Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and
Identical Twins
- URL: http://arxiv.org/abs/2303.14004v1
- Date: Fri, 24 Mar 2023 13:59:48 GMT
- Title: Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and
Identical Twins
- Authors: Raghavendra Ramachandra, Sushma Venkatesh, Gaurav Jaswal, Guoqiang Li
- Abstract summary: This work investigates lookalike and identical twins as the source of face morphing generation.
We present a systematic study on benchmarking the vulnerability of Face Recognition Systems to lookalike and identical twin morphing images.
Experiments are designed to provide insights into the impact of vulnerability with normal face morphing compared with lookalike and identical twin face morphing.
- Score: 5.418573094563416
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Face morphing attacks have emerged as a potential threat, particularly in
automatic border control scenarios. Morphing attacks permit more than one
individual to use travel documents that can be used to cross borders using
automatic border control gates. The potential for morphing attacks depends on
the selection of data subjects (accomplice and malicious actors). This work
investigates lookalike and identical twins as the source of face morphing
generation. We present a systematic study on benchmarking the vulnerability of
Face Recognition Systems (FRS) to lookalike and identical twin morphing images.
Therefore, we constructed new face morphing datasets using 16 pairs of
identical twin and lookalike data subjects. Morphing images from lookalike and
identical twins are generated using a landmark-based method. Extensive
experiments are carried out to benchmark the attack potential of lookalike and
identical twins. Furthermore, experiments are designed to provide insights into
the impact of vulnerability with normal face morphing compared with lookalike
and identical twin face morphing.
Related papers
- Unified Physical-Digital Face Attack Detection [66.14645299430157]
Face Recognition (FR) systems can suffer from physical (i.e., print photo) and digital (i.e., DeepFake) attacks.
Previous related work rarely considers both situations at the same time.
We propose a Unified Attack Detection framework based on Vision-Language Models (VLMs)
arXiv Detail & Related papers (2024-01-31T09:38:44Z) - Effective Adapter for Face Recognition in the Wild [72.75516495170199]
We tackle the challenge of face recognition in the wild, where images often suffer from low quality and real-world distortions.
Traditional approaches-either training models directly on degraded images or their enhanced counterparts using face restoration techniques-have proven ineffective.
We propose an effective adapter for augmenting existing face recognition models trained on high-quality facial datasets.
arXiv Detail & Related papers (2023-12-04T08:55:46Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - COMICS: End-to-end Bi-grained Contrastive Learning for Multi-face Forgery Detection [56.7599217711363]
Face forgery recognition methods can only process one face at a time.
Most face forgery recognition methods can only process one face at a time.
We propose COMICS, an end-to-end framework for multi-face forgery detection.
arXiv Detail & Related papers (2023-08-03T03:37:13Z) - Towards minimizing efforts for Morphing Attacks -- Deep embeddings for morphing pair selection and improved Morphing Attack Detection [4.349201388722244]
Face embeddings serve two purposes: pre-selecting images for large-scale Morphing Attack generation and detecting potential Morphing Attacks.
We employ an pre-selection algorithm that pairs individuals based on face embedding similarity.
We compare embeddings from two state-of-the-art face recognition systems in terms of their ability to detect Morphing Attacks.
arXiv Detail & Related papers (2023-05-29T17:00:40Z) - MorphGANFormer: Transformer-based Face Morphing and De-Morphing [55.211984079735196]
StyleGAN-based approaches to face morphing are among the leading techniques.
We propose a transformer-based alternative to face morphing and demonstrate its superiority to StyleGAN-based methods.
arXiv Detail & Related papers (2023-02-18T19:09:11Z) - Leveraging Diffusion For Strong and High Quality Face Morphing Attacks [2.0795007613453445]
Face morphing attacks seek to deceive a Face Recognition (FR) system by presenting a morphed image consisting of the biometric qualities from two different identities.
We present a novel morphing attack that uses a Diffusion-based architecture to improve the visual fidelity of the image.
arXiv Detail & Related papers (2023-01-10T21:50:26Z) - Facial De-morphing: Extracting Component Faces from a Single Morph [12.346914707006773]
morph attack detection strategies can detect morphs but cannot recover the images or identities used in creating them.
We propose a novel de-morphing method that can recover images of both identities simultaneously from a single morphed face image.
arXiv Detail & Related papers (2022-09-07T05:01:02Z) - Are GAN-based Morphs Threatening Face Recognition? [3.0921354926071274]
This paper bridges the gap by providing datasets and the corresponding code for four types of morphing attacks.
We also conduct extensive experiments to assess the vulnerability of four state-of-the-art face recognition systems.
arXiv Detail & Related papers (2022-05-05T08:19:47Z) - Differential Morphed Face Detection Using Deep Siamese Networks [23.632874831725665]
We propose a novel differential morph attack detection framework using a deep Siamese network.
To the best of our knowledge, this is the first research work that makes use of a Siamese network architecture for morph attack detection.
arXiv Detail & Related papers (2020-12-02T21:30:11Z) - Unsupervised Landmark Learning from Unpaired Data [117.81440795184587]
Recent attempts for unsupervised landmark learning leverage synthesized image pairs that are similar in appearance but different in poses.
We propose a cross-image cycle consistency framework which applies the swapping-reconstruction strategy twice to obtain the final supervision.
Our proposed framework is shown to outperform strong baselines by a large margin.
arXiv Detail & Related papers (2020-06-29T13:57:20Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.