Generalized Single-Image-Based Morphing Attack Detection Using Deep Representations from Vision Transformer
- URL: http://arxiv.org/abs/2501.09817v1
- Date: Thu, 16 Jan 2025 20:09:19 GMT
- Title: Generalized Single-Image-Based Morphing Attack Detection Using Deep Representations from Vision Transformer
- Authors: Haoyu Zhang, Raghavendra Ramachandra, Kiran Raja, Christoph Busch,
- Abstract summary: Face morphing attacks have posed severe threats to Face Recognition Systems (FRS), which are operated in border control and passport issuance use cases.
We propose a generalized single-image-based MAD (S-MAD) algorithm by learning the encoding from Vision Transformer (ViT) architecture.
Experiments are carried out on face morphing datasets generated using publicly available FRGC face datasets.
- Score: 13.21801650767302
- License:
- Abstract: Face morphing attacks have posed severe threats to Face Recognition Systems (FRS), which are operated in border control and passport issuance use cases. Correspondingly, morphing attack detection algorithms (MAD) are needed to defend against such attacks. MAD approaches must be robust enough to handle unknown attacks in an open-set scenario where attacks can originate from various morphing generation algorithms, post-processing and the diversity of printers/scanners. The problem of generalization is further pronounced when the detection has to be made on a single suspected image. In this paper, we propose a generalized single-image-based MAD (S-MAD) algorithm by learning the encoding from Vision Transformer (ViT) architecture. Compared to CNN-based architectures, ViT model has the advantage on integrating local and global information and hence can be suitable to detect the morphing traces widely distributed among the face region. Extensive experiments are carried out on face morphing datasets generated using publicly available FRGC face datasets. Several state-of-the-art (SOTA) MAD algorithms, including representative ones that have been publicly evaluated, have been selected and benchmarked with our ViT-based approach. Obtained results demonstrate the improved detection performance of the proposed S-MAD method on inter-dataset testing (when different data is used for training and testing) and comparable performance on intra-dataset testing (when the same data is used for training and testing) experimental protocol.
Related papers
- Open-Set Deepfake Detection: A Parameter-Efficient Adaptation Method with Forgery Style Mixture [58.60915132222421]
We introduce an approach that is both general and parameter-efficient for face forgery detection.
We design a forgery-style mixture formulation that augments the diversity of forgery source domains.
We show that the designed model achieves state-of-the-art generalizability with significantly reduced trainable parameters.
arXiv Detail & Related papers (2024-08-23T01:53:36Z) - GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning [50.7702397913573]
The rapid advancement of photorealistic generators has reached a critical juncture where the discrepancy between authentic and manipulated images is increasingly indistinguishable.
Although there have been a number of publicly available face forgery datasets, the forgery faces are mostly generated using GAN-based synthesis technology.
We propose a large-scale, diverse, and fine-grained high-fidelity dataset, namely GenFace, to facilitate the advancement of deepfake detection.
arXiv Detail & Related papers (2024-02-03T03:13:50Z) - Towards General Visual-Linguistic Face Forgery Detection [95.73987327101143]
Deepfakes are realistic face manipulations that can pose serious threats to security, privacy, and trust.
Existing methods mostly treat this task as binary classification, which uses digital labels or mask signals to train the detection model.
We propose a novel paradigm named Visual-Linguistic Face Forgery Detection(VLFFD), which uses fine-grained sentence-level prompts as the annotation.
arXiv Detail & Related papers (2023-07-31T10:22:33Z) - Multispectral Imaging for Differential Face Morphing Attack Detection: A
Preliminary Study [7.681417534211941]
This paper presents a multispectral framework for differential morphing-attack detection (D-MAD)
The proposed multispectral D-MAD framework introduce a multispectral image captured as a trusted capture to acquire seven different spectral bands to detect morphing attacks.
arXiv Detail & Related papers (2023-04-07T07:03:00Z) - Reliable Face Morphing Attack Detection in On-The-Fly Border Control
Scenario with Variation in Image Resolution and Capture Distance [3.6833521970861685]
Face morphing attacks are highly potential in deceiving automatic FRS and human observers.
We present a novel Differential-MAD (D-MAD) algorithm based on the spherical distances and hierarchical fusion of deep features.
Experiments are carried out on the newly generated face morphing dataset (SCFace-Morph) based on the publicly available SCFace dataset.
arXiv Detail & Related papers (2022-09-30T13:58:43Z) - Federated Test-Time Adaptive Face Presentation Attack Detection with
Dual-Phase Privacy Preservation [100.69458267888962]
Face presentation attack detection (fPAD) plays a critical role in the modern face recognition pipeline.
Due to legal and privacy issues, training data (real face images and spoof images) are not allowed to be directly shared between different data sources.
We propose a Federated Test-Time Adaptive Face Presentation Attack Detection with Dual-Phase Privacy Preservation framework.
arXiv Detail & Related papers (2021-10-25T02:51:05Z) - Asymmetric Modality Translation For Face Presentation Attack Detection [55.09300842243827]
Face presentation attack detection (PAD) is an essential measure to protect face recognition systems from being spoofed by malicious users.
We propose a novel framework based on asymmetric modality translation forPAD in bi-modality scenarios.
Our method achieves state-of-the-art performance under different evaluation protocols.
arXiv Detail & Related papers (2021-10-18T08:59:09Z) - PW-MAD: Pixel-wise Supervision for Generalized Face Morphing Attack
Detection [6.24950085812444]
A face morphing attack image can be verified to multiple identities, making this attack a major vulnerability to processes based on identity verification, such as border checks.
Different methods have been proposed to detect face morphing attacks, however, with low generalizability to unexpected post-morphing processes.
A major post-morphing process is the print and scan operation performed in many countries when issuing a passport or identity document.
arXiv Detail & Related papers (2021-08-23T17:04:51Z) - MixNet for Generalized Face Presentation Attack Detection [63.35297510471997]
We have proposed a deep learning-based network termed as textitMixNet to detect presentation attacks.
The proposed algorithm utilizes state-of-the-art convolutional neural network architectures and learns the feature mapping for each attack category.
arXiv Detail & Related papers (2020-10-25T23:01:13Z) - Determining Sequence of Image Processing Technique (IPT) to Detect
Adversarial Attacks [4.431353523758957]
We propose an evolutionary approach to automatically determine Image Processing Techniques Sequence (IPTS) for detecting malicious inputs.
A detection framework based on a genetic algorithm (GA) is developed to find the optimal IPTS.
A set of IPTS selected dynamically in testing time which works as a filter for the adversarial attack.
arXiv Detail & Related papers (2020-07-01T08:59:14Z) - Morphing Attack Detection -- Database, Evaluation Platform and
Benchmarking [16.77282920396874]
Morphing attacks have posed a severe threat to Face Recognition System (FRS)
Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to age, gender, ethnicity that are inadequately addressed.
In this work, we present a new sequestered dataset for facilitating the advancements of MAD.
arXiv Detail & Related papers (2020-06-11T14:11:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.