[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/BTAS.2018.8698563guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network

Published: 22 October 2018 Publication History

Abstract

Face morphing attacks aim at creating face images that are verifiable to be the face of multiple identities, which can lead to building faulty identity links in operations like border crossing. Research has been focused on creating more accurate attack detection approaches by considering different image properties. However, all the attacks considered so far are based on manipulating facial landmarks localized in the morphed face images. In contrast, this work presents novel face morphing attacks based on image generated by generative adversarial networks. We present the MorGAN structure that considers the representation loss to successfully create realistic morphing attacks. Based on that, we present a novel face morphing attacks database (MorGAN database) that contains 1000 morph images for both, the proposed MorGAN and landmark-based attacks. We present vulnerability analysis of two face recognition approaches facing the proposed attacks. Moreover, the detectability of the proposed MorGAN attacks is studied, in the scenarios where this type of attacks is know and un- known. We concluded with pointing out the challenge of detecting such unknown novel attacks and an analysis of detection performances of different features in detecting such attacks.

References

[1]
T. Ahonen, A. Hadid, and M. Pietikäinen. Face recognition with local binary patterns. In T. Pajdla and J. Matas, editors, Computer Vision - ECCV 2004, 8th European Conference on Computer Vision, Prague, Czech Republic, May 11-14, 2004. Proceedings, Part I, volume 3021 of Lecture Notes in Computer Science, pages 469–481. Springer, 2004.
[2]
B. Amos, B. Ludwiczuk, and M. Satyanarayanan. Openface: A general-purpose face recognition library with mobile applications. Technical report, CMU-CS-16-118, CMU School of Computer Science, 2016.
[3]
G. Antipov, M. Baccouche, and J. Dugelay. Face aging with conditional generative adversarial networks. In 2017 IEEE International Conference on Image Processing, ICIP 2017, Beijing, China, September 17-20, 2017, pages 2089–2093. IEEE, 2017.
[4]
Y. Bengio, E. Laufer, G. Alain, and J. Yosinski. Deep generative stochastic networks trainable by backprop. In International Conference on Machine Learning, pages 226–234, 2014.
[5]
R. Bolle and S. Pankanti. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell, MA, USA, 1998.
[6]
C. Chu, A. Zhmoginov, and M. Sandler. Cyclegan: a master of steganography. arXiv preprint arXiv:1712.02950, 2017.
[7]
N. Damer, V. Boller, Y. Wainakh, F. Boutros, P. Terhorst,¨ A. Braun, and A. Kuijper. Detecting face morphing attacks by analyzing the directed distances of facial landmarks shifts. In Pattern Recognition - 40th German Conference, GCPR 2018, Stuttgart, Germany, October 10-12, 2018, Proceedings, Lecture Notes in Computer Science. Springer, 2018.
[8]
N. Damer, V. Boller, Y. Wainakh, S. von den Berken, P. Terhörst, A. Braun, and A. Kuijper. CrazyFaces: Unassisted circumvention of watchlist face identification. In 9th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2018, Los Angeles, California, USA, October 22-25, 2018. IEEE, 2018.
[9]
N. Damer and K. Dimitrov. Practical view on face presentation attack detection. In R. C. Wilson, E. R. Hancock, and W. A. P. Smith, editors, Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, September 19-22, 2016. BMVA Press, 2016.
[10]
T. I. Dhamecha, A. Nigam, R. Singh, and M. Vatsa. Disguise detection and face recognition in visible and thermal spectrums. In J. Fierrez, A. Kumar, M. Vatsa, R. N. J. Veldhuis,´ and J. Ortega-Garcia, editors, International Conference on Biometrics, ICB 2013, 4-7 June, 2013, Madrid, Spain, pages 1–8. IEEE, 2013.
[11]
J. Donahue, P. Krähenbühl, and T. Darrell. Adversarial feature learning. arXiv preprint arXiv:1605.09782, 2016.
[12]
V. Dumoulin, I. Belghazi, B. Poole, O. Mastropietro, A. Lamb, M. Arjovsky, and A. Courville. Adversarially learned inference. arXiv preprint arXiv:1606.00704, 2016.
[13]
M. Ferrara, R. Cappelli, and D. Maltoni. On the feasibility of creating double-identity fingerprints. IEEE Trans. Information Forensics and Security, 12(4):892–900, 2017.
[14]
