424 Hits in 3.9 sec

Morphing Attack Detection – Database, Evaluation Platform and Benchmarking [article]

Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron (+9 others)
2020 arXiv   pre-print
Further, we present a new online evaluation platform to test algorithms on sequestered data. With the platform we can benchmark the morph detection performance and study the generalization ability.  ...  Morphing Attack Detection (MAD) algorithms often are prone to generalization challenges as they are database dependent.  ...  The database is accessible through the FVConGoing platform [40] to allow third parties for evaluation and benchmarking. • An unbiased and independent evaluation of 5 state of the art MAD algorithms against  ... 
arXiv:2006.06458v3 fatcat:x5yasb2qwzccnbavzdo3civsyu

Face Morphing Attack Generation Detection: A Comprehensive Survey [article]

Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
2020 arXiv   pre-print
Detection (MAD) algorithms based on a stringent taxonomy and finally the availability of public databases, which allow to benchmark new MAD algorithms in a reproducible manner.  ...  The outcomes of competitions/benchmarking, vulnerability assessments and performance evaluation metrics are also provided in a comprehensive manner.  ...  Bologna-SOTAMD: Differential Morph Attack Detection The Bologna-SOTAMD benchmark was opened for evaluation in 2019 and provided a common evaluation platform to benchmark D-MAD techniques.  ... 
arXiv:2011.02045v1 fatcat:why3ebhmcfezdckv443t7grddi

Analyzing Human Observer Ability in Morphing Attack Detection – Where Do We Stand? [article]

Sankini Rancha Godage, Frøy Løvåsdal, Sushma Venkatesh, Kiran Raja, Raghavendra Ramachandra, Christoph Busch
2022 arXiv   pre-print
Further, to benchmark the human ability in detecting morphs, a new evaluation platform is created to conduct S-MAD and D-MAD analysis.  ...  Unlike the existing databases, the newly created morphed image database has been created with careful considerations to age, gender and ethnicity to create realistic morph attacks.  ...  IMARS HUMAN OBSERVER EVALUATION The online evaluation platform for benchmarking the human observer ability in detecting morphed images consists of two different setups corresponding to Differential Morphing  ... 
arXiv:2202.12426v3 fatcat:iv24i36x75ajxasdh2iuofydsm

Face Morphing Attack Generation & Detection: A Comprehensive Survey

Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
2021 IEEE Transactions on Technology and Society  
The vulnerability of face recognition systems (FRSs) to various kinds of attacks (both direct and indirect attacks) and face morphing attacks has received great interest from the biometric community.  ...  Bologna-SOTAMD: Differential Morph Attack Detection The Bologna-SOTAMD benchmark was opened for evaluation in 2019 and provided a common evaluation platform to benchmark D-MAD techniques.  ...  PUBLIC EVALUATION AND BENCHMARKING In this section, we summarise evaluations that publicly benchmark morphing attack detection performance.  ... 
doi:10.1109/tts.2021.3066254 fatcat:iyo5a6ofefewthz2kmiioocyg4

Algorithmic Fairness in Face Morphing Attack Detection [article]

Raghavendra Ramachandra, Kiran Raja, Christoph Busch
2021 arXiv   pre-print
Face Morphing Attack Detection (MAD) techniques have been developed in recent past to deter such attacks and mitigate risks from morphing attacks.  ...  In this paper, we study and present a comprehensive analysis of algorithmic fairness of the existing Single image-based Morph Attack Detection (S-MAD) algorithms.  ...  A comprehen- attack detection - database, evaluation platform and bench- sive study on face recognition biases beyond demographics. marking.  ... 
arXiv:2111.12115v1 fatcat:sstmtv4ttjcrnowg3hmkbpri7q

Detecting Morphing Attacks through Face Geometry Features

Stephanie Autherith, Cecilia Pasquini
2020 Journal of Imaging  
This poses serious security issues in machine-assisted border control applications and calls for techniques to automatically detect whether morphing operations have been previously applied on passport  ...  We report the results of extensive experiments performed on images of various sources and under different experimental settings showing that landmark locations detected through automated algorithms contain  ...  A morphing attack is detected if one of the two resulting face strongly matches the probe image.  ... 
doi:10.3390/jimaging6110115 pmid:34460559 pmcid:PMC8321196 fatcat:bq762p6v7ncybhbuyuvcdwmgfi

Face Morphing and Morphing Attack Detection

Ulrich Johannes Scherhag
Publications proposing algorithms for the detection of morphing attacks often lack uniform databases and evaluation methods, which leads to a restricted comparability of the previously published work.  ...  Thus, the focus of this thesis is the comprehensive analysis of different features and classifiers in their suitability as algorithms for the detection of morphing attacks.  ...  attacks and metrics to evaluate the detection performance of those.  ... 
doi:10.26083/tuprints-00014595 fatcat:e5dmjorypvd2dhyifpl5tqqapq

MagNet: Detecting Digital Presentation Attacks on Face Recognition

Akshay Agarwal, Richa Singh, Mayank Vatsa, Afzel Noore
2021 Frontiers in Artificial Intelligence  
While much research has focused on physical attacks such as photo, replay, and mask attacks, digital attacks such as morphing have received limited attention.  ...  We also present a database, termed as IDAgender, which consists of three different subsets of swapping/morphing and neural face transformation.  ...  The detection of morph attack is presented using LBP features in YCbCr and HSV color space.  ... 
doi:10.3389/frai.2021.643424 pmid:34957389 pmcid:PMC8692743 fatcat:nuur4s7d4bbq7a37g66ylog5ra

