Deep Face Representations for Differential Morphing Attack Detection

The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection (MAD) have been proposed in the scientific literature. However, the MAD algorithms proposed so far have mostly been trained and tested on datasets whose dis...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2020, Vol.15, p.3625-3639
Hauptverfasser: Scherhag, Ulrich, Rathgeb, Christian, Merkle, Johannes, Busch, Christoph
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3639
container_issue
container_start_page 3625
container_title IEEE transactions on information forensics and security
container_volume 15
creator Scherhag, Ulrich
Rathgeb, Christian
Merkle, Johannes
Busch, Christoph
description The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection (MAD) have been proposed in the scientific literature. However, the MAD algorithms proposed so far have mostly been trained and tested on datasets whose distributions of image characteristics are either very limited (e.g., only created with a single morphing tool) or rather unrealistic (e.g., no print-scan transformation). As a consequence, these methods easily overfit on certain image types and the results presented cannot be expected to apply to real-world scenarios. For example, the results of the latest NIST FRVT MORPH show that the majority of submitted MAD algorithms lacks robustness and performance when considering unseen and challenging datasets. In this work, subsets of the FERET and FRGCv2 face databases are used to create a realistic database for training and testing of MAD algorithms, containing a large number of ICAO-compliant bona fide facial images, corresponding unconstrained probe images, and morphed images created with four different face morphing tools. Furthermore, multiple post-processings are applied on the reference images, e.g., print-scan and JPEG2000 compression. On this database, previously proposed differential morphing algorithms are evaluated and compared. In addition, the application of deep face representations for differential MAD algorithms is investigated. It is shown that algorithms based on deep face representations can achieve very high detection performance (less than 3% D-EER) and robustness with respect to various post-processings. Finally, the limitations of the developed methods are analyzed.
doi_str_mv 10.1109/TIFS.2020.2994750
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_9093905</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9093905</ieee_id><sourcerecordid>2420294946</sourcerecordid><originalsourceid>FETCH-LOGICAL-c336t-1e9501dc239e334162d67f757d8a1b54d628931708e9c92460e334f9517973bc3</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE7d780cS2O0UBG0npd0M6upNYm76cF_b0JLTzMMzzvDPITcMjpjjMLDelm8zzjldMYBpFH0jEyYUjrVlLPzU8_EJbmKcUuplExnE5LniF1SlA6TN-wCRmz6sq_bJia-DUlee49hmNXlLnlpQ_dVN5_JvO9L953k2KMb2Wty4ctdxJtjnZKP4nG9eE5Xr0_LxXyVOiF0nzIERVnluAAUYrjPK228UabKSrZRstI8A8EMzRAccKnpiHlQzIARGyem5P6wtwvt7x5jb7ftPjTDScvl8DxIkHqg2IFyoY0xoLddqH_K8GcZtaMsO8qyoyx7lDVk7g6ZGhFPPFAQQJX4B2plY4g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2420294946</pqid></control><display><type>article</type><title>Deep Face Representations for Differential Morphing Attack Detection</title><source>IEEE Electronic Library (IEL)</source><creator>Scherhag, Ulrich ; Rathgeb, Christian ; Merkle, Johannes ; Busch, Christoph</creator><creatorcontrib>Scherhag, Ulrich ; Rathgeb, Christian ; Merkle, Johannes ; Busch, Christoph</creatorcontrib><description>The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection (MAD) have been proposed in the scientific literature. However, the MAD algorithms proposed so far have mostly been trained and tested on datasets whose distributions of image characteristics are either very limited (e.g., only created with a single morphing tool) or rather unrealistic (e.g., no print-scan transformation). As a consequence, these methods easily overfit on certain image types and the results presented cannot be expected to apply to real-world scenarios. For example, the results of the latest NIST FRVT MORPH show that the majority of submitted MAD algorithms lacks robustness and performance when considering unseen and challenging datasets. In this work, subsets of the FERET and FRGCv2 face databases are used to create a realistic database for training and testing of MAD algorithms, containing a large number of ICAO-compliant bona fide facial images, corresponding unconstrained probe images, and morphed images created with four different face morphing tools. Furthermore, multiple post-processings are applied on the reference images, e.g., print-scan and JPEG2000 compression. On this database, previously proposed differential morphing algorithms are evaluated and compared. In addition, the application of deep face representations for differential MAD algorithms is investigated. It is shown that algorithms based on deep face representations can achieve very high detection performance (less than 3% D-EER) and robustness with respect to various post-processings. Finally, the limitations of the developed methods are analyzed.