3D Face Morphing Attacks: Generation, Vulnerability and Detection (2201.03454v3)
Abstract: Face Recognition systems (FRS) have been found to be vulnerable to morphing attacks, where the morphed face image is generated by blending the face images from contributory data subjects. This work presents a novel direction for generating face-morphing attacks in 3D. To this extent, we introduced a novel approach based on blending 3D face point clouds corresponding to contributory data subjects. The proposed method generates 3D face morphing by projecting the input 3D face point clouds onto depth maps and 2D color images, followed by image blending and wrapping operations performed independently on the color images and depth maps. We then back-projected the 2D morphing color map and the depth map to the point cloud using the canonical (fixed) view. Given that the generated 3D face morphing models will result in holes owing to a single canonical view, we have proposed a new algorithm for hole filling that will result in a high-quality 3D face morphing model. Extensive experiments were conducted on the newly generated 3D face dataset comprising 675 3D scans corresponding to 41 unique data subjects and a publicly available database (Facescape) with 100 data subjects. Experiments were performed to benchmark the vulnerability of the {proposed 3D morph-generation scheme against} automatic 2D, 3D FRS, and human observer analysis. We also presented a quantitative assessment of the quality of the generated 3D face-morphing models using eight different quality metrics. Finally, we propose three different 3D face Morphing Attack Detection (3D-MAD) algorithms to benchmark the performance of 3D face morphing attack detection techniques.
- F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recognition and clustering,” in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 815–823.
- J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “Arcface: Additive angular margin loss for deep face recognition,” in 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2019, pp. 4685–4694.
- M. Ferrara, A. Franco, and D. Maltoni, “The magic passport,” in IEEE International Joint Conference on Biometrics. IEEE, 2014, pp. 1–7.
- R. Raghavendra, K. B. Raja, and C. Busch, “Detecting morphed face images,” in 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), 2016, pp. 1–7.
- M. Ferrara, A. Franco, and D. Maltoni, “Face demorphing,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 4, pp. 1008–1017, 2017.
- H. Zhang, S. Venkatesh, R. Ramachandra, K. Raja, N. Damer, and C. Busch, “Mipgan—generating strong and high quality morphing attacks using identity prior driven gan,” IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 3, no. 3, pp. 365–383, 2021.
- U. Scherhag, A. Nautsch, C. Rathgeb, M. Gomez-Barrero, R. N. Veldhuis, L. Spreeuwers, M. Schils, D. Maltoni, P. Grother, S. Marcel et al., “Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting,” in 2017 International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE, 2017, pp. 1–7.
- R. Raghavendra, K. Raja, S. Venkatesh, and C. Busch, “Face morphing versus face averaging: Vulnerability and detection,” in 2017 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2017, pp. 555–563.
- N. Damer, A. M. Saladie, A. Braun, and A. Kuijper, “Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network,” in 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2018, pp. 1–10.
- S. Venkatesh, H. Zhang, R. Ramachandra, K. Raja, N. Damer, and C. Busch, “Can gan generated morphs threaten face recognition systems equally as landmark based morphs?-vulnerability and detection,” in 2020 8th International Workshop on Biometrics and Forensics (IWBF). IEEE, 2020, pp. 1–6.
- S. Venkatesh, R. Ramachandra, K. Raja, and C. Busch, “Face morphing attack generation & detection: A comprehensive survey,” IEEE Transactions on Technology and Society, 2021.
- M. Ngan, P. Grother, K. Hanaoka, and J. Kuo, “Part 4: Morph - performance of automated face morph detection,” https://pages.nist.gov/frvt/reports/morph/frvt_morph_report.pdf, 2021, [Online; accessed 16-October-2021].
- A. A. Deeb, “Uae reviews features of new id card, 3d photo included,” https://www.gulftoday.ae/news/2021/08/05/uae-reviews-features-of-new-id-card-3d-photo-included, 2020, [Online; accessed 16-October-2021].
- IDEMIA, “Stereo laser image,” https://www.idemia.com/wp-content/uploads/2021/02/stereo-laser-image-idemia-brochure-202007.pdf, 2020, [Online; accessed 18-October-2021].
- J. W. J. ter Hennepe, “3d photo id,” https://www.icao.int/Meetings/AMC/MRTD-SEMINAR-2010-AFRICA/Documentation/11_Morpho-3DPhotoID.pdf, 2010, [Online; accessed 16-October-2021].
- D. Face Based ABC Systems, “3d face enrolment for id cards,” http://cubox.aero/cubox/php/en_product01-2.php?product=1/, 2021, [Online; accessed 18-October-2021].
- S. Dent, “Using a 3d render as a french id card ’photo’,” https://engt.co/3EiPnQv, 2017, [Online; accessed 16-October-2021].
