Abstract
Face morphing attacks create face images that are verifiable to multiple identities. Associating such images to identity documents lead to building faulty identity links, causing attacks on operations like border crossing. Most of previously proposed morphing attack detection approaches directly classified features extracted from the investigated image. We discuss the operational opportunity of having a live face probe to support the morphing detection decision and propose a detection approach that take advantage of that. Our proposed solution considers the facial landmarks shifting patterns between reference and probe images. This is represented by the directed distances to avoid confusion with shifts caused by other variations. We validated our approach using a publicly available database, built on 549 identities. Our proposed detection concept is tested with three landmark detectors and proved to outperform the baseline concept based on handcrafted and transferable CNN features.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agarwal, A., Singh, R., Vatsa, M., Noore, A.: SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017, pp. 659–665. IEEE (2017)
Ahonen, T., Hadid, A., Pietikäinen, M.: Face recognition with local binary patterns. In: Pajdla, T., Matas, J. (eds.) ECCV 2004. LNCS, vol. 3021, pp. 469–481. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24670-1_36
Amos, B., Ludwiczuk, B., Satyanarayanan, M.: OpenFace: a general-purpose face recognition library with mobile applications. Technical report, CMU-CS-16-118, CMU School of Computer Science (2016)
Biometix Pty Ltd.: Face morphing dataset (for vulnerability research) (2017). http://www.biometix.com/2017/09/18/new-face-morphing-dataset-for-vulnerability-research/
Bolle, R., Pankanti, S.: Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell (1998)
Cao, X., Wei, Y., Wen, F., Sun, J.: Face alignment by explicit shape regression. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 16–21 June 2012, pp. 2887–2894. IEEE Computer Society (2012)
Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, USA, 20–26 June 2005, pp. 886–893. IEEE Computer Society (2005)
Damer, N., et al.: CrazyFaces: unassisted circumvention of watchlist face identification. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2018, Los Angeles, California, USA, 22–25 October 2018. IEEE (2018)
Damer, N., Dimitrov, K.: Practical view on face presentation attack detection. In: Wilson, R.C., Hancock, E.R., Smith, W.A.P. (eds.) Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, 19–22 September 2016. BMVA Press (2016)
Damer, N., Saladié, A.M., Braun, A., Kuijper, A.: MorGAN: recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2018, Los Angeles, California, USA, 22–25 October 2018. IEEE (2018)
Damer, N., et al.: Deep learning-based face recognition and the robustness to perspective distortion. In: 24th International Conference on Pattern Recognition, ICPR 2018, Beijing, China, August 2018. IEEE (2018)
Dhamecha, T.I., Nigam, A., Singh, R., Vatsa, M.: Disguise detection and face recognition in visible and thermal spectrums. In: Fiérrez, J., Kumar, A., Vatsa, M., Veldhuis, R.N.J., Ortega-Garcia, J. (eds.) International Conference on Biometrics, ICB 2013, Madrid, Spain, 4–7 June 2013, pp. 1–8. IEEE (2013)
Ferrara, M., Cappelli, R., Maltoni, D.: On the feasibility of creating double-identity fingerprints. IEEE Trans. Inf. Forensics Secur. 12(4), 892–900 (2017)
Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics, Clearwater, IJCB 2014, FL, USA, 29 September–2 October 2014, pp. 1–7. IEEE (2014)
Ferrara, M., Franco, A., Maltoni, D.: On the effects of image alterations on face recognition accuracy. In: Bourlai, T. (ed.) Face Recognition Across the Imaging Spectrum, pp. 195–222. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-28501-6_9
Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. IEEE Trans. Inf. Forensics Secur. 13(4), 1008–1017 (2018)
Hildebrandt, M., Neubert, T., Makrushin, A., Dittmann, J.: Benchmarking face morphing forgery detection: application of stirtrace for impact simulation of different processing steps. In: 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, 4–5 April 2017, pp. 1–6. IEEE (2017)
International Civil Aviation Organisation (ICAO): ICAO draft technical report: portrait quality (reference facial images for MRTD). Technical report (version), September 2017
