Multispectral Imaging for Differential Face Morphing Attack Detection: A
Preliminary Study
- URL: http://arxiv.org/abs/2304.03510v3
- Date: Wed, 25 Oct 2023 17:26:16 GMT
- Title: Multispectral Imaging for Differential Face Morphing Attack Detection: A
Preliminary Study
- Authors: Raghavendra Ramachandra, Sushma Venkatesh, Naser Damer, Narayan
Vetrekar, Rajendra Gad
- Abstract summary: This paper presents a multispectral framework for differential morphing-attack detection (D-MAD)
The proposed multispectral D-MAD framework introduce a multispectral image captured as a trusted capture to acquire seven different spectral bands to detect morphing attacks.
- Score: 7.681417534211941
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Face morphing attack detection is emerging as an increasingly challenging
problem owing to advancements in high-quality and realistic morphing attack
generation. Reliable detection of morphing attacks is essential because these
attacks are targeted for border control applications. This paper presents a
multispectral framework for differential morphing-attack detection (D-MAD). The
D-MAD methods are based on using two facial images that are captured from the
ePassport (also called the reference image) and the trusted device (for
example, Automatic Border Control (ABC) gates) to detect whether the face image
presented in ePassport is morphed. The proposed multispectral D-MAD framework
introduce a multispectral image captured as a trusted capture to acquire seven
different spectral bands to detect morphing attacks. Extensive experiments were
conducted on the newly created Multispectral Morphed Datasets (MSMD) with 143
unique data subjects that were captured using both visible and multispectral
cameras in multiple sessions. The results indicate the superior performance of
the proposed multispectral framework compared to visible images.
Related papers
- Dealing with Subject Similarity in Differential Morphing Attack Detection [4.3659108218579545]
We focus on Differential MAD (D-MAD), where a trusted live capture, usually representing the criminal, is compared with the document image to classify it as morphed or bona fide.
We show these approaches based on identity features are effective when the morphed image and the live one are sufficiently diverse.
We propose ACIdA, a modular D-MAD system, consisting of a module for the attempt type classification, and two modules for the identity and artifacts analysis on input images.
arXiv Detail & Related papers (2024-04-11T12:00:06Z) - SHIELD : An Evaluation Benchmark for Face Spoofing and Forgery Detection
with Multimodal Large Language Models [63.946809247201905]
We introduce a new benchmark, namely SHIELD, to evaluate the ability of MLLMs on face spoofing and forgery detection.
We design true/false and multiple-choice questions to evaluate multimodal face data in these two face security tasks.
The results indicate that MLLMs hold substantial potential in the face security domain.
arXiv Detail & Related papers (2024-02-06T17:31:36Z) - COMICS: End-to-end Bi-grained Contrastive Learning for Multi-face Forgery Detection [56.7599217711363]
Face forgery recognition methods can only process one face at a time.
Most face forgery recognition methods can only process one face at a time.
We propose COMICS, an end-to-end framework for multi-face forgery detection.
arXiv Detail & Related papers (2023-08-03T03:37:13Z) - MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential
Deepfake Detection [81.59191603867586]
Sequential deepfake detection aims to identify forged facial regions with the correct sequence for recovery.
The recovery of forged images requires knowledge of the manipulation model to implement inverse transformations.
We propose Multi-Collaboration and Multi-Supervision Network (MMNet) that handles various spatial scales and sequential permutations in forged face images.
arXiv Detail & Related papers (2023-07-06T02:32:08Z) - Mask and Restore: Blind Backdoor Defense at Test Time with Masked
Autoencoder [57.739693628523]
We propose a framework for blind backdoor defense with Masked AutoEncoder (BDMAE)
BDMAE detects possible triggers in the token space using image structural similarity and label consistency between the test image and MAE restorations.
Our approach is blind to the model restorations, trigger patterns and image benignity.
arXiv Detail & Related papers (2023-03-27T19:23:33Z) - MorDIFF: Recognition Vulnerability and Attack Detectability of Face
Morphing Attacks Created by Diffusion Autoencoders [10.663919597506055]
Face morphing attacks are created on the image-level or on the representation-level.
Recent advances in the diffusion autoencoder models have overcome the GAN limitations, leading to high reconstruction fidelity.
This work investigates using diffusion autoencoders to create face morphing attacks by comparing them to a wide range of image-level and representation-level morphs.
arXiv Detail & Related papers (2023-02-03T16:37:38Z) - Reliable Face Morphing Attack Detection in On-The-Fly Border Control
Scenario with Variation in Image Resolution and Capture Distance [3.6833521970861685]
Face morphing attacks are highly potential in deceiving automatic FRS and human observers.
We present a novel Differential-MAD (D-MAD) algorithm based on the spherical distances and hierarchical fusion of deep features.
Experiments are carried out on the newly generated face morphing dataset (SCFace-Morph) based on the publicly available SCFace dataset.
arXiv Detail & Related papers (2022-09-30T13:58:43Z) - Exploring Frequency Adversarial Attacks for Face Forgery Detection [59.10415109589605]
We propose a frequency adversarial attack method against face forgery detectors.
Inspired by the idea of meta-learning, we also propose a hybrid adversarial attack that performs attacks in both the spatial and frequency domains.
arXiv Detail & Related papers (2022-03-29T15:34:13Z) - PW-MAD: Pixel-wise Supervision for Generalized Face Morphing Attack
Detection [6.24950085812444]
A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based on identity verification, such as border checks.
Different methods have been proposed to detect face morphing attacks, however, with low generalizability to unexpected post-morphing processes.
A major post-morphing process is the print and scan operation performed in many countries when issuing a passport or identity document.
arXiv Detail & Related papers (2021-08-23T17:04:51Z) - M2TR: Multi-modal Multi-scale Transformers for Deepfake Detection [74.19291916812921]
forged images generated by Deepfake techniques pose a serious threat to the trustworthiness of digital information.
In this paper, we aim to capture the subtle manipulation artifacts at different scales for Deepfake detection.
We introduce a high-quality Deepfake dataset, SR-DF, which consists of 4,000 DeepFake videos generated by state-of-the-art face swapping and facial reenactment methods.
arXiv Detail & Related papers (2021-04-20T05:43:44Z) - Deep Models and Shortwave Infrared Information to Detect Face
Presentation Attacks [6.684752451476642]
Face presentation attack detection is performed using recent models based on Convolutional Neural Networks.
Experiments have been carried on a new public and freely available database, containing a wide variety of attacks.
arXiv Detail & Related papers (2020-07-22T14:41:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.