- ICAO, “Machine readable travel documents. part 11: Security mechanisms for mrtds. technical report doc 9303,” 2021.
- ISO/IEC JTC1 SC37 Biometrics, “ISO/IEC 39794-5:2019 information technology — extensible biometric data interchange formats — part 5: Face image data,” 2019.
- “Apple Face ID,” https://en.wikipedia.org/wiki/Face_ID, 2017.
- S. P. Vardam, “Vulnerability of 3d face recognition systems of morphing attacks,” August 2021. [Online]. Available: http://essay.utwente.nl/88470/
- V. Blanz and T. Vetter, “A morphable model for the synthesis of 3d faces,” in Proceedings of the 26th annual conference on Computer graphics and interactive techniques, 1999, pp. 187–194.
- B. Egger, W. A. Smith, A. Tewari, S. Wuhrer, M. Zollhoefer, T. Beeler, F. Bernard, T. Bolkart, A. Kortylewski, S. Romdhani et al., “3d morphable face models—past, present, and future,” ACM Transactions on Graphics (TOG), vol. 39, no. 5, pp. 1–38, 2020.
- Y. Yao, B. Deng, W. Xu, and J. Zhang, “Quasi-newton solver for robust non-rigid registration,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2020.
- H. Li, R. W. Sumner, and M. Pauly, “Global Correspondence Optimization for Non-Rigid Registration of Depth Scans,” Computer Graphics Forum, 2008.
- N. Gelfand, N. J. Mitra, L. J. Guibas, and H. Pottmann, “Robust global registration,” in Symposium on Geometry Processing, 2005, pp. 197–206.
- P. J. Besl and N. D. McKay, “Method for registration of 3-d shapes,” in Sensor fusion IV: control paradigms and data structures, vol. 1611. International Society for Optics and Photonics, 1992, pp. 586–606.
- B. Deng, Y. Yao, R. M. Dyke, and J. Zhang, “A survey of non-rigid 3d registration,” arXiv preprint arXiv:2203.07858, 2022.
- M. Liao, Q. Zhang, H. Wang, R. Yang, and M. Gong, “Modeling deformable objects from a single depth camera,” in 2009 IEEE 12th International Conference on Computer Vision, 2009, pp. 167–174.
- J. Yang, D. Guo, K. Li, Z. Wu, and Y.-K. Lai, “Global 3d non-rigid registration of deformable objects using a single rgb-d camera,” IEEE Transactions on Image Processing, vol. 28, no. 10, pp. 4746–4761, 2019.
- H. Li, R. W. Sumner, and M. Pauly, “Global correspondence optimization for non-rigid registration of depth scans,” in Computer graphics forum, vol. 27, no. 5. Wiley Online Library, 2008, pp. 1421–1430.
- K. Zampogiannis, C. Fermüller, and Y. Aloimonos, “Topology-aware non-rigid point cloud registration,” CoRR, vol. abs/1811.07014, 2018. [Online]. Available: http://arxiv.org/abs/1811.07014
- A. Myronenko and X. Song, “Point set registration: Coherent point drift,” IEEE transactions on pattern analysis and machine intelligence, vol. 32, no. 12, pp. 2262–2275, 2010.
- G. Trappolini, L. Cosmo, L. Moschella, R. Marin, S. Melzi, and E. Rodolà, “Shape registration in the time of transformers,” Advances in Neural Information Processing Systems, vol. 34, 2021.
- Y. Zeng, Y. Qian, Z. Zhu, J. Hou, H. Yuan, and Y. He, “Corrnet3d: unsupervised end-to-end learning of dense correspondence for 3d point clouds,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021, pp. 6052–6061.
- “Artec eva sensor,” https://bit.ly/3BiGnJ1, 2021, [Online; accessed 16-October-2021].
- P. Cignoni, M. Callieri, M. Corsini, M. Dellepiane, F. Ganovelli, and G. Ranzuglia, “MeshLab: an Open-Source Mesh Processing Tool,” in Eurographics Italian Chapter Conference, V. Scarano, R. D. Chiara, and U. Erra, Eds. The Eurographics Association, 2008.
- B. Gärtner, “Fast and robust smallest enclosing balls,” in European symposium on algorithms. Springer, 1999, pp. 325–338.
- D. Haehnel, S. Thrun, and W. Burgard, “An extension of the icp algorithm for modeling nonrigid objects with mobile robots,” in IJCAI, vol. 3, 2003, pp. 915–920.
