Detection of Face Morphing Attacks Based on PRNU Analysis
Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are u...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on biometrics, behavior, and identity science behavior, and identity science, 2019-10, Vol.1 (4), p.302-317 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 317 |
---|---|
container_issue | 4 |
container_start_page | 302 |
container_title | IEEE transactions on biometrics, behavior, and identity science |
container_volume | 1 |
creator | Scherhag, Ulrich Debiasi, Luca Rathgeb, Christian Busch, Christoph Uhl, Andreas |
description | Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are unknown at the time of classification. These issues are commonly overseen while many researchers report encouraging detection performance for training and testing morphing attack detection schemes on images obtained from a single face database employing a single morphing algorithm. In this work, a morphing attack detection system based on the analysis of Photo Response Non-Uniformity (PRNU) is presented. More specifically, spatial and spectral features extracted from PRNU patterns across image cells are analyzed. Differences of these features for bona fide and morphed images are estimated during a threshold-selection stage using the Dresden image database which is specifically built for PRNU analysis in digital image forensics. Cross-database evaluations are then conducted employing an ICAO compliant subset of the FRGCv2 database and a Print-Scan database which is a printed and scanned version of said FRGCv2 subset. Bona fide and morphed face images are automatically generated employing four different morphing algorithms. The proposed PRNU-based morphing attack detector is shown to robustly distinguish bona fide and morphed face images achieving an average D-EER of 11.2% in the best configuration. In scenarios where image sources and morphing techniques are unknown, it is shown to significantly outperform other previously established morphing attack detectors. Finally, the limitations and potential of the approach are demonstrated on a dataset of printed and scanned bona fide and morphed face images. |
doi_str_mv | 10.1109/TBIOM.2019.2942395 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TBIOM_2019_2942395</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8846232</ieee_id><sourcerecordid>2311109405</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2545-f9c9a047fa371a823cd6011aed6f97026a6e7ef625df8943f6eaa1da6c9bbcce3</originalsourceid><addsrcrecordid>eNpNkE1PwkAQhjdGEwnyB_SyiefifnXbPQIKkoAYA-fNsJ3VIlLcLQf-va0QYzLJO4fnnUweQm4563POzMNyOF3M-4Jx0xdGCWnSC9IRWmaJViy7_Ldfk16MG8aYYMo00yHmEWt0dVntaOXpGBzSeRX2H-XunQ7qGtxnpEOIWNCGeH17WdHBDrbHWMYbcuVhG7F3zi5ZjZ-Wo-dktphMR4NZ4kSq0sQbZ4CpzIPMOORCukIzzgEL7U3GhAaNGXot0sLnRkmvEYAXoJ1Zr51D2SX3p7v7UH0fMNZ2Ux1C80S0QvJWgGJpQ4kT5UIVY0Bv96H8gnC0nNkWsr-WbGvJni01pbtTqUTEv0KeKy2kkD8mIWHO</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2311109405</pqid></control><display><type>article</type><title>Detection of Face Morphing Attacks Based on PRNU Analysis</title><source>IEEE Electronic Library (IEL)</source><creator>Scherhag, Ulrich ; Debiasi, Luca ; Rathgeb, Christian ; Busch, Christoph ; Uhl, Andreas</creator><creatorcontrib>Scherhag, Ulrich ; Debiasi, Luca ; Rathgeb, Christian ; Busch, Christoph ; Uhl, Andreas</creatorcontrib><description>Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are unknown at the time of classification. These issues are commonly overseen while many researchers report encouraging detection performance for training and testing morphing attack detection schemes on images obtained from a single face database employing a single morphing algorithm. In this work, a morphing attack detection system based on the analysis of Photo Response Non-Uniformity (PRNU) is presented. More specifically, spatial and spectral features extracted from PRNU patterns across image cells are analyzed. Differences of these features for bona fide and morphed images are estimated during a threshold-selection stage using the Dresden image database which is specifically built for PRNU analysis in digital image forensics. Cross-database evaluations are then conducted employing an ICAO compliant subset of the FRGCv2 database and a Print-Scan database which is a printed and scanned version of said FRGCv2 subset. Bona fide and morphed face images are automatically generated employing four different morphing algorithms. The proposed PRNU-based morphing attack detector is shown to robustly distinguish bona fide and morphed face images achieving an average D-EER of 11.2% in the best configuration. In scenarios where image sources and morphing techniques are unknown, it is shown to significantly outperform other previously established morphing attack detectors. Finally, the limitations and potential of the approach are demonstrated on a dataset of printed and scanned bona fide and morphed face images.