Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
157 tokens/sec
GPT-4o
43 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Quadruplet Loss For Improving the Robustness to Face Morphing Attacks (2402.14665v1)

Published 22 Feb 2024 in cs.CV

Abstract: Recent advancements in deep learning have revolutionized technology and security measures, necessitating robust identification methods. Biometric approaches, leveraging personalized characteristics, offer a promising solution. However, Face Recognition Systems are vulnerable to sophisticated attacks, notably face morphing techniques, enabling the creation of fraudulent documents. In this study, we introduce a novel quadruplet loss function for increasing the robustness of face recognition systems against morphing attacks. Our approach involves specific sampling of face image quadruplets, combined with face morphs, for network training. Experimental results demonstrate the efficiency of our strategy in improving the robustness of face recognition networks against morphing attacks.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (44)
  1. M. Torkar, “Morphing cases in slovenia,” NIST IFPS, 2022, ministry of the Interior Police, Slovenia.
  2. M. Ferrara, A. Franco, and D. Maltoni, “The magic passport,” IJCB 2014 - 2014 IEEE/IAPR, 12 2014.
  3. Biometric System Laboratory, “UBO-Morpher,” 2018, http://biolab.csr.unibo.it/Research.asp. (accessed: September 1, 2022).
  4. N. Damer, A. M. Saladié, A. Braun, and A. Kuijper, “MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network,” in 2018 IEEE 9th International Conference on BTAS, 2018, pp. 1–10.
  5. S. K. Venkatesh, H. Zhang, R. Ramachandra, K. B. Raja, N. Damer, and C. Busch, “Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? - Vulnerability and Detection,” 2020 8th IWBF, pp. 1–6, 2020.
  6. H. Zhang, S. Venkatesh, R. Ramachandra, K. Raja, N. Damer, and C. Busch, “MIPGAN - Generating Robust and High Quality Morph Attacks Using Identity Prior Driven GAN,” ArXiv, vol. abs/2009.01729, 2020.
  7. N. Damer, M. Fang, P. Siebke, J. N. Kolf, M. Huber, and F. Boutros, “Mordiff: Recognition vulnerability and attack detectability of face morphing attacks created by diffusion autoencoders,” 2023. [Online]. Available: https://arxiv.org/abs/2302.01843
  8. M. Ferrara, A. Franco, and D. Maltoni, “Face morphing detection in the presence of printing/scanning and heterogeneous image sources,” ArXiv, vol. abs/1901.08811, 2019.
  9. S. Lorenz, U. Scherhag, C. Rathgeb, and C. Busch., “Morphing attack detection: A fusion approach,” in IEEE Fusion, 2021.
  10. I. Medvedev, F. Shadmand, and N. Gonçalves, “Mordeephy: Face morphing detection via fused classification,” in Proceedings of ICPRAM.   SciTePress, 2023, pp. 193–204.
  11. P. C. Neto, T. Gonçalves, M. Huber, N. Damer, A. F. Sequeira, and J. S. Cardoso, “Orthomad: Morphing attack detection through orthogonal identity disentanglement,” in 2022 International Conference of the Biometrics Special Interest Group (BIOSIG), 2022, pp. 1–5.
  12. U. Scherhag, A. Nautsch, C. Rathgeb, M. Gomez-Barrero, R. Veldhuis, L. Spreeuwers, M. Schils, D. Maltoni, P. Grother, S. Marcel, R. Breithaupt, R. Ramachandra, and C. Busch, “Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting,” in 2017 International Conference of the Biometrics Special Interest Group, BIOSIG 2017.   Germany: Gesellschaft für Informatik, 9 2017.
  13. NIST, “NIST FRVT MORPH,” 2022, https://pages.nist.gov/frvt/html/frvt_morph.html.
  14. R. T. Marriott, S. Romdhani, S. Gentric, and L. Chen, “Robustness of facial recognition to gan-based face-morphing attacks,” ArXiv, vol. abs/2012.10548, 2020. [Online]. Available: https://api.semanticscholar.org/CorpusID:229339565
  15. O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. B., A. C. Berg, and L. Fei-Fei, “ImageNet Large Scale Visual Recognition Challenge,” IJCV, vol. 115, no. 3, pp. 211–252, 2015.
  16. Y. Sun, X. Wang, and X. Tang, “Deeply learned face representations are sparse, selective, and robust,” 2015 IEEE Conference on CVPR, pp. 2892–2900, 2015.
  17. Y. Wen, K. Zhang, Z. Li, and Y. Qiao, “A Discriminative Feature Learning Approach for Deep Face Recognition,” in Computer Vision – ECCV 2016, 2016, pp. 499–515.
  18. W. Liu, Y. Wen, Z. Yu, M. Li, B. Raj, and L. Song, “SphereFace: Deep Hypersphere Embedding for Face Recognition,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017, pp. 6738–6746.
  19. H. Wang, Y. Wang, Z. Zhou, X. Ji, D. Gong, J. Zhou, Z. Li, and W. Liu, “CosFace: Large Margin Cosine Loss for Deep Face Recognition,” in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2018, pp. 5265–5274.
  20. J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “ArcFace: Additive Angular Margin Loss for Deep Face Recognition,” in 2019 Conference on CVPR, 2019, pp. 4685–4694.
  21. F. Wang, J. Cheng, W. Liu, and H. Liu, “Additive Margin Softmax for Face Verification,” IEEE Signal Processing Letters, vol. 25, no. 7, pp. 926–930, 2018.
  22. J. Sun, W. Yang, J. Xue, and Q. Liao, “An Equalized Margin Loss for Face Recognition,” IEEE Transactions on Multimedia, pp. 1–1, 2020.