International Organization for Standardization: ISO/IEC DIS 30107–3:2016: information technology - biometric presentation attack detection - part 3: testing and reporting. Standard (2017)
Kähm, O., Damer, N.: 2D face liveness detection: an overview. In: Brömme, A., Busch, C. (eds.) Proceedings of the International Conference of Biometrics Special Interest Group, 2012 BIOSIG, Darmstadt, Germany, 6–7 September 2012. LNI, vol. 197, pp. 1–12. IEEE/GI (2012)
Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, 23–28 June 2014, pp. 1867–1874. IEEE Computer Society (2014)
Mallick, S.: Face morph using opencv - c++/python (2016). https://www.learnopencv.com/face-morph-using-opencv-cpp-python/
Markets and Markets: Facial recognition market by component (software tools and services), technology, use case (emotion recognition, attendance tracking and monitoring, access control, law enforcement), end-user, and region - global forecast to 2022. Report, November 2017
Neubert, T.: Face morphing detection: an approach based on image degradation analysis. In: Kraetzer, C., Shi, Y.-Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 93–106. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-64185-0_8
Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1090–1104 (2000)
Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.J.: The FERET database and evaluation procedure for face-recognition algorithms. Image Vis. Comput. 16(5), 295–306 (1998)
Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Face morphing versus face averaging: vulnerability and detection. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017, pp. 555–563. IEEE (2017)
Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops, Honolulu, HI, USA, 21–26 July 2017, pp. 1822–1830. IEEE Computer Society (2017)
Ramachandra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: 8th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, Niagara Falls, NY, USA, 6–9 September 2016, pp. 1–7. IEEE (2016)
Rathgeb, C., Busch, C.: On the feasibility of creating morphed iris-codes. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017, pp. 152–157. IEEE (2017)
Ren, S., Cao, X., Wei, Y., Sun, J.: Face alignment at 3000 FPS via regressing local binary features. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, 23–28 June 2014, pp. 1685–1692. IEEE Computer Society (2014)
Robertson, D.J., Kramer, R.S.S., Burton, A.M.: Fraudulent ID using face morphs: experiments on human and automatic recognition. PLoS One 12(3), 1–12 (2017)
Sagonas, C., Antonakos, E., Tzimiropoulos, G., Zafeiriou, S., Pantic, M.: 300 faces in-the-wild challenge: database and results. Image Vis. Comput. 47, 3–18 (2016)
Scherhag, U., Budhrani, D., Gomez-Barrero, M., Busch, C.: Detecting morphed face images using facial landmarks. In: Mansouri, A., El Moataz, A., Nouboud, F., Mammass, D. (eds.) ICISP 2018. LNCS, vol. 10884, pp. 444–452. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94211-7_48
Scherhag, U., et al.: Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: Brömme, A., Busch, C., Dantcheva, A., Rathgeb, C., Uhl, A. (eds.) International Conference of the Biometrics Special Interest Group, BIOSIG 2017, Darmstadt, Germany, 20–22 September 2017. LNI, vol. P-270, pp. 149–159. GI/IEEE (2017)
Scherhag, U., Ramachandra, R., Raja, K.B., Gomez-Barrero, M., Rathgeb, C., Busch, C.: On the vulnerability of face recognition systems towards morphed face attacks. In: 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, 4–5 April 2017, pp. 1–6. IEEE (2017)
Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, 7–12 June 2015, pp. 815–823. IEEE Computer Society (2015)
Acknowledgment
This work was supported by the German Federal Ministry of Education and Research (BMBF) as well as by the Hessen State Ministry for Higher Education, Research and the Arts (HMWK) within CRISP. Portions of the research in this paper use the FERET database of facial images collected under the FERET program, sponsored by the DOD Counterdrug Technology Development Program Office [25, 26].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Damer, N. et al. (2019). Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts. In: Brox, T., Bruhn, A., Fritz, M. (eds) Pattern Recognition. GCPR 2018. Lecture Notes in Computer Science(), vol 11269. Springer, Cham. https://doi.org/10.1007/978-3-030-12939-2_36
Download citation
DOI: https://doi.org/10.1007/978-3-030-12939-2_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12938-5
Online ISBN: 978-3-030-12939-2
eBook Packages: Computer ScienceComputer Science (R0)