Deep Face Representations for Differential Morphing Attack Detection

The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection (MAD) have been proposed in the scientific literature. However, the MAD algorithms proposed so far have mostly been trained and tested on datasets whose distributions of image characteristics are either very limited (e.g., only created with a single morphing tool) or rather unrealistic (e.g., no print-scan transformation). As a consequence, these methods easily overfit on certain image types and the results presented cannot be expected to apply to real-world scenarios. For example, the results of the latest NIST FRVT MORPH show that the majority of submitted MAD algorithms lacks robustness and performance when considering unseen and challenging datasets. In this work, subsets of the FERET and FRGCv2 face databases are used to create a realistic database for training and testing of MAD algorithms, containing a large number of ICAO-compliant bona fide facial images, corresponding unconstrained probe images, and morphed images created with four different face morphing tools. Furthermore, multiple post-processings are applied on the reference images, e.g., print-scan and JPEG2000 compression. On this database, previously proposed differential morphing algorithms are evaluated and compared. In addition, the application of deep face representations for differential MAD algorithms is investigated. It is shown that algorithms based on deep face representations can achieve very high detection performance (less than 3% D-EER) and robustness with respect to various post-processings. Finally, the limitations of the developed methods are analyzed.

[1]  Kiran B. Raja,et al.  Detecting morphed face images , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[2]  Kiran B. Raja,et al.  On the vulnerability of face recognition systems towards morphed face attacks , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[3]  Anna Hilsmann,et al.  Detection of Face Morphing Attacks by Deep Learning , 2017, IWDW.

[4]  Sabah Jassim,et al.  Topological Data Analysis for Image Tampering Detection , 2017, IWDW.

[5]  Anna Hilsmann,et al.  Reflection Analysis for Face Morphing Attack Detection , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[6]  Richa Singh,et al.  SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[7]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[8]  Naser Damer,et al.  Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts , 2018, GCPR.

[9]  Anna Hilsmann,et al.  Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks , 2018, ArXiv.

[10]  Jana Dittmann,et al.  Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing , 2017, IH&MMSec.

[11]  Luuk J. Spreeuwers,et al.  Towards Robust Evaluation of Face Morphing Detection , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[12]  Christoph Busch,et al.  Performance variation of morphed face image detection algorithms across different datasets , 2018, 2018 International Workshop on Biometrics and Forensics (IWBF).

[13]  Patrick J. Grother,et al.  Face Recognition Vendor Test (FRVT) part 4:: MORPH - performance of automated face morph detection , 2020 .

[14]  Raul Vicente-Garcia,et al.  Morphing Detection Using a General- Purpose Face Recognition System , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[15]  Christoph Busch,et al.  PRNU Variance Analysis for Morphed Face Image Detection , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[16]  Andreas Uhl,et al.  Detection of Face Morphing Attacks Based on PRNU Analysis , 2019, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[17]  Christoph Busch,et al.  Detecting Morphed Face Images Using Facial Landmarks , 2018, ICISP.

[18]  Esa Rahtu,et al.  BSIF: Binarized statistical image features , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).

[19]  Josef Kittler,et al.  Wing Loss for Robust Facial Landmark Localisation with Convolutional Neural Networks , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[20]  Christoph Busch,et al.  PRNU-based detection of morphed face images , 2018, 2018 International Workshop on Biometrics and Forensics (IWBF).

[21]  Davis E. King,et al.  Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..

[22]  P. Sinha,et al.  Contribution of Color to Face Recognition , 2002, Perception.

[23]  Jana Dittmann,et al.  Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[24]  Harry Wechsler,et al.  The FERET database and evaluation procedure for face-recognition algorithms , 1998, Image Vis. Comput..

[25]  Kiran B. Raja,et al.  Face morphing versus face averaging: Vulnerability and detection , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).

[26]  Fei Peng,et al.  FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice’s Facial Image , 2018, IEEE Access.

[27]  Aleix M. Martinez,et al.  The AR face database , 1998 .

[28]  Aras Asaad Automatic Detection of Image Morphing by Topology-based Analysis , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[29]  Naser Damer,et al.  On the Detection of GAN-Based Face Morphs Using Established Morph Detectors , 2019, ICIAP.

[30]  David J Robertson,et al.  Detecting morphed passport photos: a training and individual differences approach , 2018, Cognitive research: principles and implications.

[31]  Kiran B. Raja,et al.  Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[32]  Davide Maltoni,et al.  On the Effects of Image Alterations on Face Recognition Accuracy , 2016, Face Recognition Across the Imaging Spectrum.

[33]  Christoph Busch,et al.  Predicting the vulnerability of biometric systems to attacks based on morphed biometric information , 2018, IET Biom..

[34]  Fei Peng,et al.  Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise , 2018, 2018 IEEE International Conference on Multimedia and Expo (ICME).

[35]  Matti Pietikäinen,et al.  A comparative study of texture measures with classification based on featured distributions , 1996, Pattern Recognit..

[36]  Carlos D. Castillo,et al.  Deep Learning for Understanding Faces: Machines May Be Just as Good, or Better, than Humans , 2018, IEEE Signal Processing Magazine.

[37]  Stefanos Zafeiriou,et al.  ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[38]  Naser Damer,et al.  MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[39]  Christoph Busch,et al.  Towards Detection of Morphed Face Images in Electronic Travel Documents , 2018, 2018 13th IAPR International Workshop on Document Analysis Systems (DAS).

[40]  Jana Dittmann,et al.  Automatic Generation and Detection of Visually Faultless Facial Morphs , 2017, VISIGRAPP.

[41]  Christoph Busch,et al.  Morph Deterction from Single Face Image: a Multi-Algorithm Fusion Approach , 2018, ICBEA '18.

[42]  Wen Gao,et al.  The CAS-PEAL Large-Scale Chinese Face Database and Baseline Evaluations , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[43]  Davide Maltoni,et al.  Face Demorphing , 2018, IEEE Transactions on Information Forensics and Security.

[44]  Davide Maltoni,et al.  The magic passport , 2014, IEEE International Joint Conference on Biometrics.

[45]  Christoph Busch,et al.  Face Recognition Systems Under Morphing Attacks: A Survey , 2019, IEEE Access.

[46]  Sushma Venkatesh,et al.  Towards making Morphing Attack Detection robust using hybrid Scale-Space Colour Texture Features , 2019, 2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA).

[47]  Christoph Busch,et al.  Is your biometric system robust to morphing attaeks? , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[48]  Davide Maltoni,et al.  Face demorphing in the presence of facial appearance variations , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[49]  Davide Maltoni,et al.  Face morphing detection in the presence of printing/scanning and heterogeneous image sources , 2019, IET Biom..

[50]  Sébastien Marcel,et al.  Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting , 2017, 2017 International Conference of the Biometrics Special Interest Group (BIOSIG).

[51]  Patrick J. Flynn,et al.  Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).