Differential Morphed Face Detection Using Deep Siamese Networks
- URL: http://arxiv.org/abs/2012.01541v2
- Date: Sat, 5 Dec 2020 01:51:50 GMT
- Title: Differential Morphed Face Detection Using Deep Siamese Networks
- Authors: Sobhan Soleymani, Baaria Chaudhary, Ali Dabouei, Jeremy Dawson, Nasser
M. Nasrabadi
- Abstract summary: We propose a novel differential morph attack detection framework using a deep Siamese network.
To the best of our knowledge, this is the first research work that makes use of a Siamese network architecture for morph attack detection.
- Score: 23.632874831725665
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Although biometric facial recognition systems are fast becoming part of
security applications, these systems are still vulnerable to morphing attacks,
in which a facial reference image can be verified as two or more separate
identities. In border control scenarios, a successful morphing attack allows
two or more people to use the same passport to cross borders. In this paper, we
propose a novel differential morph attack detection framework using a deep
Siamese network. To the best of our knowledge, this is the first research work
that makes use of a Siamese network architecture for morph attack detection. We
compare our model with other classical and deep learning models using two
distinct morph datasets, VISAPP17 and MorGAN. We explore the embedding space
generated by the contrastive loss using three decision making frameworks using
Euclidean distance, feature difference and a support vector machine classifier,
and feature concatenation and a support vector machine classifier.
Related papers
- LADIMO: Face Morph Generation through Biometric Template Inversion with Latent Diffusion [5.602947425285195]
Face morphing attacks pose a severe security threat to face recognition systems.
We present a representation-level face morphing approach, namely LADIMO, that performs morphing on two face recognition embeddings.
We show that each face morph variant has an individual attack success rate, enabling us to maximize the morph attack potential.
arXiv Detail & Related papers (2024-10-10T14:41:37Z) - UniForensics: Face Forgery Detection via General Facial Representation [60.5421627990707]
High-level semantic features are less susceptible to perturbations and not limited to forgery-specific artifacts, thus having stronger generalization.
We introduce UniForensics, a novel deepfake detection framework that leverages a transformer-based video network, with a meta-functional face classification for enriched facial representation.
arXiv Detail & Related papers (2024-07-26T20:51:54Z) - Approximating Optimal Morphing Attacks using Template Inversion [4.0361765428523135]
We develop a novel type ofdeep morphing attack based on inverting a theoretical optimal morph embedding.
We generate morphing attacks from several source datasets and study the effectiveness of those attacks against several face recognition networks.
arXiv Detail & Related papers (2024-02-01T15:51:46Z) - Unified Physical-Digital Face Attack Detection [66.14645299430157]
Face Recognition (FR) systems can suffer from physical (i.e., print photo) and digital (i.e., DeepFake) attacks.
Previous related work rarely considers both situations at the same time.
We propose a Unified Attack Detection framework based on Vision-Language Models (VLMs)
arXiv Detail & Related papers (2024-01-31T09:38:44Z) - COMICS: End-to-end Bi-grained Contrastive Learning for Multi-face Forgery Detection [56.7599217711363]
Face forgery recognition methods can only process one face at a time.
Most face forgery recognition methods can only process one face at a time.
We propose COMICS, an end-to-end framework for multi-face forgery detection.
arXiv Detail & Related papers (2023-08-03T03:37:13Z) - Towards minimizing efforts for Morphing Attacks -- Deep embeddings for morphing pair selection and improved Morphing Attack Detection [4.349201388722244]
Face embeddings serve two purposes: pre-selecting images for large-scale Morphing Attack generation and detecting potential Morphing Attacks.
We employ an pre-selection algorithm that pairs individuals based on face embedding similarity.
We compare embeddings from two state-of-the-art face recognition systems in terms of their ability to detect Morphing Attacks.
arXiv Detail & Related papers (2023-05-29T17:00:40Z) - MorphGANFormer: Transformer-based Face Morphing and De-Morphing [55.211984079735196]
StyleGAN-based approaches to face morphing are among the leading techniques.
We propose a transformer-based alternative to face morphing and demonstrate its superiority to StyleGAN-based methods.
arXiv Detail & Related papers (2023-02-18T19:09:11Z) - Are GAN-based Morphs Threatening Face Recognition? [3.0921354926071274]
This paper bridges the gap by providing datasets and the corresponding code for four types of morphing attacks.
We also conduct extensive experiments to assess the vulnerability of four state-of-the-art face recognition systems.
arXiv Detail & Related papers (2022-05-05T08:19:47Z) - Vulnerability Analysis of Face Morphing Attacks from Landmarks and
Generative Adversarial Networks [0.8602553195689513]
This paper provides a new dataset with four different types of morphing attacks based on OpenCV, FaceMorpher, WebMorph and a generative adversarial network (StyleGAN)
We also conduct extensive experiments to assess the vulnerability of the state-of-the-art face recognition systems, notably FaceNet, VGG-Face, and ArcFace.
arXiv Detail & Related papers (2020-12-09T22:10:17Z) - MixNet for Generalized Face Presentation Attack Detection [63.35297510471997]
We have proposed a deep learning-based network termed as textitMixNet to detect presentation attacks.
The proposed algorithm utilizes state-of-the-art convolutional neural network architectures and learns the feature mapping for each attack category.
arXiv Detail & Related papers (2020-10-25T23:01:13Z) - Black-Box Face Recovery from Identity Features [61.950765357647605]
We attack the state-of-the-art face recognition system (ArcFace) to test our algorithm.
Our algorithm requires a significantly less number of queries compared to the state-of-the-art solution.
arXiv Detail & Related papers (2020-07-27T15:25:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.