Visual Feature Space Analyses of Face Morphing Detectors

Face morphing attacks are a serious threat to biometric face recognition systems. If a morphed face image containing biometric characteristics of at least two different subjects is embedded into a personal document, this document can be used for verification by different subjects. Due to the fast dissemination of automated face recognition systems, especially for border control at airports, detection of morphed face images in documents is gaining relevance. Recently proposed morphing detection approaches demonstrate low error rates with datasets used for development and evaluation, but often fail for new datasets. The detectors are often trained and evaluated on images in better quality than images in electronic Machine-Readable Travel Documents (eMRTD). Since these morphing detectors are clearly suitable for fraud detection before the image is compressed to fit into a eMRTD, we study their performance and potential on images compliant with eMRTDs. A visual analysis of feature spaces provide us with a better understanding of a presumable generalization ability of morphing detectors. The questions we endeavour to answer are how the distributions of high resolution face images and face images in eMRTDs differ in a detector’s feature space and whether detecting morphed face images in eMRTDs should be considered as a different task than detecting them before they are compressed to fit into an eMRTD.

[1]  Christoph Busch,et al.  PRNU-based detection of morphed face images , 2018, 2018 International Workshop on Biometrics and Forensics (IWBF).

[2]  Jana Dittmann,et al.  Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control , 2019, VISIGRAPP.

[3]  Davide Maltoni,et al.  The magic passport , 2014, IEEE International Joint Conference on Biometrics.

[4]  Adam Schmidt,et al.  The put face database , 2008 .

[5]  Alexandru Telea,et al.  Visual Analytics of Multidimensional Projections for Constructing Classifier Decision Boundary Maps , 2019, VISIGRAPP.

[6]  Jana Dittmann,et al.  A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD , 2019, IH&MMSec.

[7]  David J Robertson,et al.  Detecting morphed passport photos: a training and individual differences approach , 2018, Cognitive research: principles and implications.

[8]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[9]  S T Roweis,et al.  Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.

[10]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[11]  Mislav Grgic,et al.  SCface – surveillance cameras face database , 2011, Multimedia Tools and Applications.

[12]  Anna Hilsmann,et al.  Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks , 2018, ArXiv.

[13]  Davis E. King,et al.  Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..

[14]  Kiran B. Raja,et al.  Detecting morphed face images , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[15]  Robin S S Kramer,et al.  Fraudulent ID using face morphs: Experiments on human and automatic recognition , 2017, PloS one.

[16]  Jana Dittmann,et al.  Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[17]  Ron Kohavi,et al.  Irrelevant Features and the Subset Selection Problem , 1994, ICML.

[18]  Lijun Yin,et al.  A high-resolution 3D dynamic facial expression database , 2008, 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition.

[19]  Joshua Correll,et al.  The Chicago face database: A free stimulus set of faces and norming data , 2015, Behavior research methods.

[20]  Leland McInnes,et al.  UMAP: Uniform Manifold Approximation and Projection , 2018, J. Open Source Softw..

[21]  J. Tenenbaum,et al.  A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.

[22]  Kiran B. Raja,et al.  On the vulnerability of face recognition systems towards morphed face attacks , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[23]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[24]  Anna Hilsmann,et al.  Detection of Face Morphing Attacks by Deep Learning , 2017, IWDW.

[25]  Anna Hilsmann,et al.  Reflection Analysis for Face Morphing Attack Detection , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[26]  Jana Dittmann,et al.  Generalized Benford's Law for Blind Detection of Morphed Face Images , 2018, IH&MMSec.

[27]  Jana Dittmann,et al.  Automatic Generation and Detection of Visually Faultless Facial Morphs , 2017, VISIGRAPP.

[28]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[29]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[30]  Jana Dittmann,et al.  Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing , 2017, IH&MMSec.

[31]  Davide Maltoni,et al.  Face Demorphing , 2018, IEEE Transactions on Information Forensics and Security.