Preventing face morphing attacks by using legacy face images

Ilias Batskos, Florens F. Wit, Luuk J. Spreeuwers, Raymond J. Veldhuis
2021 IET Biometrics  
This is known as a Morphing Attack (MA), an identity sharing scheme with serious consequences.  ...  Finally, their performance is compared with a state-of-the-art MA detection algorithm on the same dataset.  ...  ACKNOWLEDGEMENTS We would like to thank the University of Bologna for conducting the tests on their benchmarking platform and providing us with the results and Cognitec Systems GmbH. for supporting our  ... 
doi:10.1049/bme2.12047 fatcat:poklb3l7snfsxcryyb4uajcd6y

Morph Creation and Vulnerability of Face Recognition Systems to Morphing [chapter]

Matteo Ferrara, Annalisa Franco
2022 Advances in Computer Vision and Pattern Recognition  
Moreover, the sensitivity of state-of-the-art face recognition algorithms to the face morphing attack will be assessed using morphed images of different quality generated using various morphing methods  ...  This chapter will describe the face morphing process, in an overview ranging from the traditional techniques based on geometry warping and texture blending to the most recent and innovative approaches  ...  BIOLAB-1.0, MorphDB, and SOTAMD datasets are available for testing on the Bologna Online Evaluation Platform (BOEP) [41] hosted in the FVC-onGoing framework [42, 43] .  ... 
doi:10.1007/978-3-030-87664-7_6 fatcat:hvfhr24bavdxjpl6rrs4grplxa

An Introduction to Digital Face Manipulation [chapter]

Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez, Aythami Morales, Javier Ortega-Garcia
2022 Advances in Computer Vision and Pattern Recognition  
In addition, we highlight in this chapter publicly available databases and code for the generation of digital fake content.  ...  . face reenactment or talking faces), and (vi) audio- and text-to-video.  ...  As a result, the authors have presented a new sequestered dataset and benchmark 24 for facilitating the advancements of morphing attack detection.  ... 
doi:10.1007/978-3-030-87664-7_1 fatcat:vboo3nz5pzbchmmfdgs7ptbule

Makeup Presentation Attacks: Review and Detection Performance Benchmark

C. Rathgeb, P. Drozdowski, C. Busch
2020 IEEE Access  
suitable detection approaches and a benchmark thereof.  ...  ) and establishment of independent benchmarks (similar to the numerous evaluations carried out by NIST [78] ).  ...  Christoph co-authored more than 500 technical papers and has been a speaker at international conferences.  ... 
doi:10.1109/access.2020.3044723 fatcat:vsquxkqgfne6jhdnxnrw5ytd6u

DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection [article]

Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez, Aythami Morales, Javier Ortega-Garcia
2020 arXiv   pre-print
For each manipulation group, we provide details regarding manipulation techniques, existing public databases, and key benchmarks for technology evaluation of fake detection methods, including a summary  ...  of results from those evaluations.  ...  PRIMA (H2020-MSCA-ITN-2019-860315), TRESPASS-ETN (H2020-MSCA-ITN-2019-860813), BIBECA (MINECO/FEDER RTI2018-101248-B-I00), Bio-Guard (Ayudas Fundación BBVA a Equipos de Investigación Científica 2017), and  ... 
arXiv:2001.00179v3 fatcat:tq4sqedsgve23pwm66qidbzgt4

2021 International Joint Conference on Biometrics (IJCB 2021) - Event schedule [Table of Contents]

2021 2021 IEEE International Joint Conference on Biometrics (IJCB)  
To name a few, facial recognition and analysis methods may be subject to bias and uncertainty, biometrics systems can be failed under adversarial attacks, imagery of people can maliciously tamper, and  ...  With the wide application of biometrics systems and person analysis systems, it is becoming more and more important to ensure their trustworthiness.  ...  of Morphing-Attacks in Vascular Biometrics Fingerprint, vein and others  1:30pm -2:50pm, Aug 5  Online.  ... 
doi:10.1109/ijcb52358.2021.9521653 fatcat:cywo2fo27rauvbpxdj5qx7ykui

A Scanner Darkly: Protecting User Privacy from Perceptual Applications

S. Jana, A. Narayanan, V. Shmatikov
2013 2013 IEEE Symposium on Security and Privacy  
We evaluate DARKLY on 20 perceptual applications that perform diverse tasks such as image recognition, object tracking, security surveillance, and face detection.  ...  Perceptual, "context-aware" applications that observe their environment and interact with users via cameras and other sensors are becoming ubiquitous on personal computers, mobile phones, gaming platforms  ...  We are grateful to David Molnar, Scott Saponas, and Ryan Calo for helpful discussions during the early part of this work and to Piyush Khandelwal for helping us evaluate DARKLY on the Segway RMP-50 robot  ... 
doi:10.1109/sp.2013.31 dblp:conf/sp/JanaNS13 fatcat:g7o2nd33vjeaheagmyhdrndoa4
« Previous Showing results 1 — 15 out of 424 results