Fused Classification For Differential Face Morphing Detection
- URL: http://arxiv.org/abs/2309.00665v1
- Date: Fri, 1 Sep 2023 16:14:29 GMT
- Title: Fused Classification For Differential Face Morphing Detection
- Authors: Iurii Medvedev, Joana Pimenta, Nuno Gon\c{c}alves
- Abstract summary: Face morphing, a presentation attack technique, poses significant security risks to face recognition systems.
Traditional methods struggle to detect morphing attacks, which involve blending multiple face images.
We propose an extended approach based on fused classification method for no-reference scenario.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Face morphing, a sophisticated presentation attack technique, poses
significant security risks to face recognition systems. Traditional methods
struggle to detect morphing attacks, which involve blending multiple face
images to create a synthetic image that can match different individuals. In
this paper, we focus on the differential detection of face morphing and propose
an extended approach based on fused classification method for no-reference
scenario. We introduce a public face morphing detection benchmark for the
differential scenario and utilize a specific data mining technique to enhance
the performance of our approach. Experimental results demonstrate the
effectiveness of our method in detecting morphing attacks.
Related papers
- DeepFidelity: Perceptual Forgery Fidelity Assessment for Deepfake
Detection [67.3143177137102]
Deepfake detection refers to detecting artificially generated or edited faces in images or videos.
We propose a novel Deepfake detection framework named DeepFidelity to adaptively distinguish real and fake faces.
arXiv Detail & Related papers (2023-12-07T07:19:45Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - Impact of Image Context for Single Deep Learning Face Morphing Attack
Detection [0.0]
Face recognition systems (FRSs) have become prevalent, but they are still vulnerable to image manipulation techniques such as face morphing attacks.
This study investigates the impact of the alignment settings of input images on deep learning face morphing detection performance.
arXiv Detail & Related papers (2023-09-01T15:57:24Z) - COMICS: End-to-end Bi-grained Contrastive Learning for Multi-face Forgery Detection [56.7599217711363]
Face forgery recognition methods can only process one face at a time.
Most face forgery recognition methods can only process one face at a time.
We propose COMICS, an end-to-end framework for multi-face forgery detection.
arXiv Detail & Related papers (2023-08-03T03:37:13Z) - Face Morphing Attack Detection with Denoising Diffusion Probabilistic
Models [0.0]
Morphed face images can be used to impersonate someone's identity for various malicious purposes.
Existing MAD techniques rely on discriminative models that learn from examples of bona fide and morphed images.
We propose a novel, diffusion-based MAD method that learns only from the characteristics of bona fide images.
arXiv Detail & Related papers (2023-06-27T18:19:45Z) - Face Feature Visualisation of Single Morphing Attack Detection [13.680968065638108]
This paper proposes an explainable visualisation of different face feature extraction algorithms.
It enables the detection of bona fide and morphing images for single morphing attack detection.
The visualisation may help to develop a Graphical User Interface for border policies.
arXiv Detail & Related papers (2023-04-25T17:51:23Z) - MorphGANFormer: Transformer-based Face Morphing and De-Morphing [55.211984079735196]
StyleGAN-based approaches to face morphing are among the leading techniques.
We propose a transformer-based alternative to face morphing and demonstrate its superiority to StyleGAN-based methods.
arXiv Detail & Related papers (2023-02-18T19:09:11Z) - MorDeephy: Face Morphing Detection Via Fused Classification [0.0]
We introduce a novel deep learning strategy for a single image face morphing detection.
It is directed onto learning the deep facial features, which carry information about the authenticity of these features.
Our method, which we call MorDeephy, achieved the state of the art performance and demonstrated a prominent ability for generalising the task of morphing detection to unseen scenarios.
arXiv Detail & Related papers (2022-08-05T11:39:22Z) - Face Morphing Attack Detection Using Privacy-Aware Training Data [0.991629944808926]
Images of morphed faces pose a serious threat to face recognition--based security systems.
Modern detection algorithms learn to identify such morphing attacks using authentic images of real individuals.
This approach raises various privacy concerns and limits the amount of publicly available training data.
arXiv Detail & Related papers (2022-07-02T19:00:48Z) - Restricted Black-box Adversarial Attack Against DeepFake Face Swapping [70.82017781235535]
We introduce a practical adversarial attack that does not require any queries to the facial image forgery model.
Our method is built on a substitute model persuing for face reconstruction and then transfers adversarial examples from the substitute model directly to inaccessible black-box DeepFake models.
arXiv Detail & Related papers (2022-04-26T14:36:06Z) - Robust Face-Swap Detection Based on 3D Facial Shape Information [59.32489266682952]
Face-swap images and videos have attracted more and more malicious attackers to discredit some key figures.
Previous pixel-level artifacts based detection techniques always focus on some unclear patterns but ignore some available semantic clues.
We propose a biometric information based method to fully exploit the appearance and shape feature for face-swap detection of key figures.
arXiv Detail & Related papers (2021-04-28T09:35:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.