Generation and Detection of Face Morphing Attacks

被引:8
作者
Hamza, Muhammad [1 ]
Tehsin, Samabia [1 ]
Karamti, Hanen [2 ]
Alghamdi, Norah Saleh [2 ]
机构
[1] Bahria Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh 11671, Saudi Arabia
关键词
Databases; Face recognition; Feature extraction; Training; Software; Gears; Faces; Morphing attack detection; fraudulent and forged digital identity documents; biometrics; facial recognition; access control; RECOGNITION; ILLUMINATION;
D O I
10.1109/ACCESS.2022.3188668
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Failure of facial recognition and authentication system may lead to several unlawful activities. The current facial recognition systems are vulnerable to different biometric attacks. This research focuses on morphing attack detection. This research proposes a robust detection mechanism that can deal with variation in age, illumination, eye and head gears. A deep learning based feature extractor along with a classifier is adopted. Additionally, image enhancement and feature combination are proposed to augment the detection results. A versatile dataset is also developed that contains Morph-2 and Morph-3 images, created by sophisticated tools with manual intervention. Morph-3 images can give more realistic appearance and hence difficult to detect. Moreover, Morph-3 images are not considered in the literature before. Professional morphing software depicts more realistic morph attack scenario as compared to the morphs generated in the previous work from free programs and code scripts. Eight face databases are used for creation of morphs to encompass the variation. These databases are Celebrity2000, Extended Yale, FEI, FGNET, GT-DB, MULTI-PIE, FERET and FRLL. Results are investigated using multiple experimental setups and it is concluded that the proposed methodology gives promising results.
引用
收藏
页码:72557 / 72576
页数:20
相关论文
共 50 条
  • [1] 3-D Face Morphing Attacks: Generation, Vulnerability and Detection
    Singh, Jag Mohan
    Ramachandra, Raghavendra
    IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIENCE, 2024, 6 (01): : 103 - 117
  • [2] Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
    Carabe, Luis
    Cermeno, Eduardo
    IEEE ACCESS, 2021, 9 : 100851 - 100867
  • [3] Detection of Face Morphing Attacks Based on PRNU Analysis
    Scherhag U.
    Debiasi L.
    Rathgeb C.
    Busch C.
    Uhl A.
    IEEE Transactions on Biometrics, Behavior, and Identity Science, 2019, 1 (04): : 302 - 317
  • [4] Deep Face Representations for Differential Morphing Attack Detection
    Scherhag, Ulrich
    Rathgeb, Christian
    Merkle, Johannes
    Busch, Christoph
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3625 - 3639
  • [5] Face Morphing Attacks: A Threat to eLearning?
    Rathgeb, Christian
    Poeppelmann, Katrin
    Busch, Christoph
    PROCEEDINGS OF THE 2021 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON), 2021, : 1155 - 1160
  • [6] Face Recognition Systems Under Morphing Attacks: A Survey
    Scherhag, Ulrich
    Rathgeb, Christian
    Merkle, Johannes
    Breithaupt, Ralph
    Busch, Christoph
    IEEE ACCESS, 2019, 7 : 23012 - 23026
  • [7] Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision
    Qin, Le
    Peng, Fei
    Long, Min
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3649 - 3662
  • [8] Multimodality for Reliable Single Image Based Face Morphing Attack Detection
    Raghavendra, Ramachandra
    Li, Guoqiang
    IEEE ACCESS, 2022, 10 : 82418 - 82433
  • [9] Building robust morphing attacks for face recognition systems
    Gallardo-Cava, Roberto
    Ortega-delCampo, David
    Palacios-Alonso, Daniel
    Conde, Cristina
    Moguerza, Javier M.
    Cabello, Enrique
    2022 11TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2022,
  • [10] Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
    Singh, Jag Mohan
    Ramachandra, Raghavendra
    IEEE ACCESS, 2023, 11 : 76468 - 76485