Detection of Face Morphing Attacks Based on PRNU Analysis

Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are u...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on biometrics, behavior, and identity science behavior, and identity science, 2019-10, Vol.1 (4), p.302-317
Hauptverfasser: Scherhag, Ulrich, Debiasi, Luca, Rathgeb, Christian, Busch, Christoph, Uhl, Andreas
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 317
container_issue 4
container_start_page 302
container_title IEEE transactions on biometrics, behavior, and identity science
container_volume 1
creator Scherhag, Ulrich
Debiasi, Luca
Rathgeb, Christian
Busch, Christoph
Uhl, Andreas
description Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are unknown at the time of classification. These issues are commonly overseen while many researchers report encouraging detection performance for training and testing morphing attack detection schemes on images obtained from a single face database employing a single morphing algorithm. In this work, a morphing attack detection system based on the analysis of Photo Response Non-Uniformity (PRNU) is presented. More specifically, spatial and spectral features extracted from PRNU patterns across image cells are analyzed. Differences of these features for bona fide and morphed images are estimated during a threshold-selection stage using the Dresden image database which is specifically built for PRNU analysis in digital image forensics. Cross-database evaluations are then conducted employing an ICAO compliant subset of the FRGCv2 database and a Print-Scan database which is a printed and scanned version of said FRGCv2 subset. Bona fide and morphed face images are automatically generated employing four different morphing algorithms. The proposed PRNU-based morphing attack detector is shown to robustly distinguish bona fide and morphed face images achieving an average D-EER of 11.2% in the best configuration. In scenarios where image sources and morphing techniques are unknown, it is shown to significantly outperform other previously established morphing attack detectors. Finally, the limitations and potential of the approach are demonstrated on a dataset of printed and scanned bona fide and morphed face images.
doi_str_mv 10.1109/TBIOM.2019.2942395
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TBIOM_2019_2942395</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8846232</ieee_id><sourcerecordid>2311109405</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2545-f9c9a047fa371a823cd6011aed6f97026a6e7ef625df8943f6eaa1da6c9bbcce3</originalsourceid><addsrcrecordid>eNpNkE1PwkAQhjdGEwnyB_SyiefifnXbPQIKkoAYA-fNsJ3VIlLcLQf-va0QYzLJO4fnnUweQm4563POzMNyOF3M-4Jx0xdGCWnSC9IRWmaJViy7_Ldfk16MG8aYYMo00yHmEWt0dVntaOXpGBzSeRX2H-XunQ7qGtxnpEOIWNCGeH17WdHBDrbHWMYbcuVhG7F3zi5ZjZ-Wo-dktphMR4NZ4kSq0sQbZ4CpzIPMOORCukIzzgEL7U3GhAaNGXot0sLnRkmvEYAXoJ1Zr51D2SX3p7v7UH0fMNZ2Ux1C80S0QvJWgGJpQ4kT5UIVY0Bv96H8gnC0nNkWsr-WbGvJni01pbtTqUTEv0KeKy2kkD8mIWHO</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2311109405</pqid></control><display><type>article</type><title>Detection of Face Morphing Attacks Based on PRNU Analysis</title><source>IEEE Electronic Library (IEL)</source><creator>Scherhag, Ulrich ; Debiasi, Luca ; Rathgeb, Christian ; Busch, Christoph ; Uhl, Andreas</creator><creatorcontrib>Scherhag, Ulrich ; Debiasi, Luca ; Rathgeb, Christian ; Busch, Christoph ; Uhl, Andreas</creatorcontrib><description>Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are unknown at the time of classification. These issues are commonly overseen while many researchers report encouraging detection performance for training and testing morphing attack detection schemes on images obtained from a single face database employing a single morphing algorithm. In this work, a morphing attack detection system based on the analysis of Photo Response Non-Uniformity (PRNU) is presented. More specifically, spatial and spectral features extracted from PRNU patterns across image cells are analyzed. Differences of these features for bona fide and morphed images are estimated during a threshold-selection stage using the Dresden image database which is specifically built for PRNU analysis in digital image forensics. Cross-database evaluations are then conducted employing an ICAO compliant subset of the FRGCv2 database and a Print-Scan database which is a printed and scanned version of said FRGCv2 subset. Bona fide and morphed face images are automatically generated employing four different morphing algorithms. The proposed PRNU-based morphing attack detector is shown to robustly distinguish bona fide and morphed face images achieving an average D-EER of 11.2% in the best configuration. In scenarios where image sources and morphing techniques are unknown, it is shown to significantly outperform other previously established morphing attack detectors. Finally, the limitations and potential of the approach are demonstrated on a dataset of printed and scanned bona fide and morphed face images.