M. Ferrara, A. Franco, and D. Maltoni. The magic passport. In IEEE International Joint Conference on Biometrics, Clearwater, IJCB 2014, FL, USA, September 29 - October 2, 2014, pages 1–7. IEEE, 2014.
[15]
M. Ferrara, A. Franco, and D. Maltoni. On the effects of image alterations on face recognition accuracy. In T. Bourlai, editor, Face Recognition Across the Imaging Spectrum, pages 195–222. Springer, 2016.
[16]
M. Ferrara, A. Franco, and D. Maltoni. Face demorphing. IEEE Trans. Information Forensics and Security, 13(4):1008–1017, 2018.
[17]
D. Frossard. VGG in TensorFlow, url: http://www.cs.toronto.edu/frossard/post/vgg16/ (visited on 08/10/2018).
[18]
Z. Gan, L. Chen, W. Wang, Y. Pu, Y. Zhang, H. Liu, C. Li, and L. Carin. Triangle generative adversarial networks. In Advances in Neural Information Processing Systems, pages 5247–5256, 2017.
[19]
I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial nets. In Advances in neural information processing systems, pages 2672–2680, 2014.
[20]
R. Huang, S. Zhang, T. Li, R. He, et al. Beyond face rotation: Global and local perception gan for photorealistic and identity preserving frontal view synthesis. arXiv preprint arXiv:1704.04086, 2017.
[21]
International Civil Aviation Organisation (ICAO). ICAO Draft Technical Report: Portrait quality (reference facial images for MRTD). technical report, Version 0.9, 2017.
[22]
International Organization for Standardization. ISO/IEC DIS 30107-3:2016: Information Technology Biometric presentation attack detection Part 3: Testing and reporting. Standard, 2017.
[23]
O. Kähm and N. Damer. 2d face liveness detection: An overview. In A. Brömme and C. Busch, editors, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group, Darmstadt, Germany, September 6-7, 2012, volume 197 of LNI, pages 1–12. IEEE/GI, 2012.
[24]
T. Karras, T. Aila, S. Laine, and J. Lehtinen. Progressive growing of gans for improved quality, stability, and variation. CoRR, abs/1710.10196, 2017.
[25]
V. Kazemi and J. Sullivan. One millisecond face alignment with an ensemble of regression trees. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1867–1874, 2014.
[26]
T. Kim, M. Cha, H. Kim, J. K. Lee, and J. Kim. Learning to discover cross-domain relations with generative adversarial networks. arXiv preprint arXiv:1703.05192, 2017.
[27]
D. P. Kingma and J. Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
[28]
D. P. Kingma and M. Welling. Auto-encoding variational bayes. CoRR, abs/1312.6114, 2013.
[29]
D.-T. Lee and B. J. Schachter. Two algorithms for constructing a delaunay triangulation. International Journal of Computer & Information Sciences, 9(3):219–242, 1980.
[30]
J. Lin. Divergence measures based on the shannon entropy. IEEE Transactions on Information theory, 37(1):145–151, 1991.
[31]
X. Liu, B. V. Kumar, Y. Ge, C. Yang, J. You, and P. Jia. Normalized face image generation with perceptron generative adversarial networks. In Identity, Security, and Behavior Analysis (ISBA), 2018 IEEE 4th International Conference on, pages 1–8. IEEE, 2018.
[32]
Z. Liu, P. Luo, X. Wang, and X. Tang. Deep learning face attributes in the wild. In Proceedings of International Conference on Computer Vision (ICCV), 2015.
[33]
S. Mallick. Face morph using opencv c++ / python. http://www.learnopencv.com/face-morph-usingopencv-cpp-python/, 2016.
[34]
Markets and Markets. Facial Recognition Market by Component (Software Tools and Services), Technology, Use Case (Emotion Recognition, Attendance Tracking and Monitoring, Access Control, Law Enforcement), End-User, and Region - Global Forecast to 2022. Report, November 2017.
[35]
T. Neubert. Face morphing detection: An approach based on image degradation analysis. In C. Kraetzer, Y. Shi, J. Dittmann, and H. J. Kim, editors, Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings, volume 10431 of Lecture Notes in Computer Science, pages 93–106. Springer, 2017.
[36]
O. M. Parkhi, A. Vedaldi, and A. Zisserman. Deep face recognition. In X. Xie, M. W. Jones, and G. K. L. Tam, editors, Proceedings of the British Machine Vision Conference 2015, BMVC 2015, Swansea, UK, September 7-10, 2015, pages 41.1–41.12. BMVA Press, 2015.
[37]
A. Radford, L. Metz, and S. Chintala. Unsupervised representation learning with deep convolutional generative adversarial networks. CoRR, abs/1511.06434, 2015.
[38]
