Detecting Facial Retouching Using Supervised Deep Learning

被引:88
作者
Bharati, Aparna [1 ,2 ]
Singh, Richa [1 ]
Vatsa, Mayank [1 ]
Bowyer, Kevin W. [2 ]
机构
[1] Indraprastha Inst Informat Technol, Delhi 110020, India
[2] Univ Notre Dame, Notre Dame, IN 46556 USA
关键词
Image forensics; face recognition; face image retouching; face image alteration; biometric spoofing;
D O I
10.1109/TIFS.2016.2561898
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Digitally altering, or retouching, face images is a common practice for images on social media, photo sharing websites, and even identification cards when the standards are not strictly enforced. This research demonstrates the effect of digital alterations on the performance of automatic face recognition, and also introduces an algorithm to classify face images as original or retouched with high accuracy. We first introduce two face image databases with unaltered and retouched images. Face recognition experiments performed on these databases show that when a retouched image is matched with its original image or an unaltered gallery image, the identification performance is considerably degraded, with a drop in matching accuracy of up to 25%. However, when images are retouched with the same style, the matching accuracy can be misleadingly high in comparison with matching original images. To detect retouching in face images, a novel supervised deep Boltzmann machine algorithm is proposed. It uses facial parts to learn discriminative features to classify face images as original or retouched. The proposed approach for classifying images as original or retouched yields an accuracy of over 87% on the data sets introduced in this paper and over 99% on three other makeup data sets used by previous researchers. This is a substantial increase in accuracy over the previous state-of-the-art algorithm, which has shown <50% accuracy in classifying original and retouched images from the ND-IIITD retouched faces database.
引用
收藏
页码:1903 / 1913
页数:11
相关论文
共 15 条
[1]  
[Anonymous], IJCB
[2]  
Cheng CF, 2013, EVID-BASED COMPL ALT, V2013, DOI [10.1155/2013/958025, 10.1155/2013/613950]
[3]  
Chew H., 2004, OPTIMIZATION CONTROL
[4]  
Dantcheva A., 2012, 2012 IEEE Fifth International Conference On Biometrics: Theory, Applications And Systems (BTAS 2012), P391, DOI 10.1109/BTAS.2012.6374605
[5]   Recognizing Disguised Faces: Human and Machine Evaluation [J].
Dhamecha, Tejas Indulal ;
Singh, Richa ;
Vatsa, Mayank ;
Kumar, Ajay .
PLOS ONE, 2014, 9 (07)
[6]  
Ferrara M, 2013, LECT NOTES COMPUT SC, V8156, P743
[7]  
Flynn PJ, 2003, LECT NOTES COMPUT SC, V2688, P44
[8]   Exposing Photo Manipulation from Shading and Shadows [J].
Kee, Eric ;
O'Brien, James F. ;
Farid, Hany .
ACM TRANSACTIONS ON GRAPHICS, 2014, 33 (05)
[9]   A perceptual metric for photo retouching [J].
Kee, Eric ;
Farid, Hany .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2011, 108 (50) :19907-19912
[10]  
Klontz JC, 2013, 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS)