TetraLoss: Improving the Robustness of Face Recognition against Morphing Attacks (2401.11598v1)
Abstract: Face recognition systems are widely deployed in high-security applications such as for biometric verification at border controls. Despite their high accuracy on pristine data, it is well-known that digital manipulations, such as face morphing, pose a security threat to face recognition systems. Malicious actors can exploit the facilities offered by the identity document issuance process to obtain identity documents containing morphed images. Thus, subjects who contributed to the creation of the morphed image can with high probability use the identity document to bypass automated face recognition systems. In recent years, no-reference (i.e., single image) and differential morphing attack detectors have been proposed to tackle this risk. These systems are typically evaluated in isolation from the face recognition system that they have to operate jointly with and do not consider the face recognition process. Contrary to most existing works, we present a novel method for adapting deep learning-based face recognition systems to be more robust against face morphing attacks. To this end, we introduce TetraLoss, a novel loss function that learns to separate morphed face images from its contributing subjects in the embedding space while still preserving high biometric verification performance. In a comprehensive evaluation, we show that the proposed method can significantly enhance the original system while also significantly outperforming other tested baseline methods.
- A double siamese framework for differential morphing attack detection. Sensors, 21(10), 2021.
- Self-restrained triplet loss for accurate masked face recognition. Pattern Recognition, 124:108473, 2022.
- Differential morph face detection using discriminative wavelet sub-bands. In Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW), pages 1425–1434, 2021.
- Biometrics evaluation under spoofing attacks. IEEE Trans. on Information Forensics and Security, 9(12):2264–2276, 2014.
- MorDIFF: Recognition vulnerability and attack detectability of face morphing attacks created by diffusion autoencoders. In Intl. Workshop on Biometrics and Forensics (IWBF), pages 1–6, 2023.
- L. DeBruine and B. Jones. Face research lab london set. http://figshare.com/articles/dataset/Face_Research_Lab_London_Set/5047666/5. Last accessed: 2023-09-25.
- ArcFace: Additive angular margin loss for deep face recognition. In IEEE/CVF Conf. on Computer Vision and Pattern Recognition (CVPR), pages 4685–4694, 2019.
- European Council. Regulation 2019/1157 of the european parliament and of the council of 20 june 2019 on strengthening the security of identity cards of union citizens and of residence documents issued to union citizens, June 2019.
- The magic passport. In IEEE Intl. Joint Conf. on Biometrics (IJCB), pages 1–7, 2014.
- Face Recognition Across the Imaging Spectrum, chapter On the Effects of Image Alterations on Face Recognition Accuracy. Springer, 2016.
- Face demorphing. IEEE Trans. on Information Forensics and Security, 13(4):1008–1017, April 2018.
- Face demorphing in the presence of facial appearance variations. In European Signal Processing Conf. (EUSIPCO), pages 2365–2369, 2018.
- Decoupling texture blending and shape warping in face morphing. In Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), September 2019.
- Morphing attack potential. In Intl. Workshop on Biometrics and Forensics (IWBF), pages 1–6, 2022.
- Face Recognition Technology Evaluation (FRTE) Part 1: Verification. Technical report, National Institute of Standards and Technology, 09 2023.
- Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments. In Workshop on Faces in ’Real-Life’ Images: Detection, Alignment, and Recognition, 2008.
- Differential anomaly detection for facial images. In IEEE Intl. Workshop on Information Forensics and Security (WIFS), pages 1–6, 2021.
- Digital face manipulation in biometric systems. In Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Advances in Computer Vision and Pattern Recognition, pages 27–43. Springer Verlag, 2022.
- ISO/IEC JTC1 SC37 Biometrics. ISO/IEC 30107-3. Information Technology - Biometric presentation attack detection - Part 3: Testing and Reporting. International Organization for Standardization, 2023.
- Improving deep-learning-based face recognition to increase robustness against morphing attacks. In Intl. Conf. on Signal, Image Processing and Pattern Recognition SPPR, volume 10, 2020.
- AdaFace: Quality adaptive margin for face recognition. In Proc. of the IEEE/CVF Conf. on Computer Vision and Pattern Recognition, 2022.
- MagFace: A universal representation for face recognition and quality assessment. In IEEE/CVF Conf. on Computer Vision and Pattern Recognition (CVPR), pages 14220–14229, 2021.
- Face Recognition Vendor Test (FRVT) Part 4A: MORPH - Utility of 1:N Face Recognition Algorithms for Morph Detection. Technical report, National Institute of Standards and Technology, 06 2022.
- Face Recognition Vendor Test (FRVT) Part 4: MORPH - Performance of Automated Face Morph Detection. National Institute of Standards and Technology (NIST IR 8292), 06 2023.
- Psychophysical evaluation of human performance in detecting digital face image manipulations. IEEE Access, 10:31359–31376, January 2022.
- Overview of the face recognition grand challenge. In IEEE Computer Society Conf. on Computer Vision and Pattern Recognition (CVPR), volume 1, pages 947–954. IEEE, 2005.
- The FERET database and evaluation procedure for face-recognition algorithms. Image and Vision Computing, 16(5):295–306, 1998.
- R. Raghavendra and C. Busch. Presentation attack detection methods for face recognition systems: A comprehensive survey. ACM Comput. Surv., 50(1):1–37, 2017.
- Detecting morphed face images. In 2016 IEEE 8th Intl. Conf. on Biometrics: Theory, Applications and Systems (BTAS). IEEE, September 2016.
- Face morphing versus face averaging: Vulnerability and detection. In Proc. Intl. Joint Conf. on Biometrics (IJCB), 2017.
- Morphing attack detection-database, evaluation platform, and benchmarking. IEEE Trans. on Information Forensics and Security, 16:4336–4351, 2021.
- Crowd-powered face manipulation detection: Fusing human examiner decisions. In Intl. Conf. on Image Processing (ICIP), pages 181–185. IEEE, October 2022.
- Research and Development Unit. Best practice technical guidelines for automated border control (ABC) systems. Technical report, FRONTEX, 2015.
- Are GAN-based morphs threatening face recognition? In IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP), pages 2959–2963, 2022.
- Detecting morphed face images using facial landmarks. In Intl. Conf. on Image and Signal Processing (ICISP), 2018.
- Detection of face morphing attacks based on PRNU analysis. Trans. on Biometrics, Behavior, and Identity Science (TBIOM), 2019.
- Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting. In Intl. Conf. of the Biometrics Special Interest Group BIOSIG 2017, pages 1–7, 2017.
- On the vulnerability of face recognition systems towards morphed face attacks. In 5th Intl. Workshop on Biometrics and Forensics (IWBF), pages 1–6, 2017.
- Towards detection of morphed face images in electronic travel documents. In 13th IAPR Workshop on Document Analysis Systems (DAS), pages 1–6, 2018.
- Face recognition systems under morphing attacks: A survey. IEEE Access, 7:23012–23026, 2019.
- Deep face representations for differential morphing attack detection. IEEE Trans. on Information Forensics and Security, 2020.
- Facenet: A unified embedding for face recognition and clustering. In Conf. on Computer Vision and Pattern Recognition (CVPR), pages 815–823, 2015.
- Frontal to profile face verification in the wild. In IEEE Winter Conf. on Applications of Computer Vision (WACV), pages 1–9, 2016.
- On the importance of initialization and momentum in deep learning. In Proceedings of the 30th Int’l Conf. on Machine Learning, pages 1139–1147, 2013.
- Face morphing attack generation & detection: A comprehensive survey. IEEE Trans. on Technology and Society, September 2021.
- On the influence of ageing on face morph attacks: Vulnerability and detection. In Int’l Joint Conf. on Biometrics (IJCB), pages 1–10, 2020.
- Can GAN generated morphs threaten face recognition systems equally as landmark based morphs? - vulnerability and detection. In Intl. Workshop on Biometrics and Forensics (IWBF), pages 1–6, 2020.