R. Ramachandra, K. B. Raja, and C. Busch. Detecting morphed face images. In 8th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, Niagara Falls, NY, USA, September 6-9, 2016, pages 1–7. IEEE, 2016.
[39]
R. Ramachandra, K. B. Raja, S. Venkatesh, and C. Busch. Face morphing versus face averaging: Vulnerability and detection. In 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, October 1-4, 2017, pages 555–563. IEEE, 2017.
[40]
R. Ramachandra, K. B. Raja, S. Venkatesh, and C. Busch. Transferable deep-cnn features for detecting digital and print-scanned morphed face images. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops, Honolulu, HI, USA, July 21-26, 2017, pages 1822–1830. IEEE Computer Society, 2017.
[41]
C. Rathgeb and C. Busch. On the feasibility of creating morphed iris-codes. In 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, October 1-4, 2017, pages 152–157. IEEE, 2017.
[42]
D. J. Rezende, S. Mohamed, and D. Wierstra. Stochastic backpropagation and approximate inference in deep generative models. arXiv preprint arXiv:1401.4082, 2014.
[43]
D. J. Robertson, R. S. S. Kramer, and A. M. Burton. Fraudulent id using face morphs: Experiments on human and automatic recognition. PLOS ONE, 12(3):1–12, 03 2017.
[44]
U. Scherhag, A. Nautsch, C. Rathgeb, M. Gomez-Barrero, R. N. J. Veldhuis, L. J. Spreeuwers, M. Schils, D. Maltoni, P. Grother, S. Marcel, R. Breithaupt, R. Ramachandra, and C. Busch. Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting. In A. Brömme, C. Busch, A. Dantcheva, C. Rathgeb, and A. Uhl, editors, International Conference of the Biometrics Special Interest Group, BIOSIG 2017, Darmstadt, Germany, September 20-22, 2017, volume P-270 of LNI, pages 149–159. GI / IEEE, 2017.
[45]
U. Scherhag, R. Ramachandra, K. B. Raja, M. GomezBarrero, C. Rathgeb, and C. Busch. On the vulnerability of face recognition systems towards morphed face attacks. In 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, April 4-5, 2017, pages 1–6. IEEE, 2017.
[46]
F. Schroff, D. Kalenichenko, and J. Philbin. Facenet: A unified embedding for face recognition and clustering. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015, pages 815–823. IEEE Computer Society, 2015.
[47]
M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter. Adversarial generative nets: Neural network attacks on state-of-the-art face recognition. CoRR, abs/1801.00349, 2018.
[48]
T. T. D. Team, R. Al-Rfou, G. Alain, A. Almahairi, C. Angermueller, D. Bahdanau, N. Ballas, F. Bastien, J. Bayer, A. Belikov, et al. Theano: A python framework for fast computation of mathematical expressions. arXiv preprint arXiv:1605.02688, 2016.
[49]
L. Theis, A. van den Oord, and M. Bethge. A note on the evaluation of generative models. CoRR, abs/1511.01844, 2015.
[50]
Z. Yi, H. Zhang, P. Tan, and M. Gong. Dualgan: Unsupervised dual learning for image-to-image translation. arXiv preprint, 2017.

Cited By

View all

Index Terms

  1. MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Guide Proceedings
          2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)
          Oct 2018
          529 pages

          Publisher

          IEEE Press

          Publication History

          Published: 22 October 2018

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 18 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2023)Synthetic data for face recognitionImage and Vision Computing10.1016/j.imavis.2023.104688135:COnline publication date: 1-Jul-2023
          • (2023)Impact of Synthetic Images on Morphing Attack Detection Using a Siamese NetworkProgress in Pattern Recognition, Image Analysis, Computer Vision, and Applications10.1007/978-3-031-49018-7_25(343-357)Online publication date: 27-Nov-2023
          • (2022)Face morphing attack detection and attacker identification based on a watchlistImage Communication10.1016/j.image.2022.116748107:COnline publication date: 1-Sep-2022
          • (2020)On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection2020 IEEE International Joint Conference on Biometrics (IJCB)10.1109/IJCB48548.2020.9304856(1-10)Online publication date: 28-Sep-2020
          • (2019)Realistic Dreams: Cascaded Enhancement of GAN-generated Images with an Example in Face Morphing Attacks2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS)10.1109/BTAS46853.2019.9185994(1-10)Online publication date: 23-Sep-2019

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media