Face Morphing Attack Generation & Detection: A Comprehensive Survey
- URL: http://arxiv.org/abs/2011.02045v1
- Date: Tue, 3 Nov 2020 22:36:27 GMT
- Title: Face Morphing Attack Generation & Detection: A Comprehensive Survey
- Authors: Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
- Abstract summary: Face Recognition System (FRS) has received a great interest from the biometric community.
The goal of a morphing attack is to subvert the FRS at Automatic Border Control gates.
Malicious actor and accomplice can generate morphed face image and obtain e-passport.
- Score: 12.936155415524937
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The vulnerability of Face Recognition System (FRS) to various kind of attacks
(both direct and in-direct attacks) and face morphing attacks has received a
great interest from the biometric community. The goal of a morphing attack is
to subvert the FRS at Automatic Border Control (ABC) gates by presenting the
Electronic Machine Readable Travel Document (eMRTD) or e-passport that is
obtained based on the morphed face image. Since the application process for the
e-passport in the majority countries requires a passport photo to be presented
by the applicant, a malicious actor and the accomplice can generate the morphed
face image and to obtain the e-passport. An e-passport with a morphed face
images can be used by both the malicious actor and the accomplice to cross the
border as the morphed face image can be verified against both of them. This can
result in a significant threat as a malicious actor can cross the border
without revealing the track of his/her criminal background while the details of
accomplice are recorded in the log of the access control system. This survey
aims to present a systematic overview of the progress made in the area of face
morphing in terms of both morph generation and morph detection. In this paper,
we describe and illustrate various aspects of face morphing attacks, including
different techniques for generating morphed face images but also the
state-of-the-art regarding Morph Attack Detection (MAD) algorithms based on a
stringent taxonomy and finally the availability of public databases, which
allow to benchmark new MAD algorithms in a reproducible manner. The outcomes of
competitions/benchmarking, vulnerability assessments and performance evaluation
metrics are also provided in a comprehensive manner. Furthermore, we discuss
the open challenges and potential future works that need to be addressed in
this evolving field of biometrics.
Related papers
- ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification [60.73617868629575]
misuse of deep learning-based facial manipulation poses a potential threat to civil rights.
To prevent this fraud at its source, proactive defense technology was proposed to disrupt the manipulation process.
We propose a novel universal framework for combating facial manipulation, called ID-Guard.
arXiv Detail & Related papers (2024-09-20T09:30:08Z) - Imperceptible Face Forgery Attack via Adversarial Semantic Mask [59.23247545399068]
We propose an Adversarial Semantic Mask Attack framework (ASMA) which can generate adversarial examples with good transferability and invisibility.
Specifically, we propose a novel adversarial semantic mask generative model, which can constrain generated perturbations in local semantic regions for good stealthiness.
arXiv Detail & Related papers (2024-06-16T10:38:11Z) - TetraLoss: Improving the Robustness of Face Recognition against Morphing
Attacks [7.092869001331781]
Face recognition systems are widely deployed in high-security applications.
Digital manipulations, such as face morphing, pose a security threat to face recognition systems.
We present a novel method for adapting deep learning-based face recognition systems to be more robust against face morphing attacks.
arXiv Detail & Related papers (2024-01-21T21:04:05Z) - Analyzing eyebrow region for morphed image detection [4.879461135691896]
The proposed method is based on analyzing the frequency content of the eyebrow region.
The findings suggest that the proposed method can serve as a valuable tool in morphed image detection.
arXiv Detail & Related papers (2023-10-30T06:11:27Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - Are GAN-based Morphs Threatening Face Recognition? [3.0921354926071274]
This paper bridges the gap by providing datasets and the corresponding code for four types of morphing attacks.
We also conduct extensive experiments to assess the vulnerability of four state-of-the-art face recognition systems.
arXiv Detail & Related papers (2022-05-05T08:19:47Z) - Restricted Black-box Adversarial Attack Against DeepFake Face Swapping [70.82017781235535]
We introduce a practical adversarial attack that does not require any queries to the facial image forgery model.
Our method is built on a substitute model persuing for face reconstruction and then transfers adversarial examples from the substitute model directly to inaccessible black-box DeepFake models.
arXiv Detail & Related papers (2022-04-26T14:36:06Z) - PW-MAD: Pixel-wise Supervision for Generalized Face Morphing Attack
Detection [6.24950085812444]
A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based on identity verification, such as border checks.
Different methods have been proposed to detect face morphing attacks, however, with low generalizability to unexpected post-morphing processes.
A major post-morphing process is the print and scan operation performed in many countries when issuing a passport or identity document.
arXiv Detail & Related papers (2021-08-23T17:04:51Z) - Facial Masks and Soft-Biometrics: Leveraging Face Recognition CNNs for
Age and Gender Prediction on Mobile Ocular Images [53.913598771836924]
We address the use of selfie ocular images captured with smartphones to estimate age and gender.
We adapt two existing lightweight CNNs proposed in the context of the ImageNet Challenge.
Some networks are further pre-trained for face recognition, for which very large training databases are available.
arXiv Detail & Related papers (2021-03-31T01:48:29Z) - Vulnerability Analysis of Face Morphing Attacks from Landmarks and
Generative Adversarial Networks [0.8602553195689513]
This paper provides a new dataset with four different types of morphing attacks based on OpenCV, FaceMorpher, WebMorph and a generative adversarial network (StyleGAN)
We also conduct extensive experiments to assess the vulnerability of the state-of-the-art face recognition systems, notably FaceNet, VGG-Face, and ArcFace.
arXiv Detail & Related papers (2020-12-09T22:10:17Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.