</description><identifier>ISSN: 2637-6407</identifier><identifier>EISSN: 2637-6407</identifier><identifier>DOI: 10.1109/TBIOM.2019.2942395</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Biometrics ; Biometrics (access control) ; Digital imaging ; face morphing ; face morphing attack ; Face recognition ; Feature extraction ; Image detection ; Morphing ; morphing attack detection ; Nonuniformity ; Object recognition ; photo response non-uniformity ; Support vector machines</subject><ispartof>IEEE transactions on biometrics, behavior, and identity science, 2019-10, Vol.1 (4), p.302-317</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2545-f9c9a047fa371a823cd6011aed6f97026a6e7ef625df8943f6eaa1da6c9bbcce3</citedby><cites>FETCH-LOGICAL-c2545-f9c9a047fa371a823cd6011aed6f97026a6e7ef625df8943f6eaa1da6c9bbcce3</cites><orcidid>0000-0002-6280-048X ; 0000-0002-9159-2923 ; 0000-0001-5807-4713</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8846232$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids></links><search><creatorcontrib>Scherhag, Ulrich</creatorcontrib><creatorcontrib>Debiasi, Luca</creatorcontrib><creatorcontrib>Rathgeb, Christian</creatorcontrib><creatorcontrib>Busch, Christoph</creatorcontrib><creatorcontrib>Uhl, Andreas</creatorcontrib><title>Detection of Face Morphing Attacks Based on PRNU Analysis</title><title>IEEE transactions on biometrics, behavior, and identity science</title><addtitle>TBIOM</addtitle><description>Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are unknown at the time of classification. These issues are commonly overseen while many researchers report encouraging detection performance for training and testing morphing attack detection schemes on images obtained from a single face database employing a single morphing algorithm. In this work, a morphing attack detection system based on the analysis of Photo Response Non-Uniformity (PRNU) is presented. More specifically, spatial and spectral features extracted from PRNU patterns across image cells are analyzed. Differences of these features for bona fide and morphed images are estimated during a threshold-selection stage using the Dresden image database which is specifically built for PRNU analysis in digital image forensics. Cross-database evaluations are then conducted employing an ICAO compliant subset of the FRGCv2 database and a Print-Scan database which is a printed and scanned version of said FRGCv2 subset. Bona fide and morphed face images are automatically generated employing four different morphing algorithms. The proposed PRNU-based morphing attack detector is shown to robustly distinguish bona fide and morphed face images achieving an average D-EER of 11.2% in the best configuration. In scenarios where image sources and morphing techniques are unknown, it is shown to significantly outperform other previously established morphing attack detectors. Finally, the limitations and potential of the approach are demonstrated on a dataset of printed and scanned bona fide and morphed face images.</description><subject>Algorithms</subject><subject>Biometrics</subject><subject>Biometrics (access control)</subject><subject>Digital imaging</subject><subject>face morphing</subject><subject>face morphing attack</subject><subject>Face recognition</subject><subject>Feature extraction</subject><subject>Image detection</subject><subject>Morphing</subject><subject>morphing attack detection</subject><subject>Nonuniformity</subject><subject>Object recognition</subject><subject>photo response non-uniformity</subject><subject>Support vector machines</subject><issn>2637-6407</issn><issn>2637-6407</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><recordid>eNpNkE1PwkAQhjdGEwnyB_SyiefifnXbPQIKkoAYA-fNsJ3VIlLcLQf-va0QYzLJO4fnnUweQm4563POzMNyOF3M-4Jx0xdGCWnSC9IRWmaJViy7_Ldfk16MG8aYYMo00yHmEWt0dVntaOXpGBzSeRX2H-XunQ7qGtxnpEOIWNCGeH17WdHBDrbHWMYbcuVhG7F3zi5ZjZ-Wo-dktphMR4NZ4kSq0sQbZ4CpzIPMOORCukIzzgEL7U3GhAaNGXot0sLnRkmvEYAXoJ1Zr51D2SX3p7v7UH0fMNZ2Ux1C80S0QvJWgGJpQ4kT5UIVY0Bv96H8gnC0nNkWsr-WbGvJni01pbtTqUTEv0KeKy2kkD8mIWHO</recordid><startdate>20191001</startdate><enddate>20191001</enddate><creator>Scherhag, Ulrich</creator><creator>Debiasi, Luca</creator><creator>Rathgeb, Christian</creator><creator>Busch, Christoph</creator><creator>Uhl, Andreas</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-6280-048X</orcidid><orcidid>https://orcid.org/0000-0002-9159-2923</orcidid><orcidid>https://orcid.org/0000-0001-5807-4713</orcidid></search><sort><creationdate>20191001</creationdate><title>Detection of Face Morphing Attacks Based on PRNU