Filters








32 Hits in 0.53 sec

FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image [article]

Fei Peng, Le-bing Zhang, Min Long
2019 arXiv   pre-print
Face morphing attack is proved to be a serious threat to the existing face recognition systems.  ...  Although a few face morphing detection methods have been put forward, the face morphing accomplice's facial restoration remains a challenging problem.  ...  with the latest face de-morphing method [17] in two scenarios (The demorphing parameter was selected as 0.3, which is recommended in [17] ).  ... 
arXiv:1811.07665v2 fatcat:unhv6spjy5h7dc6gph2q6jd3fu

Deep Face Representations for Differential Morphing Attack Detection [article]

Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Christoph Busch
2020 arXiv   pre-print
In addition, the application of deep face representations for differential morphing attack detection algorithms is investigated.  ...  The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection have been proposed in the scientific literature.  ...  The UBO-Morpher as well as the Demorphing implementation was kindly provided by the University of Bologna.  ... 
arXiv:2001.01202v2 fatcat:jfxltl3gpvffrjget6nt2vw7ba

Face Morphing Attack Generation & Detection: A Comprehensive Survey

Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
2021 IEEE Transactions on Technology and Society  
The vulnerability of face recognition systems (FRSs) to various kinds of attacks (both direct and indirect attacks) and face morphing attacks has received great interest from the biometric community.  ...  Face recognition has been successfully deployed in real-time applications, including secure applications such as border control.  ...  The use of the feature difference-based D-MAD technique shows better performance than face demorphing techniques.  ... 
doi:10.1109/tts.2021.3066254 fatcat:iyo5a6ofefewthz2kmiioocyg4

Preventing face morphing attacks by using legacy face images

Ilias Batskos, Florens F. Wit, Luuk J. Spreeuwers, Raymond J. Veldhuis
2021 IET Biometrics  
Depending on several factors, the submitted morphed face image can fool the issuing officer to issue a legitimate document.  ...  Countries allow citizens to upload a face image or provide printed copies to authorities to issue their passport. This allows prior image manipulation with criminal intent.  ...  Here we used a ratio of 40:60 as the demorphing parameter for both 30:70 and 50:50 cases and provided STASM landmarks [29] to the algorithm.  ... 
doi:10.1049/bme2.12047 fatcat:poklb3l7snfsxcryyb4uajcd6y

Deep Face Representations for Differential Morphing Attack Detection

Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Christoph Busch
2020 IEEE Transactions on Information Forensics and Security  
In addition, the application of deep face representations for differential MAD algorithms is investigated.  ...  images, corresponding unconstrained probe images, and morphed images created with four different face morphing tools.  ...  Finally, we evaluate the demorphing algorithm of [13] with a demorphing factor of 0.3 in combination with Dlib landmarks and the COTS face recognition algorithm used in Section III-F.  ... 
doi:10.1109/tifs.2020.2994750 fatcat:frckqodj4zcjzh7wwjpizidzaa

Face Morphing Attack Generation Detection: A Comprehensive Survey [article]

Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
2020 arXiv   pre-print
The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community.  ...  An e-passport with a morphed face images can be used by both the malicious actor and the accomplice to cross the border as the morphed face image can be verified against both of them.  ...  : The face demorphing techniques inverts the morphing procedure and reveals the component images that are used to generate the morphed image.  ... 
arXiv:2011.02045v1 fatcat:why3ebhmcfezdckv443t7grddi

Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance [article]

Jag Mohan Singh, Raghavendra Ramachandra, Kiran B. Raja, Christoph Busch
2019 arXiv   pre-print
Face recognition is widely employed in Automated Border Control (ABC) gates, which verify the face image on passport or electronic Machine Readable Travel Document (eMTRD) against the captured image to  ...  The proposed method decomposes the bona fide image captured from the ABC gate and the digital face image extracted from the eMRTD into the diffuse reconstructed image and a quantized normal map.  ...  However, in a practical scenario, the warping functions, and alpha value are unknown, so the authors obtain warping functions by face alignment, and prescribe α = 0.45 for best quality demorphing.  ... 
arXiv:1912.01372v1 fatcat:zbpa4sbxdvbazelac7yu3alvpu

Facial feature extraction techniques for face detection: A review

Moumita Roy, Madhura Datta
2014 JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES  
The researches in the area of face detection have made significant progress in the past few decades.  ...  The main challenge in this stage of face detection is to find a suitable effective method for finding facial features.  ...  Most of the feature extraction algorithms are based on illumination and pose variations [17] , [20] , [21] , [22] , [23] , demorphable models [19] , and geometrical models [18] .  ... 
doi:10.26782/jmcms.2014.01.00008 fatcat:be5e2ltvmvedjhgb5uvijm5rxe

