Abstract

The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection (MAD) have been proposed in the scientific literature. However, the MAD algorithms proposed so far have mostly been trained and tested on datasets whose distributions of image characteristics are either very limited (e.g., only created with a single morphing tool) or rather unrealistic (e.g., no print-scan transformation). As a consequence, these methods easily overfit on certain image types and the results presented cannot be expected to apply to real-world scenarios. For example, the results of the latest NIST FRVT MORPH show that the majority of submitted MAD algorithms lacks robustness and performance when considering unseen and challenging datasets. In this work, subsets of the FERET and FRGCv2 face databases are used to create a realistic database for training and testing of MAD algorithms, containing a large number of ICAO-compliant bona fide facial images, corresponding unconstrained probe images, and morphed images created with four different face morphing tools. Furthermore, multiple post-processings are applied on the reference images, e.g., print-scan and JPEG2000 compression. On this database, previously proposed differential morphing algorithms are evaluated and compared. In addition, the application of deep face representations for differential MAD algorithms is investigated. It is shown that algorithms based on deep face representations can achieve very high detection performance (less than 3% D-EER) and robustness with respect to various post-processings. Finally, the limitations of the developed methods are analyzed.

Highlights

  • I MAGE morphing techniques can be used to combine information from two images into one image.Morphing techniques can be used to create a morphedManuscript received November 15, 2019; revised April 1, 2020 and April 27, 2020; accepted May 5, 2020

  • Detection performance: the detection performance achieved by morphing attack detection (MAD) based on deep face representations is promising and highly robust with respect to image post-processing, i.e., image compression, image resizing and even print-scan transformation

  • The detection performance does not significantly depend on the post-processing applied to the training set, so that no scanned images are necessary for training

Read more

Summary

Introduction

I MAGE morphing techniques can be used to combine information from two (or more) images into one image.Morphing techniques can be used to create a morphedManuscript received November 15, 2019; revised April 1, 2020 and April 27, 2020; accepted May 5, 2020. I MAGE morphing techniques can be used to combine information from two (or more) images into one image. Morphing techniques can be used to create a morphed. Manuscript received November 15, 2019; revised April 1, 2020 and April 27, 2020; accepted May 5, 2020. Date of publication May 14, 2020; date of current version July 6, 2020. The associate editor coordinating the review of this manuscript and approving it for publication was Prof.

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call