Hierarchical Generative Network for Face Morphing Attacks (2403.11101v1)
Abstract: Face morphing attacks circumvent face recognition systems (FRSs) by creating a morphed image that contains multiple identities. However, existing face morphing attack methods either sacrifice image quality or compromise the identity preservation capability. Consequently, these attacks fail to bypass FRSs verification well while still managing to deceive human observers. These methods typically rely on global information from contributing images, ignoring the detailed information from effective facial regions. To address the above issues, we propose a novel morphing attack method to improve the quality of morphed images and better preserve the contributing identities. Our proposed method leverages the hierarchical generative network to capture both local detailed and global consistency information. Additionally, a mask-guided image blending module is dedicated to removing artifacts from areas outside the face to improve the image's visual quality. The proposed attack method is compared to state-of-the-art methods on three public datasets in terms of FRSs' vulnerability, attack detectability, and image quality. The results show our method's potential threat of deceiving FRSs while being capable of passing multiple morphing attack detection (MAD) scenarios.
- Z. Blasingame and C. Liu. Diffusion models for stronger face morphing attacks. arXiv preprint arXiv:2301.04218, 2023.
- Automated artifact retouching in morphed images with attention maps. IEEE Access, 9:136561–136579, 2021.
- Elasticface: Elastic margin loss for deep face recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 1578–1587, 2022.
- A review of human face forgery and forgery-detection technologies. Journal of Image and Graphics, 27(4):1023–1038, 2022.
- Rethinking atrous convolution for semantic image segmentation. arXiv preprint arXiv:1706.05587, 2017.
- Simswap: An efficient framework for high fidelity face swapping. In Proceedings of the 28th ACM International Conference on Multimedia, pages 2003–2011, 2020.
- Realistic dreams: Cascaded enhancement of gan-generated images with an example in face morphing attacks. In 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS), pages 1–10. IEEE, 2019.
- Mordiff: Recognition vulnerability and attack detectability of face morphing attacks created by diffusion autoencoders. arXiv preprint arXiv:2302.01843, 2023.
- Regenmorph: Visibly realistic gan generated face morphing attacks by attack re-generation. In Advances in Visual Computing: 16th International Symposium, ISVC 2021, Virtual Event, October 4-6, 2021, Proceedings, Part I, pages 251–264. Springer, 2021.
- Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pages 1–10, 2018.
- L. DeBruine and B. Jones. Face research lab london set, 2017.
- Arcface: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 4690–4699, 2019.
- Optimal-landmark-guided image blending for face morphing attacks. In 2023 IEEE International Joint Conference on Biometrics (IJCB), pages 1–9. IEEE, 2023.
- Curricularface: adaptive curriculum learning loss for deep face recognition. In proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 5901–5910, 2020.
- Syn-mad 2022: Competition on face morphing attack detection based on privacy-aware synthetic training data. In 2022 IEEE International Joint Conference on Biometrics (IJCB), pages 1–10. IEEE, 2022.
- Image-to-image translation with conditional adversarial networks. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1125–1134, 2017.
- Face morphing attack detection using privacy-aware training data. arXiv preprint arXiv:2207.00899, 2022.
- A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 4401–4410, 2019.
- Modnet: Real-time trimap-free portrait matting via objective decomposition. In Proceedings of the AAAI Conference on Artificial Intelligence, pages 1140–1147, 2022.
- Are gans created equal? a large-scale study. Advances in neural information processing systems, 31, 2018.
- S. Mallick. Opencv-based morph. https://learnopencv.com, 2016.
- The magic passport. In IEEE International Joint Conference on Biometrics (IJCB’14), pages 1–7, 2014.
- High resolution face editing with masked gan latent code optimization. arXiv preprint arXiv:2103.11135, 2021.
- Overview of the face recognition grand challenge. In 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR’05), volume 1, pages 947–954. IEEE, 2005.
- The feret database and evaluation procedure for face-recognition algorithms. Image and vision computing, 16(5):295–306, 1998.
- T. Porter and T. Duff. Compositing digital images. In Proceedings of the 11th annual conference on Computer graphics and interactive techniques, pages 253–259, 1984.
- Low visual distortion and robust morphing attacks based on partial face image manipulation. IEEE Transactions on Biometrics, Behavior, and Identity Science, 3(1):72–88, 2020.
- A. Quek. Facemorpher. http://www.facemorpher.com, 2019.
- Face morphing versus face averaging: Vulnerability and detection. In 2017 IEEE International Joint Conference on Biometrics (IJCB), pages 555–563. IEEE, 2017.
- Vulnerability analysis of face morphing attacks from landmarks and generative adversarial networks. arXiv preprint arXiv:2012.05344, 2020.
- Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting. In 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), pages 1–7. IEEE, 2017.
- Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 815–823, 2015.
- M. Seitzer. “pytorch-fid: Fid score for pytorch,” version 0.2.1. https://github.com/mseitzer/pytorch-fid, 2020.
- Face morphing attack generation and detection: A comprehensive survey. IEEE transactions on technology and society, 2(3):128–145, 2021.
- Can gan generated morphs threaten face recognition systems equally as landmark based morphs? – vulnerability and detection, 2020.
- High-resolution image synthesis and semantic manipulation with conditional gans. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 8798–8807, 2018.
- Apdrawinggan: Generating artistic portrait drawings from face photos with hierarchical gans. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 10743–10752, 2019.
- Mipgan—generating strong and high quality morphing attacks using identity prior driven gan. IEEE Transactions on Biometrics, Behavior, and Identity Science, 3(3):365–383, 2021.
- Joint face detection and alignment using multitask cascaded convolutional networks. IEEE signal processing letters, 23(10):1499–1503, 2016.
- Morphganformer: Transformer-based face morphing and de-morphing. arXiv preprint arXiv:2302.09404, 2023.