Differential Morphed Face Detection Using Deep Siamese Networks [article]

Sobhan Soleymani, Baaria Chaudhary, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi
2020 arXiv   pre-print
Of these, reverting of a face morph or face demorphing [11] [12] has provided encouraging results.  ...  Algorithm Method Database Face Demorphing Image MorphDB, Table 2 : 2 The performance of the proposed framework on VISAPP17.  ... 
arXiv:2012.01541v2 fatcat:rjpjoqhxuncpjcaegdassa7a2y

Morphing Attack Detection – Database, Evaluation Platform and Benchmarking [article]

Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron (+9 others)
2020 arXiv   pre-print
Morphing attacks have posed a severe threat to Face Recognition System (FRS).  ...  Face demorphing The idea of Face Demorphing (FaDe) [15] involves inverting the morphing process in a reverse engineered manner.  ...  [15] also introduced a printed-scanned database for MAD, specifically to study the demorphing approach where the authors subtract the re-digitized images to detect a face morphing attack.  ... 
arXiv:2006.06458v3 fatcat:x5yasb2qwzccnbavzdo3civsyu

Conditional Identity Disentanglement for Differential Face Morph Detection [article]

Sudipta Banerjee, Arun Ross
2021 arXiv   pre-print
We present the task of differential face morph attack detection using a conditional generative network (cGAN).  ...  We performed experiments on AMSL face morph, MorGAN, and EMorGAN datasets to demonstrate the effectiveness of the proposed method.  ...  Demorphing also tries to uncover the identity of the second subject. Later, GAN-based de-morphing has been proposed in the literature [18] .  ... 
arXiv:2107.02162v1 fatcat:wk46xcw2tjdlfpbgnoajegefau

Differential Morph Face Detection using Discriminative Wavelet Sub-bands [article]

Baaria Chaudhary, Poorya Aghdaie, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi
2021 arXiv   pre-print
In this paper, we propose a morph attack detection algorithm that leverages an undecimated 2D Discrete Wavelet Transform (DWT) for identifying morphed face images.  ...  Face recognition systems are extremely vulnerable to morphing attacks, in which a morphed facial reference image can be successfully verified as two or more distinct identities.  ...  Face demorphing has provided some encouraging results [13] [14] . In simplistic terms, the demorphing algorithm subtracts the potential morph image from the trusted image.  ... 
arXiv:2106.13178v1 fatcat:wivxxuu4n5djjfkhc554a73k4a

Face morphing detection in the presence of printing/scanning and heterogeneous image sources [article]

Matteo Ferrara, Annalisa Franco, Davide Maltoni
2019 arXiv   pre-print
Face morphing represents nowadays a big security threat in the context of electronic identity documents as well as an interesting challenge for researchers in the field of face recognition.  ...  proposed to train Deep Neural Networks for morphing detection: in particular generation of simulated printed-scanned images together with other data augmentation strategies and pre-training on large face  ...  To this purpose, a valuable contribution comes from NIST with the Face Recognition Vendor Test (FRVT) MORPH competition [52] , to which we plan to submit our algorithm in the near future.  ... 
arXiv:1901.08811v1 fatcat:sechcrbabfhojjpqn4h5xnchhq

Detecting Morphed Face Images Using Facial Landmarks [chapter]

Ulrich Scherhag, Dhanesh Budhrani, Marta Gomez-Barrero, Christoph Busch
2018 Lecture Notes in Computer Science  
In particular, face recognition systems have been recently shown to be vulnerable to attacks carried out with morphed face images.  ...  Such synthetic images can be defined as the fusion of the face images of two (or more) different subjects.  ...  [10] proposed face demorphing for morph detection employing a trusted live capture in addition to the questioned sample. Scherhag et al.  ... 
doi:10.1007/978-3-319-94211-7_48 fatcat:a6x5equjmvg6zf2r2h3obepa3y

Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks [article]

Clemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert
2018 arXiv   pre-print
A morphing attack is an attack on a biometric facial recognition system where the system is fooled to match two different individuals with the same synthetic face image.  ...  [9] went even further and proposed a demorphing method, which is capable of extracting one genuine face of a morphing attack, if an image the other face is known.  ...  Table 1 . 1 Face image sources.  ... 
arXiv:1806.04265v1 fatcat:p3p3ndxyy5cohexzlluccdxsbi
« Previous Showing results 1 — 15 out of 32 results