Style Your Face Morph and Improve Your Face Morphing Attack Detector

A morphed face image is a synthetically created image that looks so similar to the faces of two subjects that both can use it for verification against a biometric verification system. It can be easily created by aligning and blending face images of the two subjects. In this paper, we propose a style transfer based method that improves the quality of morphed face images. It counters the image degeneration during the creation of morphed face images caused by blending. We analyze different state of the art face morphing attack detection systems regarding their performance against our improved morphed face images and other methods that improve the image quality. All detection systems perform significantly worse, when first confronted with our improved morphed face images. Most of them can be enhanced by adding our quality improved morphs to the training data, which further improves the robustness against other means of quality improvement.

[1]  Kiran B. Raja,et al.  Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[2]  Anna Hilsmann,et al.  Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks , 2018, ArXiv.

[3]  Andreas Wolf,et al.  An Overview of Recent Advances in Assessing and Mitigating the Face Morphing Attack , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[4]  Kiran B. Raja,et al.  Detecting morphed face images , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[5]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[6]  Davide Maltoni,et al.  Face Demorphing , 2018, IEEE Transactions on Information Forensics and Security.

[7]  Christoph Busch,et al.  Face Recognition Systems Under Morphing Attacks: A Survey , 2019, IEEE Access.

[8]  Jorge Nocedal,et al.  Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization , 1997, TOMS.

[9]  Jana Dittmann,et al.  Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing , 2017, IH&MMSec.

[10]  Davide Maltoni,et al.  Face morphing detection in the presence of printing/scanning and heterogeneous image sources , 2019, IET Biom..

[11]  Anna Hilsmann,et al.  Reflection Analysis for Face Morphing Attack Detection , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[12]  Luuk J. Spreeuwers,et al.  Towards Robust Evaluation of Face Morphing Detection , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[13]  Leon A. Gatys,et al.  A Neural Algorithm of Artistic Style , 2015, ArXiv.

[14]  Jana Dittmann,et al.  Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[15]  Anna Hilsmann,et al.  Detection of Face Morphing Attacks by Deep Learning , 2017, IWDW.

[16]  Rob Fergus,et al.  Visualizing and Understanding Convolutional Networks , 2013, ECCV.

[17]  Davide Maltoni,et al.  The magic passport , 2014, IEEE International Joint Conference on Biometrics.