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2020.2994750</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Biometrics ; Compression tests ; Datasets ; deep face representation ; differential attack detection ; Face ; Face recognition ; Feature extraction ; Forensics ; Image compression ; Morphing ; morphing attack detection ; morphing attacks ; Neural networks ; Probes ; Representations ; Robustness</subject><ispartof>IEEE transactions on information forensics and security, 2020, Vol.15, p.3625-3639</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c336t-1e9501dc239e334162d67f757d8a1b54d628931708e9c92460e334f9517973bc3</citedby><cites>FETCH-LOGICAL-c336t-1e9501dc239e334162d67f757d8a1b54d628931708e9c92460e334f9517973bc3</cites><orcidid>0000-0003-1901-9468 ; 0000-0002-9159-2923 ; 0000-0002-6280-048X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9093905$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,796,4024,27923,27924,27925,54758</link.rule.ids></links><search><creatorcontrib>Scherhag, Ulrich</creatorcontrib><creatorcontrib>Rathgeb, Christian</creatorcontrib><creatorcontrib>Merkle, Johannes</creatorcontrib><creatorcontrib>Busch, Christoph</creatorcontrib><title>Deep Face Representations for Differential Morphing Attack Detection</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection (MAD) have been proposed in the scientific literature. However, the MAD algorithms proposed so far have mostly been trained and tested on datasets whose distributions of image characteristics are either very limited (e.g., only created with a single morphing tool) or rather unrealistic (e.g., no print-scan transformation). As a consequence, these methods easily overfit on certain image types and the results presented cannot be expected to apply to real-world scenarios. For example, the results of the latest NIST FRVT MORPH show that the majority of submitted MAD algorithms lacks robustness and performance when considering unseen and challenging datasets. In this work, subsets of the FERET and FRGCv2 face databases are used to create a realistic database for training and testing of MAD algorithms, containing a large number of ICAO-compliant bona fide facial images, corresponding unconstrained probe images, and morphed images created with four different face morphing tools. Furthermore, multiple post-processings are applied on the reference images, e.g., print-scan and JPEG2000 compression. On this database, previously proposed differential morphing algorithms are evaluated and compared. In addition, the application of deep face representations for differential MAD algorithms is investigated. It is shown that algorithms based on deep face representations can achieve very high detection performance (less than 3% D-EER) and robustness with respect to various post-processings. Finally, the limitations of the developed methods are analyzed.</description><subject>Algorithms</subject><subject>Biometrics</subject><subject>Compression tests</subject><subject>Datasets</subject><subject>deep face representation</subject><subject>differential attack detection</subject><subject>Face</subject><subject>Face recognition</subject><subject>Feature extraction</subject><subject>Forensics</subject><subject>Image compression</subject><subject>Morphing</subject><subject>morphing attack detection</subject><subject>morphing attacks</subject><subject>Neural networks</subject><subject>Probes</subject><subject>Representations</subject><subject>Robustness</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><recordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE7d780cS2O0UBG0npd0M6upNYm76cF_b0JLTzMMzzvDPITcMjpjjMLDelm8zzjldMYBpFH0jEyYUjrVlLPzU8_EJbmKcUuplExnE5LniF1SlA6TN-wCRmz6sq_bJia-DUlee49hmNXlLnlpQ_dVN5_JvO9L953k2KMb2Wty4ctdxJtjnZKP4nG9eE5Xr0_LxXyVOiF0nzIERVnluAAUYrjPK228UabKSrZRstI8A8EMzRAccKnpiHlQzIARGyem5P6wtwvt7x5jb7ftPjTDScvl8DxIkHqg2IFyoY0xoLddqH_K8GcZtaMsO8qyoyx7lDVk7g6ZGhFPPFAQQJX4B2plY4g</recordid><startdate>2020</startdate><enddate>2020</enddate><creator>Scherhag, Ulrich</creator><creator>Rathgeb, Christian</creator><creator>Merkle, Johannes</creator><creator>Busch, Christoph</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-1901-9468</orcidid><orcidid>https://orcid.org/0000-0002-9159-2923</orcidid><orcidid>https://orcid.org/0000-0002-6280-048X</orcidid></search><sort><creationdate>2020</creationdate><title>Deep