</description><identifier>ISSN: 2637-6407</identifier><identifier>EISSN: 2637-6407</identifier><identifier>DOI: 10.1109/TBIOM.2019.2942395</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Algorithms ; Biometrics ; Biometrics (access control) ; Digital imaging ; face morphing ; face morphing attack ; Face recognition ; Feature extraction ; Image detection ; Morphing ; morphing attack detection ; Nonuniformity ; Object recognition ; photo response non-uniformity ; Support vector machines</subject><ispartof>IEEE transactions on biometrics, behavior, and identity science, 2019-10, Vol.1 (4), p.302-317</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2545-f9c9a047fa371a823cd6011aed6f97026a6e7ef625df8943f6eaa1da6c9bbcce3</citedby><cites>FETCH-LOGICAL-c2545-f9c9a047fa371a823cd6011aed6f97026a6e7ef625df8943f6eaa1da6c9bbcce3</cites><orcidid>0000-0002-6280-048X ; 0000-0002-9159-2923 ; 0000-0001-5807-4713</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8846232$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids></links><search><creatorcontrib>Scherhag, Ulrich</creatorcontrib><creatorcontrib>Debiasi, Luca</creatorcontrib><creatorcontrib>Rathgeb, Christian</creatorcontrib><creatorcontrib>Busch, Christoph</creatorcontrib><creatorcontrib>Uhl, Andreas</creatorcontrib><title>Detection of Face Morphing Attacks Based on PRNU Analysis</title><title>IEEE transactions on biometrics, behavior, and identity science</title><addtitle>TBIOM</addtitle><description>Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are unknown at the time of classification. These issues are commonly overseen while many researchers report encouraging detection performance for training and testing morphing attack detection schemes on images obtained from a single face database employing a single morphing algorithm. In this work, a morphing attack detection system based on the analysis of Photo Response Non-Uniformity (PRNU) is presented. More specifically, spatial and spectral features extracted from PRNU patterns across image cells are analyzed. Differences of these features for bona fide and morphed images are estimated during a threshold-selection stage using the Dresden image database which is specifically built for PRNU analysis in digital image forensics. Cross-database evaluations are then conducted employing an ICAO compliant subset of the FRGCv2 database and a Print-Scan database which is a printed and scanned version of said FRGCv2 subset. Bona fide and morphed face images are automatically generated employing four different morphing algorithms. The proposed PRNU-based morphing attack detector is shown to robustly distinguish bona fide and morphed face images achieving an average D-EER of 11.2% in the best configuration. In scenarios where image sources and morphing techniques are unknown, it is shown to significantly outperform other previously established morphing attack detectors. Finally, the limitations and potential of the approach are demonstrated on a dataset of printed and scanned bona fide and morphed face images.</description><subject>Algorithms</subject><subject>Biometrics</subject><subject>Biometrics (access control)</subject><subject>Digital imaging</subject><subject>face morphing</subject><subject>face morphing attack</subject><subject>Face recognition</subject><subject>Feature extraction</subject><subject>Image detection</subject><subject>Morphing</subject><subject>morphing attack detection</subject><subject>Nonuniformity</subject><subject>Object recognition</subject><subject>photo response non-uniformity</subject><subject>Support vector machines</subject><issn>2637-6407</issn><issn>2637-6407</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><recordid>eNpNkE1PwkAQhjdGEwnyB_SyiefifnXbPQIKkoAYA-fNsJ3VIlLcLQf-va0QYzLJO4fnnUweQm4563POzMNyOF3M-4Jx0xdGCWnSC9IRWmaJViy7_Ldfk16MG8aYYMo00yHmEWt0dVntaOXpGBzSeRX2H-XunQ7qGtxnpEOIWNCGeH17WdHBDrbHWMYbcuVhG7F3zi5ZjZ-Wo-dktphMR4NZ4kSq0sQbZ4CpzIPMOORCukIzzgEL7U3GhAaNGXot0sLnRkmvEYAXoJ1Zr51D2SX3p7v7UH0fMNZ2Ux1C80S0QvJWgGJpQ4kT5UIVY0Bv96H8gnC0nNkWsr-WbGvJni01pbtTqUTEv0KeKy2kkD8mIWHO</recordid><startdate>20191001</startdate><enddate>20191001</enddate><creator>Scherhag, Ulrich</creator><creator>Debiasi, Luca</creator><creator>Rathgeb, Christian</creator><creator>Busch, Christoph</creator><creator>Uhl, Andreas</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-6280-048X</orcidid><orcidid>https://orcid.org/0000-0002-9159-2923</orcidid><orcidid>https://orcid.org/0000-0001-5807-4713</orcidid></search><sort><creationdate>20191001</creationdate><title>Detection of Face Morphing Attacks Based on PRNU Analysis</title><author>Scherhag, Ulrich ; Debiasi, Luca ; Rathgeb, Christian ; Busch, Christoph ; Uhl, Andreas</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2545-f9c9a047fa371a823cd6011aed6f97026a6e7ef625df8943f6eaa1da6c9bbcce3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Biometrics</topic><topic>Biometrics (access control)</topic><topic>Digital imaging</topic><topic>face morphing</topic><topic>face morphing attack</topic><topic>Face recognition</topic><topic>Feature extraction</topic><topic>Image detection</topic><topic>Morphing</topic><topic>morphing attack detection</topic><topic>Nonuniformity</topic><topic>Object recognition</topic><topic>photo response non-uniformity</topic><topic>Support vector machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Scherhag, Ulrich</creatorcontrib><creatorcontrib>Debiasi, Luca</creatorcontrib><creatorcontrib>Rathgeb, Christian</creatorcontrib><creatorcontrib>Busch, Christoph</creatorcontrib><creatorcontrib>Uhl, Andreas</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on biometrics, behavior, and identity science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Scherhag, Ulrich</au><au>Debiasi, Luca</au><au>Rathgeb, Christian</au><au>Busch, Christoph</au><au>Uhl, Andreas</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection of Face Morphing Attacks Based on PRNU Analysis</atitle><jtitle>IEEE transactions on biometrics, behavior, and identity science</jtitle><stitle>TBIOM</stitle><date>2019-10-01</date><risdate>2019</risdate><volume>1</volume><issue>4</issue><spage>302</spage><epage>317</epage><pages>302-317</pages><issn>2637-6407</issn><eissn>2637-6407</eissn><abstract>Recent research found that attacks based on morphed face images, i.e., morphing attacks, pose a severe security risk to face recognition systems. A reliable morphing attack detection from a single face image remains a research challenge since cameras and morphing techniques used by an attacker are unknown at the time of classification. These issues are commonly overseen while many researchers report encouraging detection performance for training and testing morphing attack detection schemes on images obtained from a single face database employing a single morphing algorithm. In this work, a morphing attack detection system based on the analysis of Photo Response Non-Uniformity (PRNU) is presented. More specifically, spatial and spectral features extracted from PRNU patterns across image cells are analyzed. Differences of these features for bona fide and morphed images are estimated during a threshold-selection stage using the Dresden image database which is specifically built for PRNU analysis in digital image forensics. Cross-database evaluations are then conducted employing an ICAO compliant subset of the FRGCv2 database and a Print-Scan database which is a printed and scanned version of said FRGCv2 subset. Bona fide and morphed face images are automatically generated employing four different morphing algorithms. The proposed PRNU-based morphing attack detector is shown to robustly distinguish bona fide and morphed face images achieving an average D-EER of 11.2% in the best configuration. In scenarios where image sources and morphing techniques are unknown, it is shown to significantly outperform other previously established morphing attack detectors. Finally, the limitations and potential of the approach are demonstrated on a dataset of printed and scanned bona fide and morphed face images.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TBIOM.2019.2942395</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-6280-048X</orcidid><orcidid>https://orcid.org/0000-0002-9159-2923</orcidid><orcidid>https://orcid.org/0000-0001-5807-4713</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2637-6407
ispartof IEEE transactions on biometrics, behavior, and identity science, 2019-10, Vol.1 (4), p.302-317
issn 2637-6407
2637-6407
language eng
recordid cdi_crossref_primary_10_1109_TBIOM_2019_2942395
source IEEE Electronic Library (IEL)
subjects Algorithms
Biometrics
Biometrics (access control)
Digital imaging
face morphing
face morphing attack
Face recognition
Feature extraction
Image detection
Morphing
morphing attack detection
Nonuniformity
Object recognition
photo response non-uniformity
Support vector machines
title Detection of Face Morphing Attacks Based on PRNU Analysis
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T22%3A48%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20of%20Face%20Morphing%20Attacks%20Based%20on%20PRNU%20Analysis&rft.jtitle=IEEE%20transactions%20on%20biometrics,%20behavior,%20and%20identity%20science&rft.au=Scherhag,%20Ulrich&rft.date=2019-10-01&rft.volume=1&rft.issue=4&rft.spage=302&rft.epage=317&rft.pages=302-317&rft.issn=2637-6407&rft.eissn=2637-6407&rft_id=info:doi/10.1109/TBIOM.2019.2942395&rft_dat=%3Cproquest_cross%3E2311109405%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2311109405&rft_id=info:pmid/&rft_ieee_id=8846232&rfr_iscdi=true