or considered for an individual morphed face image. In this paper, we present Feature Focus, a new transparent face morphing detector based on a modified VGG-A architecture and an additional feature shaping loss function, as well as Focused Layer-wise Relevance Propagation (FLRP), an extension of LRP. FLRP in combination with the Feature Focus detector forms a reliable and accurate explainability component. We study the advantages of the new detector compared to other DNN-based approaches and evaluate LRP and FLRP regarding their suitability for highlighting traces of image manipulation from face morphing. To this end, we use partial morphs which contain morphing artifacts in predefined areas only and analyze how much of the overall relevance each method assigns to these areas.


2020 ◽  
Author(s):  
Sushma Venkatesh ◽  
Raghavendra Ramachandra ◽  
kiran Raja ◽  
Luuk J. Spreeuwers ◽  
Raymond Veldhuis ◽  
...  

<p> Along with the deployment of the Face Recognition Systems</p> <p>(FRS), concerns were raised related to the vulnerability</p> <p>of those systems towards various attacks including morphed</p> <p>attacks. The morphed face attack involves two different</p> <p>face images in order to obtain via a morphing process</p> <p>a resulting attack image, which is sufficiently similar</p> <p>to both contributing data subjects. The obtained morphed</p> <p>image can successfully be verified against both subjects visually</p> <p>(by a human expert) and by a commercial FRS. The</p> <p>face morphing attack poses a severe security risk to the</p> <p>e-passport issuance process and to applications like border</p> <p>control, unless such attacks are detected and mitigated.</p> <p>In this work, we propose a new method to reliably detect</p> <p>a morphed face attack using a newly designed denoising</p> <p>framework. To this end, we design and introduce a new</p> <p>deep Multi-scale Context Aggregation Network (MS-CAN)</p> <p>to obtain denoised images, which is subsequently used to</p> <p>determine if an image is morphed or not. Extensive experiments</p> <p>are carried out on three different morphed face image</p> <p>datasets. The Morphing Attack Detection (MAD) performance</p> <p>of the proposed method is also benchmarked against</p> <p>14 different state-of-the-art techniques using the ISO-IEC</p> <p>30107-3 evaluation metrics. Based on the obtained quantitative</p> <p>results, the proposed method has indicated the best</p> <p>performance on all three datasets and also on cross-dataset</p> <p>experiments.</p>


2021 ◽  
Vol 11 (7) ◽  
pp. 3207
Author(s):  
Erion-Vasilis Pikoulis ◽  
Zafeiria-Marina Ioannou ◽  
Mersini Paschou ◽  
Evangelos Sakkopoulos

Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting both the technological and human aspects of the problem. Here, after the face morphing attack scenario is presented, the paper provides an overview of the relevant bibliography and recent advances towards two central directions. First, the morphing of face images is outlined with a particular focus on the three main steps that are involved in the process, namely, landmark detection, face alignment and blending. Second, the detection of morphing attacks is presented under the prism of the so-called on-line and off-line detection scenarios and whether the proposed techniques employ handcrafted features, using classical methods, or automatically generated features, using deep-learning-based methods. The paper, then, presents the evaluation metrics that are employed in the corresponding bibliography and concludes with a discussion on open challenges that need to be address for further advancing automatic detection of morphing attacks. Despite the progress being made, the general consensus of the research community is that significant effort and resources are needed in the near future for the mitigation of the issue, especially, towards the creation of datasets capturing the full extent of the problem at hand and the availability of reference evaluation procedures for comparing novel automatic attack detection algorithms.


2020 ◽  
Author(s):  
Sushma Venkatesh ◽  
Raghavendra Ramachandra ◽  
kiran Raja ◽  
Luuk J. Spreeuwers ◽  
Raymond Veldhuis ◽  
...  

<p> Along with the deployment of the Face Recognition Systems</p> <p>(FRS), concerns were raised related to the vulnerability</p> <p>of those systems towards various attacks including morphed</p> <p>attacks. The morphed face attack involves two different</p> <p>face images in order to obtain via a morphing process</p> <p>a resulting attack image, which is sufficiently similar</p> <p>to both contributing data subjects. The obtained morphed</p> <p>image can successfully be verified against both subjects visually</p> <p>(by a human expert) and by a commercial FRS. The</p> <p>face morphing attack poses a severe security risk to the</p> <p>e-passport issuance process and to applications like border</p> <p>control, unless such attacks are detected and mitigated.</p> <p>In this work, we propose a new method to reliably detect</p> <p>a morphed face attack using a newly designed denoising</p> <p>framework. To this end, we design and introduce a new</p> <p>deep Multi-scale Context Aggregation Network (MS-CAN)</p> <p>to obtain denoised images, which is subsequently used to</p> <p>determine if an image is morphed or not. Extensive experiments</p> <p>are carried out on three different morphed face image</p> <p>datasets. The Morphing Attack Detection (MAD) performance</p> <p>of the proposed method is also benchmarked against</p> <p>14 different state-of-the-art techniques using the ISO-IEC</p> <p>30107-3 evaluation metrics. Based on the obtained quantitative</p> <p>results, the proposed method has indicated the best</p> <p>performance on all three datasets and also on cross-dataset</p> <p>experiments.</p>