Face Representations for Differential Morphing Attack Detection</title><author>Scherhag, Ulrich ; Rathgeb, Christian ; Merkle, Johannes ; Busch, Christoph</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c336t-1e9501dc239e334162d67f757d8a1b54d628931708e9c92460e334f9517973bc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Biometrics</topic><topic>Compression tests</topic><topic>Datasets</topic><topic>deep face representation</topic><topic>differential attack detection</topic><topic>Face</topic><topic>Face recognition</topic><topic>Feature extraction</topic><topic>Forensics</topic><topic>Image compression</topic><topic>Morphing</topic><topic>morphing attack detection</topic><topic>morphing attacks</topic><topic>Neural networks</topic><topic>Probes</topic><topic>Representations</topic><topic>Robustness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Scherhag, Ulrich</creatorcontrib><creatorcontrib>Rathgeb, Christian</creatorcontrib><creatorcontrib>Merkle, Johannes</creatorcontrib><creatorcontrib>Busch, Christoph</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Scherhag, Ulrich</au><au>Rathgeb, Christian</au><au>Merkle, Johannes</au><au>Busch, Christoph</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Deep Face Representations for Differential Morphing Attack Detection</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2020</date><risdate>2020</risdate><volume>15</volume><spage>3625</spage><epage>3639</epage><pages>3625-3639</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection (MAD) have been proposed in the scientific literature. However, the MAD algorithms proposed so far have mostly been trained and tested on datasets whose distributions of image characteristics are either very limited (e.g., only created with a single morphing tool) or rather unrealistic (e.g., no print-scan transformation). As a consequence, these methods easily overfit on certain image types and the results presented cannot be expected to apply to real-world scenarios. For example, the results of the latest NIST FRVT MORPH show that the majority of submitted MAD algorithms lacks robustness and performance when considering unseen and challenging datasets. In this work, subsets of the FERET and FRGCv2 face databases are used to create a realistic database for training and testing of MAD algorithms, containing a large number of ICAO-compliant bona fide facial images, corresponding unconstrained probe images, and morphed images created with four different face morphing tools. Furthermore, multiple post-processings are applied on the reference images, e.g., print-scan and JPEG2000 compression. On this database, previously proposed differential morphing algorithms are evaluated and compared. In addition, the application of deep face representations for differential MAD algorithms is investigated. It is shown that algorithms based on deep face representations can achieve very high detection performance (less than 3% D-EER) and robustness with respect to various post-processings. Finally, the limitations of the developed methods are analyzed.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2020.2994750</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0003-1901-9468</orcidid><orcidid>https://orcid.org/0000-0002-9159-2923</orcidid><orcidid>https://orcid.org/0000-0002-6280-048X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2020, Vol.15, p.3625-3639
issn 1556-6013
1556-6021
language eng
recordid cdi_ieee_primary_9093905
source IEEE Electronic Library (IEL)
subjects Algorithms
Biometrics
Compression tests
Datasets
deep face representation
differential attack detection
Face
Face recognition
Feature extraction
Forensics
Image compression
Morphing
morphing attack detection
morphing attacks
Neural networks
Probes
Representations
Robustness
title Deep Face Representations for Differential Morphing Attack Detection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T13%3A11%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Deep%20Face%20Representations%20for%20Differential%20Morphing%20Attack%20Detection&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Scherhag,%20Ulrich&rft.date=2020&rft.volume=15&rft.spage=3625&rft.epage=3639&rft.pages=3625-3639&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2020.2994750&rft_dat=%3Cproquest_ieee_%3E2420294946%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2420294946&rft_id=info:pmid/&rft_ieee_id=9093905&rfr_iscdi=true