Morphing Attack Detection -- Database, Evaluation Platform and
Benchmarking
- URL: http://arxiv.org/abs/2006.06458v3
- Date: Mon, 28 Sep 2020 16:35:11 GMT
- Title: Morphing Attack Detection -- Database, Evaluation Platform and
Benchmarking
- Authors: Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias
Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer,
Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Lo\"ic Bergeron, Sergey
Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe
Seidel, Fons Knopjes, Raymond Veldhuis, Davide Maltoni, Christoph Busch
- Abstract summary: Morphing attacks have posed a severe threat to Face Recognition System (FRS)
Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to age, gender, ethnicity that are inadequately addressed.
In this work, we present a new sequestered dataset for facilitating the advancements of MAD.
- Score: 16.77282920396874
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Morphing attacks have posed a severe threat to Face Recognition System (FRS).
Despite the number of advancements reported in recent works, we note serious
open issues such as independent benchmarking, generalizability challenges and
considerations to age, gender, ethnicity that are inadequately addressed.
Morphing Attack Detection (MAD) algorithms often are prone to generalization
challenges as they are database dependent. The existing databases, mostly of
semi-public nature, lack in diversity in terms of ethnicity, various morphing
process and post-processing pipelines. Further, they do not reflect a realistic
operational scenario for Automated Border Control (ABC) and do not provide a
basis to test MAD on unseen data, in order to benchmark the robustness of
algorithms. In this work, we present a new sequestered dataset for facilitating
the advancements of MAD where the algorithms can be tested on unseen data in an
effort to better generalize. The newly constructed dataset consists of facial
images from 150 subjects from various ethnicities, age-groups and both genders.
In order to challenge the existing MAD algorithms, the morphed images are with
careful subject pre-selection created from the contributing images, and further
post-processed to remove morphing artifacts. The images are also printed and
scanned to remove all digital cues and to simulate a realistic challenge for
MAD algorithms. Further, we present a new online evaluation platform to test
algorithms on sequestered data. With the platform we can benchmark the morph
detection performance and study the generalization ability. This work also
presents a detailed analysis on various subsets of sequestered data and
outlines open challenges for future directions in MAD research.
Related papers
- A Comprehensive Library for Benchmarking Multi-class Visual Anomaly Detection [52.228708947607636]
This paper introduces a comprehensive visual anomaly detection benchmark, ADer, which is a modular framework for new methods.
The benchmark includes multiple datasets from industrial and medical domains, implementing fifteen state-of-the-art methods and nine comprehensive metrics.
We objectively reveal the strengths and weaknesses of different methods and provide insights into the challenges and future directions of multi-class visual anomaly detection.
arXiv Detail & Related papers (2024-06-05T13:40:07Z) - Free-ATM: Exploring Unsupervised Learning on Diffusion-Generated Images
with Free Attention Masks [64.67735676127208]
Text-to-image diffusion models have shown great potential for benefiting image recognition.
Although promising, there has been inadequate exploration dedicated to unsupervised learning on diffusion-generated images.
We introduce customized solutions by fully exploiting the aforementioned free attention masks.
arXiv Detail & Related papers (2023-08-13T10:07:46Z) - IM-IAD: Industrial Image Anomaly Detection Benchmark in Manufacturing [88.35145788575348]
Image anomaly detection (IAD) is an emerging and vital computer vision task in industrial manufacturing.
The lack of a uniform IM benchmark is hindering the development and usage of IAD methods in real-world applications.
We construct a comprehensive image anomaly detection benchmark (IM-IAD), which includes 19 algorithms on seven major datasets.
arXiv Detail & Related papers (2023-01-31T01:24:45Z) - Fusion-based Few-Shot Morphing Attack Detection and Fingerprinting [37.161842673434705]
Face recognition systems are vulnerable to morphing attacks.
Most existing morphing attack detection methods require a large amount of training data and have only been tested on a few predefined attack models.
We propose to extend MAD from supervised learning to few-shot learning and from binary detection to multiclass fingerprinting.
arXiv Detail & Related papers (2022-10-27T14:46:53Z) - Face Morphing Attack Detection Using Privacy-Aware Training Data [0.991629944808926]
Images of morphed faces pose a serious threat to face recognition--based security systems.
Modern detection algorithms learn to identify such morphing attacks using authentic images of real individuals.
This approach raises various privacy concerns and limits the amount of publicly available training data.
arXiv Detail & Related papers (2022-07-02T19:00:48Z) - Algorithmic Fairness in Face Morphing Attack Detection [12.031583036177386]
Face Morphing Attack Detection (MAD) techniques have been developed in recent past to deter such attacks and mitigate risks from morphing attacks.
MAD algorithms should treat the images of subjects from different ethnic origins in an equal manner and provide non-discriminatory results.
While the promising MAD algorithms are tested for robustness, there is no study comprehensively bench-marking their behaviour against various ethnicities.
arXiv Detail & Related papers (2021-11-23T19:16:04Z) - Meta Adversarial Perturbations [66.43754467275967]
We show the existence of a meta adversarial perturbation (MAP)
MAP causes natural images to be misclassified with high probability after being updated through only a one-step gradient ascent update.
We show that these perturbations are not only image-agnostic, but also model-agnostic, as a single perturbation generalizes well across unseen data points and different neural network architectures.
arXiv Detail & Related papers (2021-11-19T16:01:45Z) - PW-MAD: Pixel-wise Supervision for Generalized Face Morphing Attack
Detection [6.24950085812444]
A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based on identity verification, such as border checks.
Different methods have been proposed to detect face morphing attacks, however, with low generalizability to unexpected post-morphing processes.
A major post-morphing process is the print and scan operation performed in many countries when issuing a passport or identity document.
arXiv Detail & Related papers (2021-08-23T17:04:51Z) - MixNet for Generalized Face Presentation Attack Detection [63.35297510471997]
We have proposed a deep learning-based network termed as textitMixNet to detect presentation attacks.
The proposed algorithm utilizes state-of-the-art convolutional neural network architectures and learns the feature mapping for each attack category.
arXiv Detail & Related papers (2020-10-25T23:01:13Z) - Generalized Iris Presentation Attack Detection Algorithm under
Cross-Database Settings [63.90855798947425]
Presentation attacks pose major challenges to most of the biometric modalities.
We propose a generalized deep learning-based presentation attack detection network, MVANet.
It is inspired by the simplicity and success of hybrid algorithm or fusion of multiple detection networks.
arXiv Detail & Related papers (2020-10-25T22:42:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.