2019 ◽  
Vol 2019 (5) ◽  
pp. 528-1-528-6
Author(s):  
Xinwei Liu ◽  
Christophe Charrier ◽  
Marius Pedersen ◽  
Patrick Bours

2014 ◽  
Vol 1 (3) ◽  
pp. 23-31
Author(s):  
Basava Raju ◽  
◽  
K. Y. Rama Devi ◽  
P. V. Kumar ◽  
◽  
...  

2021 ◽  
Vol 7 (3) ◽  
pp. 209-219
Author(s):  
Iris J Holzleitner ◽  
Alex L Jones ◽  
Kieran J O’Shea ◽  
Rachel Cassar ◽  
Vanessa Fasolt ◽  
...  

Abstract Objectives A large literature exists investigating the extent to which physical characteristics (e.g., strength, weight, and height) can be accurately assessed from face images. While most of these studies have employed two-dimensional (2D) face images as stimuli, some recent studies have used three-dimensional (3D) face images because they may contain cues not visible in 2D face images. As equipment required for 3D face images is considerably more expensive than that required for 2D face images, we here investigated how perceptual ratings of physical characteristics from 2D and 3D face images compare. Methods We tested whether 3D face images capture cues of strength, weight, and height better than 2D face images do by directly comparing the accuracy of strength, weight, and height ratings of 182 2D and 3D face images taken simultaneously. Strength, height and weight were rated by 66, 59 and 52 raters respectively, who viewed both 2D and 3D images. Results In line with previous studies, we found that weight and height can be judged somewhat accurately from faces; contrary to previous research, we found that people were relatively inaccurate at assessing strength. We found no evidence that physical characteristics could be judged more accurately from 3D than 2D images. Conclusion Our results suggest physical characteristics are perceived with similar accuracy from 2D and 3D face images. They also suggest that the substantial costs associated with collecting 3D face scans may not be justified for research on the accuracy of facial judgments of physical characteristics.


2021 ◽  
Vol 7 (3) ◽  
pp. 50
Author(s):  
Anselmo Ferreira ◽  
Ehsan Nowroozi ◽  
Mauro Barni

The possibility of carrying out a meaningful forensic analysis on printed and scanned images plays a major role in many applications. First of all, printed documents are often associated with criminal activities, such as terrorist plans, child pornography, and even fake packages. Additionally, printing and scanning can be used to hide the traces of image manipulation or the synthetic nature of images, since the artifacts commonly found in manipulated and synthetic images are gone after the images are printed and scanned. A problem hindering research in this area is the lack of large scale reference datasets to be used for algorithm development and benchmarking. Motivated by this issue, we present a new dataset composed of a large number of synthetic and natural printed face images. To highlight the difficulties associated with the analysis of the images of the dataset, we carried out an extensive set of experiments comparing several printer attribution methods. We also verified that state-of-the-art methods to distinguish natural and synthetic face images fail when applied to print and scanned images. We envision that the availability of the new dataset and the preliminary experiments we carried out will motivate and facilitate further research in this area.


Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 878
Author(s):  
C. T. J. Dodson ◽  
John Soldera ◽  
Jacob Scharcanski

Secure user access to devices and datasets is widely enabled by fingerprint or face recognition. Organization of the necessarily large secure digital object datasets, with objects having content that may consist of images, text, video or audio, involves efficient classification and feature retrieval processing. This usually will require multidimensional methods applicable to data that is represented through a family of probability distributions. Then information geometry is an appropriate context in which to provide for such analytic work, whether with maximum likelihood fitted distributions or empirical frequency distributions. The important provision is of a natural geometric measure structure on families of probability distributions by representing them as Riemannian manifolds. Then the distributions are points lying in this geometrical manifold, different features can be identified and dissimilarities computed, so that neighbourhoods of objects nearby a given example object can be constructed. This can reveal clustering and projections onto smaller eigen-subspaces which can make comparisons easier to interpret. Geodesic distances can be used as a natural dissimilarity metric applied over data described by probability distributions. Exploring this property, we propose a new face recognition method which scores dissimilarities between face images by multiplying geodesic distance approximations between 3-variate RGB Gaussians representative of colour face images, and also obtaining joint probabilities. The experimental results show that this new method is more successful in recognition rates than published comparative state-of-the-art methods.


Sign in / Sign up

Export Citation Format

Share Document