PW-MAD: Pixel-wise Supervision for Generalized Face Morphing Attack
Detection
- URL: http://arxiv.org/abs/2108.10291v1
- Date: Mon, 23 Aug 2021 17:04:51 GMT
- Title: PW-MAD: Pixel-wise Supervision for Generalized Face Morphing Attack
Detection
- Authors: Naser Damer, Noemie Spiller, Meiling Fang, Fadi Boutros, Florian
Kirchbuchner and Arjan Kuijper
- Abstract summary: A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based on identity verification, such as border checks.
Different methods have been proposed to detect face morphing attacks, however, with low generalizability to unexpected post-morphing processes.
A major post-morphing process is the print and scan operation performed in many countries when issuing a passport or identity document.
- Score: 6.24950085812444
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: A face morphing attack image can be verified to multiple identities, making
this attack a major vulnerability to processes based on identity verification,
such as border checks. Different methods have been proposed to detect face
morphing attacks, however, with low generalizability to unexpected
post-morphing processes. A major post-morphing process is the print and scan
operation performed in many countries when issuing a passport or identity
document. In this work, we address this generalization problem by adapting a
pixel-wise supervision approach where we train a network to classify each pixel
of the image into an attack or not during the training process, rather than
only having one label for the whole image. Our pixel-wise morphing attack
detection (PW-MAD) solution performs more accurately than a set of established
baselines. More importantly, our approach shows high generalizability in
comparison to related works, when evaluated on unknown re-digitized attacks.
Additionally to our PW-MAD approach, we create a new face morphing attack
dataset with digital and re-digitized attacks and bona fide samples, namely the
LMA-DRD dataset that will be made publicly available for research purposes.
Related papers
- ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification [60.73617868629575]
misuse of deep learning-based facial manipulation poses a potential threat to civil rights.
To prevent this fraud at its source, proactive defense technology was proposed to disrupt the manipulation process.
We propose a novel universal framework for combating facial manipulation, called ID-Guard.
arXiv Detail & Related papers (2024-09-20T09:30:08Z) - Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications [7.287930923353593]
One of the main scenarios is printing morphed images and submitting the respective print in a passport application process.
Small datasets are available to train the MAD algorithm because of privacy concerns.
This paper proposes two different methods based on transfer-transfer for automatically creating digital print/scan face images.
arXiv Detail & Related papers (2024-08-18T17:53:26Z) - Hierarchical Generative Network for Face Morphing Attacks [7.34597796509503]
Face morphing attacks circumvent face recognition systems (FRSs) by creating a morphed image that contains multiple identities.
We propose a novel morphing attack method to improve the quality of morphed images and better preserve the contributing identities.
arXiv Detail & Related papers (2024-03-17T06:09:27Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - Multispectral Imaging for Differential Face Morphing Attack Detection: A
Preliminary Study [7.681417534211941]
This paper presents a multispectral framework for differential morphing-attack detection (D-MAD)
The proposed multispectral D-MAD framework introduce a multispectral image captured as a trusted capture to acquire seven different spectral bands to detect morphing attacks.
arXiv Detail & Related papers (2023-04-07T07:03:00Z) - Restricted Black-box Adversarial Attack Against DeepFake Face Swapping [70.82017781235535]
We introduce a practical adversarial attack that does not require any queries to the facial image forgery model.
Our method is built on a substitute model persuing for face reconstruction and then transfers adversarial examples from the substitute model directly to inaccessible black-box DeepFake models.
arXiv Detail & Related papers (2022-04-26T14:36:06Z) - Robust Physical-World Attacks on Face Recognition [52.403564953848544]
Face recognition has been greatly facilitated by the development of deep neural networks (DNNs)
Recent studies have shown that DNNs are very vulnerable to adversarial examples, raising serious concerns on the security of real-world face recognition.
We study sticker-based physical attacks on face recognition for better understanding its adversarial robustness.
arXiv Detail & Related papers (2021-09-20T06:49:52Z) - Robust Face-Swap Detection Based on 3D Facial Shape Information [59.32489266682952]
Face-swap images and videos have attracted more and more malicious attackers to discredit some key figures.
Previous pixel-level artifacts based detection techniques always focus on some unclear patterns but ignore some available semantic clues.
We propose a biometric information based method to fully exploit the appearance and shape feature for face-swap detection of key figures.
arXiv Detail & Related papers (2021-04-28T09:35:48Z) - Vulnerability Analysis of Face Morphing Attacks from Landmarks and
Generative Adversarial Networks [0.8602553195689513]
This paper provides a new dataset with four different types of morphing attacks based on OpenCV, FaceMorpher, WebMorph and a generative adversarial network (StyleGAN)
We also conduct extensive experiments to assess the vulnerability of the state-of-the-art face recognition systems, notably FaceNet, VGG-Face, and ArcFace.
arXiv Detail & Related papers (2020-12-09T22:10:17Z) - Face Morphing Attack Generation & Detection: A Comprehensive Survey [12.936155415524937]
Face Recognition System (FRS) has received a great interest from the biometric community.
The goal of a morphing attack is to subvert the FRS at Automatic Border Control gates.
Malicious actor and accomplice can generate morphed face image and obtain e-passport.
arXiv Detail & Related papers (2020-11-03T22:36:27Z) - MixNet for Generalized Face Presentation Attack Detection [63.35297510471997]
We have proposed a deep learning-based network termed as textitMixNet to detect presentation attacks.
The proposed algorithm utilizes state-of-the-art convolutional neural network architectures and learns the feature mapping for each attack category.
arXiv Detail & Related papers (2020-10-25T23:01:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.