The Impact of Print-Scanning in Heterogeneous Morph Evaluation Scenarios (2404.06559v2)
Abstract: Face morphing attacks pose an increasing threat to face recognition (FR) systems. A morphed photo contains biometric information from two different subjects to take advantage of vulnerabilities in FRs. These systems are particularly susceptible to attacks when the morphs are subjected to print-scanning to mask the artifacts generated during the morphing process. We investigate the impact of print-scanning on morphing attack detection through a series of evaluations on heterogeneous morphing attack scenarios. Our experiments show that we can increase the Mated Morph Presentation Match Rate (MMPMR) by up to 8.48%. Furthermore, when a Single-image Morphing Attack Detection (S-MAD) algorithm is not trained to detect print-scanned morphs the Morphing Attack Classification Error Rate (MACER) can increase by up to 96.12%, indicating significant vulnerability.
- R. Raghavendra, K. B. Raja, S. Venkatesh, and C. Busch, “Transferable deep-cnn features for detecting digital and print-scanned morphed face images,” in IEEE Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW), 2017, pp. 1822–1830.
- Z. Blasingame and C. Liu, “Leveraging adversarial learning for the detection of morphing attacks,” 2021 IEEE International Joint Conference on Biometrics (IJCB), pp. 1–8, 2021.
- E. Sarkar, P. Korshunov, L. Colbois, and S. Marcel, “Are gan-based morphs threatening face recognition?” in ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, pp. 2959–2963.
- L. Colbois and S. Marcel, “On the detection of morphing attacks generated by gans,” in 2022 International Conference of the Biometrics Special Interest Group (BIOSIG), 2022, pp. 1–5.
- R. Raghavendra, K. B. Raja, and C. Busch, “Detecting morphed face images,” in IEEE 8th Int’l Conf. on Biometrics Theory, Applications and Systems (BTAS), 2016, pp. 1–7.
- U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt, and C. Busch, “Face recognition systems under morphing attacks: A survey,” IEEE Access, vol. 7, pp. 23 012–23 026, 2019.
- F. Peng, L.-B. Zhang, and M. Long, “Fd-gan: Face de-morphing generative adversarial network for restoring accomplice’s facial image,” IEEE Access, vol. 7, pp. 75 122–75 131, 2019.
- M. Hamza, S. Tehsin, M. Humayun, M. F. Almufareh, and M. Alfayad, “A comprehensive review of face morph generation and detection of fraudulent identities,” Applied Sciences, vol. 12, no. 24, 2022. [Online]. Available: https://www.mdpi.com/2076-3417/12/24/12545
- Z. W. Blasingame and C. Liu, “Leveraging diffusion for strong and high quality face morphing attacks,” IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 6, no. 1, pp. 118–131, 2024.
- H. Zhang, S. Venkatesh, R. Ramachandra, K. Raja, N. Damer, and C. Busch, “Mipgan – generating strong and high quality morphing attacks using identity prior driven gan,” 2021.
- ——, “Mipgan—generating strong and high quality morphing attacks using identity prior driven gan,” IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 3, no. 3, pp. 365–383, 2021.
- M. Ngan, P. Grother, K. Hanaoka, and J. Kuo, “Face recognition vendor test (frvt) part 4: Morph - performance of automated face morph detection,” 2020-03-06 2020.
- M. Ferrara, A. Franco, and D. Maltoni, “Face morphing detection in the presence of printing/scanning and heterogeneous image sources,” IET Biometrics, Feb 2021. [Online]. Available: http://dx.doi.org/10.1049/bme2.12021
- F. Boutros, N. Damer, F. Kirchbuchner, and A. Kuijper, “Elasticface: Elastic margin loss for deep face recognition,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, June 2022, pp. 1578–1587.
- M. Kim, A. K. Jain, and X. Liu, “Adaface: Quality adaptive margin for face recognition,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022.
- J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “Arcface: Additive angular margin loss for deep face recognition,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 4690–4699.
- X. An, X. Zhu, Y. Gao, Y. Xiao, Y. Zhao, Z. Feng, L. Wu, B. Qin, M. Zhang, D. Zhang, and Y. Fu, “Partial fc: Training 10 million identities on a single machine,” in 2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW), 2021, pp. 1445–1449.
- P. Phillips, P. Flynn, T. Scruggs, K. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek, “Overview of the face recognition grand challenge,” in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1, 2005, pp. 947–954 vol. 1.
- L. DeBruine and B. Jones, “Face Research Lab London Set,” 5 2017. [Online]. Available: https://figshare.com/articles/dataset/Face_Research_Lab_London_Set/5047666
- P. Phillips, H. Wechsler, J. Huang, and P. J. Rauss, “The feret database and evaluation procedure for face-recognition algorithms,” Image Vis. Comput., vol. 16, pp. 295–306, 1998.
- T. Karras, S. Laine, M. Aittala, J. Hellsten, J. Lehtinen, and T. Aila, “Analyzing and improving the image quality of stylegan,” in 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020, pp. 8107–8116.
- P. Dhariwal and A. Nichol, “Diffusion models beat gans on image synthesis,” in Advances in Neural Information Processing Systems, M. Ranzato, A. Beygelzimer, Y. Dauphin, P. Liang, and J. W. Vaughan, Eds., vol. 34. Curran Associates, Inc., 2021, pp. 8780–8794. [Online]. Available: https://proceedings.neurips.cc/paper/2021/file/49ad23d1ec9fa4bd8d77d02681df5cfa-Paper.pdf
- K. Preechakul, N. Chatthee, S. Wizadwongsa, and S. Suwajanakorn, “Diffusion autoencoders: Toward a meaningful and decodable representation,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2022, pp. 10 619–10 629.
- U. Scherhag, A. Nautsch, C. Rathgeb, M. Gomez-Barrero, R. N. J. Veldhuis, L. Spreeuwers, M. Schils, D. Maltoni, P. Grother, S. Marcel, R. Breithaupt, R. Ramachandra, and C. Busch, “Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting,” in 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), 2017, pp. 1–7.
- M. Ferrara, A. Franco, D. Maltoni, and C. Busch, “Morphing attack potential,” in 2022 International Workshop on Biometrics and Forensics (IWBF), 2022, pp. 1–6.
- M. Lucic, K. Kurach, M. Michalski, O. Bousquet, and S. Gelly, “Are gans created equal? a large-scale study,” in Proceedings of the 32nd International Conference on Neural Information Processing Systems, ser. NIPS’18. Red Hook, NY, USA: Curran Associates Inc., 2018, p. 698–707.
- M. Seitzer, “pytorch-fid: FID Score for PyTorch,” https://github.com/mseitzer/pytorch-fid, August 2020, version 0.2.1.
- Z. W. Blasingame and C. Liu, “Fast-dim: Towards fast diffusion morphs,” 2024.
- I. Batskos, L. Spreeuwers, and R. Veldhuis, “Visualizing landmark-based face morphing traces on digital images,” Frontiers in Computer Science, vol. 5, 2023. [Online]. Available: https://www.frontiersin.org/articles/10.3389/fcomp.2023.981933/full
- Richard E. Neddo (2 papers)
- Zander W. Blasingame (7 papers)
- Chen Liu (206 papers)