Facial Demorphing via Identity Preserving Image Decomposition
- URL: http://arxiv.org/abs/2408.10993v1
- Date: Tue, 20 Aug 2024 16:42:11 GMT
- Title: Facial Demorphing via Identity Preserving Image Decomposition
- Authors: Nitish Shukla, Arun Ross,
- Abstract summary: morph attack detection techniques do not extract information about the underlying bonafides used to create them.
We propose a novel method that is reference-free and recovers the bonafides with high accuracy.
Our method is observed to reconstruct high-quality bonafides in terms of definition and fidelity.
- Score: 10.902536447343465
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: A face morph is created by combining the face images usually pertaining to two distinct identities. The goal is to generate an image that can be matched with two identities thereby undermining the security of a face recognition system. To deal with this problem, several morph attack detection techniques have been developed. But these methods do not extract any information about the underlying bonafides used to create them. Demorphing addresses this limitation. However, current demorphing techniques are mostly reference-based, i.e, they need an image of one of the identities to recover the other. In this work, we treat demorphing as an ill-posed decomposition problem. We propose a novel method that is reference-free and recovers the bonafides with high accuracy. Our method decomposes the morph into several identity-preserving feature components. A merger network then weighs and combines these components to recover the bonafides. Our method is observed to reconstruct high-quality bonafides in terms of definition and fidelity. Experiments on the CASIA-WebFace, SMDD and AMSL datasets demonstrate the effectiveness of our method.
Related papers
- dc-GAN: Dual-Conditioned GAN for Face Demorphing From a Single Morph [10.902536447343465]
We propose dc-GAN, a novel GAN-based demorphing method conditioned on the morph images.
Our method overcomes morph-replication and produces high quality reconstructions of the bonafide images used to create the morphs.
arXiv Detail & Related papers (2024-11-20T19:24:30Z) - LADIMO: Face Morph Generation through Biometric Template Inversion with Latent Diffusion [5.602947425285195]
Face morphing attacks pose a severe security threat to face recognition systems.
We present a representation-level face morphing approach, namely LADIMO, that performs morphing on two face recognition embeddings.
We show that each face morph variant has an individual attack success rate, enabling us to maximize the morph attack potential.
arXiv Detail & Related papers (2024-10-10T14:41:37Z) - StableIdentity: Inserting Anybody into Anywhere at First Sight [57.99693188913382]
We propose StableIdentity, which allows identity-consistent recontextualization with just one face image.
We are the first to directly inject the identity learned from a single image into video/3D generation without finetuning.
arXiv Detail & Related papers (2024-01-29T09:06:15Z) - Effective Adapter for Face Recognition in the Wild [72.75516495170199]
We tackle the challenge of face recognition in the wild, where images often suffer from low quality and real-world distortions.
Traditional approaches-either training models directly on degraded images or their enhanced counterparts using face restoration techniques-have proven ineffective.
We propose an effective adapter for augmenting existing face recognition models trained on high-quality facial datasets.
arXiv Detail & Related papers (2023-12-04T08:55:46Z) - SDeMorph: Towards Better Facial De-morphing from Single Morph [0.0]
Face Recognition Systems (FRS) are vulnerable to morph attacks.
Current Morph Attack Detection (MAD) can detect the morph but are unable to recover the identities used to create the morph.
We propose SDeMorph, a novel de-morphing method that is reference-free and recovers the identities of bona fides.
arXiv Detail & Related papers (2023-08-22T13:46:12Z) - Attribute-preserving Face Dataset Anonymization via Latent Code
Optimization [64.4569739006591]
We present a task-agnostic anonymization procedure that directly optimize the images' latent representation in the latent space of a pre-trained GAN.
We demonstrate through a series of experiments that our method is capable of anonymizing the identity of the images whilst -- crucially -- better-preserving the facial attributes.
arXiv Detail & Related papers (2023-03-20T17:34:05Z) - MorphGANFormer: Transformer-based Face Morphing and De-Morphing [55.211984079735196]
StyleGAN-based approaches to face morphing are among the leading techniques.
We propose a transformer-based alternative to face morphing and demonstrate its superiority to StyleGAN-based methods.
arXiv Detail & Related papers (2023-02-18T19:09:11Z) - Facial De-morphing: Extracting Component Faces from a Single Morph [12.346914707006773]
morph attack detection strategies can detect morphs but cannot recover the images or identities used in creating them.
We propose a novel de-morphing method that can recover images of both identities simultaneously from a single morphed face image.
arXiv Detail & Related papers (2022-09-07T05:01:02Z) - Adversarially Perturbed Wavelet-based Morphed Face Generation [16.98806338782858]
Morphed images can fool Facial Recognition Systems into falsely accepting multiple people.
As morphed image synthesis becomes easier, it is vital to expand the research community's available data.
We leverage both methods to generate high-quality adversarially perturbed from the FERET, FRGC, and FRLL datasets.
arXiv Detail & Related papers (2021-11-03T01:18:29Z) - DVG-Face: Dual Variational Generation for Heterogeneous Face Recognition [85.94331736287765]
We formulate HFR as a dual generation problem, and tackle it via a novel Dual Variational Generation (DVG-Face) framework.
We integrate abundant identity information of large-scale visible data into the joint distribution.
Massive new diverse paired heterogeneous images with the same identity can be generated from noises.
arXiv Detail & Related papers (2020-09-20T09:48:24Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.