Generalized Benford's Law for Blind Detection of Morphed Face Images

A morphed face image in a photo ID is a serious threat to image-based user verification enabling that multiple persons could be matched with the same document. The application of machine-readable travel documents (MRTD) at automated border control (ABC) gates is an example of a verification scenario that is very sensitive to this kind of fraud. Detection of morphed face images prior to face matching is, therefore, indispensable for effective border security. We introduce the face morphing detection approach based on fitting a logarithmic curve to nine Benford features extracted from quantized DCT coefficients of JPEG compressed original and morphed face images. We separately study the parameters of the logarithmic curve in face and background regions to establish the traces imposed by the morphing process. The evaluation results show that a single parameter of the logarithmic curve may be sufficient to clearly separate morphed and original images.

[1]  Jana Dittmann,et al.  Extended StirTrace benchmarking of biometric and forensic qualities of morphed face images , 2018, IET Biom..

[2]  Kiran B. Raja,et al.  Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[3]  Jana Dittmann,et al.  Automatic Generation and Detection of Visually Faultless Facial Morphs , 2017, VISIGRAPP.

[4]  Xi Chen,et al.  CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing , 2017, IWDW.

[5]  Tom Neubert,et al.  Face Morphing Detection: An Approach Based on Image Degradation Analysis , 2017, IWDW.

[6]  Jana Dittmann,et al.  Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[7]  Kiran B. Raja,et al.  On the vulnerability of face recognition systems towards morphed face attacks , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[8]  Wei Su,et al.  A generalized Benford's law for JPEG coefficients and its applications in image forensics , 2007, Electronic Imaging.

[9]  Kiran B. Raja,et al.  Detecting morphed face images , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[10]  Anna Hilsmann,et al.  Detection of Face Morphing Attacks by Deep Learning , 2017, IWDW.

[11]  Sabah Jassim,et al.  Topological Data Analysis for Image Tampering Detection , 2017, IWDW.

[12]  Jana Dittmann,et al.  Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing , 2017, IH&MMSec.

[13]  Davide Maltoni,et al.  On the Effects of Image Alterations on Face Recognition Accuracy , 2016, Face Recognition Across the Imaging Spectrum.

[14]  Patrick Pérez,et al.  Poisson image editing , 2003, ACM Trans. Graph..

[15]  Davide Maltoni,et al.  The magic passport , 2014, IEEE International Joint Conference on Biometrics.

[16]  Lisa M. DeBruine,et al.  Face Research Lab London Set , 2017 .