- M. Kazhdan and H. Hoppe, “Screened poisson surface reconstruction,” ACM Trans. Graph., vol. 32, no. 3, jul 2013. [Online]. Available: https://doi.org/10.1145/2487228.2487237
- G. Guennebaud and M. Gross, “Algebraic point set surfaces,” ACM Trans. Graph., vol. 26, no. 3, p. 23–es, Jul. 2007. [Online]. Available: https://doi.org/10.1145/1276377.1276406
- A. C. Öztireli, G. Guennebaud, and M. Gross, “Feature preserving point set surfaces based on non-linear kernel regression,” in Computer graphics forum, vol. 28, no. 2. Wiley Online Library, 2009, pp. 493–501.
- D. E. King, “Dlib-ml: A machine learning toolkit,” Journal of Machine Learning Research, vol. 10, pp. 1755–1758, 2009.
- A. Telea, “An image inpainting technique based on the fast marching method,” Journal of graphics tools, vol. 9, no. 1, pp. 23–34, 2004.
- E. Rublee, V. Rabaud, K. Konolige, and G. Bradski, “Orb: An efficient alternative to sift or surf,” in 2011 International Conference on Computer Vision, 2011, pp. 2564–2571.
- Y. Zeng, Y. Qian, Z. Zhu, J. Hou, H. Yuan, and Y. He, “Corrnet3d: Unsupervised end-to-end learning of dense correspondence for 3d point clouds,” in 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021, pp. 6048–6057.
- T. Li, T. Bolkart, M. J. Black, H. Li, and J. Romero, “Learning a model of facial shape and expression from 4D scans,” ACM Transactions on Graphics, (Proc. SIGGRAPH Asia), vol. 36, no. 6, pp. 194:1–194:17, 2017. [Online]. Available: https://doi.org/10.1145/3130800.3130813
- U. Scherhag, A. Nautsch, C. Rathgeb, M. Gomez-Barrero, R. N. J. Veldhuis, L. Spreeuwers, M. Schils, D. Maltoni, P. Grother, S. Marcel, R. Breithaupt, R. Ramachandra, and C. Busch, “Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting,” in 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), 2017, pp. 1–7.
- S. Venkatesh, H. Zhang, R. Ramachandra, K. Raja, N. Damer, and C. Busch, “Can gan generated morphs threaten face recognition systems equally as landmark based morphs? - vulnerability and detection,” in 2020 8th International Workshop on Biometrics and Forensics (IWBF), 2020, pp. 1–6.
- C. R. Qi, L. Yi, H. Su, and L. J. Guibas, “Pointnet++: Deep hierarchical feature learning on point sets in a metric space,” arXiv preprint arXiv:1706.02413, 2017.
- G. Mu, D. Huang, G. Hu, J. Sun, and Y. Wang, “Led3d: A lightweight and efficient deep approach to recognizing low-quality 3d faces,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2019.
- P. Phillips, P. Flynn, T. Scruggs, K. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek, “Overview of the face recognition grand challenge,” in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1, 2005, pp. 947–954 vol. 1.
- L. Yin, X. Wei, Y. Sun, J. Wang, and M. J. Rosato, “A 3d facial expression database for facial behavior research,” in 7th international conference on automatic face and gesture recognition (FGR06). IEEE, 2006, pp. 211–216.
- T. Maurer, D. Guigonis, I. Maslov, B. Pesenti, A. Tsaregorodtsev, D. West, and G. Medioni, “Performance of geometrix activeid^ tm 3d face recognition engine on the frgc data,” in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05)-Workshops. IEEE, 2005, pp. 154–154.
- H. Yang, H. Zhu, Y. Wang, M. Huang, Q. Shen, R. Yang, and X. Cao, “Facescape: A large-scale high quality 3d face dataset and detailed riggable 3d face prediction,” in IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2020.
- FRONTEX, “Best practice technical guidelines for automated border control abc systems,” 2015.
- Z. Zhang, “No-reference quality assessment for 3d colored point cloud and mesh models,” arXiv preprint arXiv:2107.02041, 2021.
- C. R. Qi, L. Yi, H. Su, and L. J. Guibas, “Pointnet++: Deep hierarchical feature learning on point sets in a metric space,” 2017. [Online]. Available: https://arxiv.org/abs/1706.02413
- A. Goyal, H. Law, B. Liu, A. Newell, and J. Deng, “Revisiting point cloud shape classification with a simple and effective baseline,” International Conference on Machine Learning, 2021.
- Z. Wu, S. Song, A. Khosla, X. Tang, and J. Xiao, “3d shapenets for 2.5d object recognition and next-best-view prediction,” CoRR, vol. abs/1406.5670, 2014. [Online]. Available: http://arxiv.org/abs/1406.5670
- ISO/IEC JTC1 SC37 Biometrics, “ISO/IEC IS 30107-3. information technology - biometric presentation attack detection - part 3: Testing and reporting,” 2017.