  23. D. Zeng, H. Shi, H. Du, J. Wang, Z. Lei, and T. Mei, “NPCFace: A Negative-Positive Cooperation Supervision for Training Large-scale Face Recognition,” CoRR, vol. abs/2007.10172, 2020. [Online]. Available: https://arxiv.org/abs/2007.10172
  24. Y. Shi and A. Jain, “Probabilistic Face Embeddings,” in 2019 IEEE/CVF International Conference on Computer Vision (ICCV), 2019, pp. 6901–6910.
  25. Q. Meng, S. Zhao, Z. Huang, and F. Zhou, “Magface: A universal representation for face recognition and quality assessment,” in 2021 IEEE/CVF Conference on CVPR, 2021, pp. 14 220–14 229.
  26. J. Tremoço, I. Medvedev, and N. Gonçalves, “QualFace: Adapting Deep Learning Face Recognition for ID and Travel Documents with Quality Assessment,” in 2021 International Conference of the BIOSIG, 2021, pp. 1–6.
  27. I. Medvedev, J. Tremoço, B. Mano, L. E. Santo, and N. Gonçalves, “Towards understanding the character of quality sampling in deep learning face recognition,” IET Biometrics, vol. 11, no. 5, pp. 498–511, 2022. [Online]. Available: https://ietresearch.onlinelibrary.wiley.com/doi/abs/10.1049/bme2.12095
  28. S. Chopra, R. Hadsell, and Y. LeCun, “Learning a similarity metric discriminatively, with application to face verification,” 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1, pp. 539–546 vol. 1, 2005.
  29. A. Mishchuk, D. Mishkin, F. Radenović, and J. Matas, “Working hard to know your neighbor’s margins: local descriptor learning loss,” in Proceedings of the 31st International Conference on Neural Information Processing Systems, ser. NIPS’17.   Red Hook, NY, USA: Curran Associates Inc., 2017, p. 4829–4840.
  30. H. V. Nguyen and L. Bai, “Cosine similarity metric learning for face verification,” in Asian Conference on Computer Vision, 2010. [Online]. Available: https://api.semanticscholar.org/CorpusID:18453384
  31. J. Hu, J. Lu, and Y.-P. Tan, “Discriminative deep metric learning for face verification in the wild,” 2014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1875–1882, 2014. [Online]. Available: https://api.semanticscholar.org/CorpusID:3217198
  32. F. Schroff, D. Kalenichenko, and J. Philbin, “FaceNet: A unified embedding for face recognition and clustering,” in 2015 IEEE Conference CVPR, 2015, pp. 815–823.
  33. Y. Shi and A. K. Jain, “DocFace: Matching ID Document Photos to Selfies*,” in 2018 IEEE 9th International Conference on BTAS, 2018, pp. 1–8.
  34. Y. Song and F. Wang, “Coreface: Sample-guided contrastive regularization for deep face recognition,” 2023.
  35. H. Yang, X. Chu, L. Zhang, Y. Sun, D. Li, and S. J. Maybank, “Quadnet: Quadruplet loss for multi-view learning in baggage re-identification,” Pattern Recognition, vol. 126, p. 108546, 2022. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0031320322000279
  36. H. Proença, E. Yaghoubi, and P. Alirezazadeh, “A quadruplet loss for enforcing semantically coherent embeddings in multi-output classification problems,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 800–811, 2021.
  37. W. Chen, X. Chen, J. Zhang, and K. Huang, “Beyond triplet loss: A deep quadruplet network for person re-identification,” 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1320–1329, 2017. [Online]. Available: https://api.semanticscholar.org/CorpusID:14795862
  38. S. Yang, K. Fu, X. Yang, Y. Lin, J. Zhang, and C. Peng, “Learning domain-invariant discriminative features for heterogeneous face recognition,” IEEE Access, vol. 8, pp. 209 790–209 801, 2020.
  39. X. Dong, J. Shen, D. Wu, K. Guo, X. Jin, and F. M. Porikli, “Quadruplet network with one-shot learning for fast visual object tracking,” IEEE Transactions on Image Processing, vol. 28, pp. 3516–3527, 2017. [Online]. Available: https://api.semanticscholar.org/CorpusID:3972862
  40. Q. Cao, L. Shen, W. Xie, O. M. Parkhi, and A. Zisserman, “Vggface2: A dataset for recognising faces across pose and age,” in International Conference on FG, 2018.
  41. International Organization for Standardization, “ISO/IEC 30107–3:2017. Information Technology—Biometric Presentation Attack Detection — Part 3: Testing and Reporting,” ISO/IEC JTC 1/SC 37 Biometrics, p. 33, 09 2017.
  42. C. Guerra, J. Marcos, and N. Gonçalves, “Automatic validation of ICAO compliance regarding head coverings: An inclusive approach concerning religious circumstances,” in International Conference of the Biometrics Special Interest Group, BIOSIG 2023, Darmstadt, Germany, September 20-22, 2023, N. Damer, M. Gomez-Barrero, K. B. Raja, C. Rathgeb, A. F. Sequeira, M. Todisco, and A. Uhl, Eds.   IEEE, 2023, pp. 1–4. [Online]. Available: https://doi.org/10.1109/BIOSIG58226.2023.10345995
  43. E. V. C. L. Borges, I. L. P. Andrezza, J. R. T. Marques, R. A. T. Mota, and J. J. B. Primo, “Analysis of the Eyes on Face Images for Compliance with ISO/ICAO Requirements,” in 2016 29th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), 2016, pp. 173–179.
  44. T. Karras, S. Laine, and T. Aila, “A Style-Based Generator Architecture for Generative Adversarial Networks,” in 2019 IEEE/CVF Conference on CVPR, 2019, pp. 4396–4405.
Citations (1)

Summary

We haven't generated a summary for this paper yet.