Analysis</title><author>Scherhag, Ulrich ; Debiasi, Luca ; Rathgeb, Christian ; Busch, Christoph ; Uhl, Andreas</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2545-f9c9a047fa371a823cd6011aed6f97026a6e7ef625df8943f6eaa1da6c9bbcce3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Biometrics</topic><topic>Biometrics (access control)</topic><topic>Digital imaging</topic><topic>face morphing</topic><topic>face morphing attack</topic><topic>Face recognition</topic><topic>Feature extraction</topic><topic>Image detection</topic><topic>Morphing</topic><topic>morphing attack detection</topic><topic>Nonuniformity</topic><topic>Object recognition</topic><topic>photo response non-uniformity</topic><topic>Support vector machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Scherhag, Ulrich</creatorcontrib><creatorcontrib>Debiasi, Luca</creatorcontrib><creatorcontrib>Rathgeb, Christian</creatorcontrib><creatorcontrib>Busch, Christoph</creatorcontrib><creatorcontrib>Uhl, Andreas</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on biometrics, behavior, and identity science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Scherhag, Ulrich</au><au>Debiasi, Luca</au><au>Rathgeb, Christian</au><au>Busch, Christoph</au><au>Uhl, Andreas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection of Face Morphing Attacks Based on PRNU Analysis</atitle><jtitle>IEEE transactions on biometrics, behavior, and identity science</jtitle><stitle>TBIOM</stitle><date>2019-10-01</date><risdate>2019</risdate><volume>1</volume><issue>4</issue><spage>302</spage><epage>317</epage><pages>302-317</pages><issn>2637-6407</issn><eissn>2637-6407</eissn><abstract>Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are unknown at the time of classification. These issues are commonly overseen while many researchers report encouraging detection performance for training and testing morphing attack detection schemes on images obtained from a single face database employing a single morphing algorithm. In this work, a morphing attack detection system based on the analysis of Photo Response Non-Uniformity (PRNU) is presented. More specifically, spatial and spectral features extracted from PRNU patterns across image cells are analyzed. Differences of these features for bona fide and morphed images are estimated during a threshold-selection stage using the Dresden image database which is specifically built for PRNU analysis in digital image forensics. Cross-database evaluations are then conducted employing an ICAO compliant subset of the FRGCv2 database and a Print-Scan database which is a printed and scanned version of said FRGCv2 subset. Bona fide and morphed face images are automatically generated employing four different morphing algorithms. The proposed PRNU-based morphing attack detector is shown to robustly distinguish bona fide and morphed face images achieving an average D-EER of 11.2% in the best configuration. In scenarios where image sources and morphing techniques are unknown, it is shown to significantly outperform other previously established morphing attack detectors. Finally, the limitations and potential of the approach are demonstrated on a dataset of printed and scanned bona fide and morphed face images.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TBIOM.2019.2942395</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-6280-048X</orcidid><orcidid>https://orcid.org/0000-0002-9159-2923</orcidid><orcidid>https://orcid.org/0000-0001-5807-4713</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2637-6407 |
ispartof | IEEE transactions on biometrics, behavior, and identity science, 2019-10, Vol.1 (4), p.302-317 |
issn | 2637-6407 2637-6407 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TBIOM_2019_2942395 |
source | IEEE Electronic Library (IEL) |
subjects | Algorithms Biometrics Biometrics (access control) Digital imaging face morphing face morphing attack Face recognition Feature extraction Image detection Morphing morphing attack detection Nonuniformity Object recognition photo response non-uniformity Support vector machines |
title | Detection of Face Morphing Attacks Based on PRNU Analysis |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T22%3A48%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20of%20Face%20Morphing%20Attacks%20Based%20on%20PRNU%20Analysis&rft.jtitle=IEEE%20transactions%20on%20biometrics,%20behavior,%20and%20identity%20science&rft.au=Scherhag,%20Ulrich&rft.date=2019-10-01&rft.volume=1&rft.issue=4&rft.spage=302&rft.epage=317&rft.pages=302-317&rft.issn=2637-6407&rft.eissn=2637-6407&rft_id=info:doi/10.1109/TBIOM.2019.2942395&rft_dat=%3Cproquest_cross%3E2311109405%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2311109405&rft_id=info:pmid/&rft_ieee_id=8846232&rfr_iscdi=true |