Multimodality for Reliable Single Image Based Face Morphing Attack Detection

被引:3
作者
Raghavendra, Ramachandra [1 ,2 ]
Li, Guoqiang [2 ]
机构
[1] Norwegian Univ Sci & Technol NTNU, Inst Informat Secur & Commun Technol IIK, N-2815 Gjovik, Norway
[2] MOBAI AS, N-2821 Gjovik, Norway
基金
欧盟地平线“2020”;
关键词
Feature extraction; Faces; Face recognition; Nose; Image color analysis; Benchmark testing; Mouth; Biometrics; attacks; face biometrics; morphing attacks; multimodal modality;
D O I
10.1109/ACCESS.2022.3196773
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face morphing attacks have demonstrated a high vulnerability on human observers and commercial off-the-shelf Face Recognition Systems (FRS), especially in the border control scenario. Therefore, detecting face morphing attacks is paramount to achieving a reliable and secure border control operation. This work presents a novel framework for the Single image-based Morphing Attack Detection (S-MAD) based on the multimodal regions such as eyes, nose, and mouth. Each of these regions is processed using colour scale-space representation on which two different types of features are extracted using Binarised Statistical Image Features (BSIF) and Local Binary Features (LBP) techniques. These features are then fed to the classifiers such as Probabilistic Collaborative Representation Classifier (P-CRC) and Spectral Regression Kernel Discriminant Analysis (SRKDA). Their decisions are combined at score level to make the final decision. Extensive experiments are carried out on three different face morphing datasets to benchmark the performance of the proposed method with the existing methods. Further, the proposed method is benchmarked on the Bologna Online Evaluation Platform (BOEP). Obtained results demonstrate the improved performance of the proposed method over existing state-of-the-art methods.
引用
收藏
页码:82418 / 82433
页数:16
相关论文
共 50 条
  • [31] Out-of-Distribution Detection for Reliable Face Recognition
    Yu, Chang
    Zhu, Xiangyu
    Lei, Zhen
    Li, Stan Z.
    IEEE SIGNAL PROCESSING LETTERS, 2020, 27 : 710 - 714
  • [32] Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
    Singh, Jag Mohan
    Ramachandra, Raghavendra
    IEEE ACCESS, 2023, 11 : 76468 - 76485
  • [33] Trans-FD: Transformer-Based Representation Interaction for Face De-Morphing
    Long, Min
    Duan, Qiangqiang
    Zhang, Le-Bing
    Peng, Fei
    Zhang, Dengyong
    IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIENCE, 2024, 6 (03): : 385 - 397
  • [34] Salience-Aware Face Presentation Attack Detection via Deep Reinforcement Learning
    Yu, Bingyao
    Lu, Jiwen
    Li, Xiu
    Zhou, Jie
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 413 - 427
  • [35] Face presentation attack detection based on optical flow and texture analysis
    Li, Lei
    Xia, Zhaoqiang
    Wu, Jun
    Yang, Lei
    Han, Huijian
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (04) : 1455 - 1467
  • [36] Face presentation attack detection in mobile scenarios: A comprehensive evaluation
    Jia, Shan
    Guo, Guodong
    Xu, Zhengquan
    Wang, Qiangchang
    IMAGE AND VISION COMPUTING, 2020, 93
  • [37] Face Presentation Attack Detection Based on Exclusivity Regularized Attention Maps
    Wu, Yong
    Zhao, Qijun
    ICCAI '19 - PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE, 2019, : 117 - 122
  • [38] A Novel Algorithm for Face Recognition Based on a Single Image
    Tan, Nutao
    Huang, Lei
    Liu, Changping
    PROCEEDINGS OF THE 2008 CHINESE CONFERENCE ON PATTERN RECOGNITION (CCPR 2008), 2008, : 241 - 245
  • [39] MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders
    Damer, Naser
    Fang, Meiling
    Siebke, Patrick
    Kolf, Jan Niklas
    Huber, Marco
    Boutros, Fadi
    2023 11TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS, IWBF, 2023,
  • [40] Face recognition using elastic local reconstruction based on a single face image
    Xie, Xudong
    Lam, Kin-Man
    PATTERN RECOGNITION, 2008, 41 (01) : 406 - 417