Skip to main content

A Novel Framework for Detection of Morphed Images Using Deep Learning Techniques

  • Chapter
New Trends in Computational Vision and Bio-inspired Computing

Abstract

The paper deals with the break-ins that the modern-day biometric verification systems like Automatic Border Control, facial unlocking scheme as in many smartphones, and other photo-ID documents generation and verification systems face. One of the most prominent attacks is the facial morphing attack, wherein the system is fooled by asking it to do facial recognition and matching of a person with a photo which is morphed and has features of two persons overlapped. The proposed framework gives a deep insight into the concept of image morphing and the way to analyze the features and allocate them priorities. The system tries to integrate all the features of image that could possibly have an influence on the face image if morphed with another face image. The paper also presents an account of the advantages and disadvantages as well as the intuition of various approaches of face image morphing detection, especially we take into account the deep learning models that have been used previously and try to tune in the parameters and analyze their complexity in order to try various methods to reduce the overfitting of such models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Makrushin, Andrey, Tom Neubert and Jana Dittmann. “Automatic Generation and Detection of Visually Faultless Facial Morphs.” VISIGRAPP (2017).

    Google Scholar 

  2. Beier, T., Neely, S.: Feature-based image metamorphosis. In: Proceedings of the 19th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1992, pp. 35–42. ACM, New York (1992)

    Google Scholar 

  3. C. Seibold, W. Samek, A. Hilsmann, and P. Eisert. Detection of face morphing attacks by deep learning. In Proc. Int. Workshop on Digital Watermarking (IWDW), pages 107–120, 2017.

    Google Scholar 

  4. Clemens Seibold, Anna Hilsmann, Peter Eisert, Reflection Analysis for Face Morphing Attack Detection, arXiv:1807.02030v1 [cs.CV] 5 Jul 2018

    Google Scholar 

  5. Christian Kraetzer et al., Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing, Session: Media Forensics & Counterforensics IH&MMSec’17, June 20-22, 2017, Philadelphia, PA, USA

    Google Scholar 

  6. Andrey Makrushin,Christian Kraetzer, Tom Neubertand Jana Dittmann, Generalized Benford’s Law for Blind Detection of Morphed Face Images, Session: Biometrics and Forensics IH&MMSec’18, June 20–22, 2018, Innsbruck, Austria

    Google Scholar 

  7. J. Maatta, A. Hadid, and M. Pietikainen. Face spoofing detection from single images using micro-texture analysis. In Biometrics (IJCB), 2011 International Joint Conference on Biometrics, pages 1–7, Oct 2011.

    Google Scholar 

  8. M. Hildebrandt,T. Neubert, A. Makrushin, and J. Dittmann.2017. Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps. In Proc. 5th Int. Workshop on Biometrics and Forensics (IWBF). 1–6.

    Google Scholar 

  9. M. Ferrara, A. Franco, and D. Maltoni. The magic passport. In Biometrics (IJCB), 2014 IEEE International Joint Conference on Biometrics, pages 1–7, 2014.

    Google Scholar 

  10. U. Scherhag, et al. Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting. In Int. Conf. of the Biometrics Special Interest Group (BIOSIG), pages 1–12, 2017.

    Google Scholar 

  11. I. Chingovska, A. R. D. Anjos and S. Marcel, “Biometrics Evaluation Under Spoofing Attacks,” in IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2264–2276, Dec. 2014.

    Google Scholar 

  12. A. Hadid, N. Evans, S. Marcel and J. Fierrez, “Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned,” in IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 20–30, Sept. 2015.

    Google Scholar 

  13. U. Scherhag, C. Rathgeb and C. Busch, Towards detection of morphed face images in electronic travel documents, 2018 13th IAPR International Workshop on Document Analysis Systems

    Google Scholar 

  14. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems 25. Curran Associates, Inc., pp. 1097–1105 (2 Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A.: Going deeper with convolutions. In: Computer Vision and Pattern Recognition (CVPR) (2015)

    Google Scholar 

  15. Clemens Seibold, Wojciech Samek, Anna Hilsmann and Peter Eisert, Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks, arXiv:1806.04265v1 [cs.CV] 11 Jun 2018

    Google Scholar 

  16. Kaiming He Xiangyu Zhang Shaoqing Ren Jian, Deep Residual Learning for Image Recognition, arXiv:1512.03385v1 [cs.CV] 10 Dec 2015

    Google Scholar 

  17. Yu, J., Zhan, Y., Yang, J., Kang, X.: A multi-purpose image counter-anti-forensic method using convolutional neural networks. In: Shi, Y.Q., Kim, H.J., PerezGonzalez, F., Liu, F. (eds.) IWDW 2016. LNCS, vol. 10082, pp. 3–15. Springer, Cham (2017). doi:https://doi.org/10.1007/978-3-319-53465-71

    Chapter  Google Scholar 

  18. Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. Proc. SPIE 7541, 754110–754110–12 (2010)

    Google Scholar 

  19. Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)

    Article  Google Scholar 

  20. Alex Krizhevsky et al., Dropout: A Simple Way to Prevent Neural Networks from Overfitting, Journal of Machine Learning Research 15 (2014) 1929–1958

    Google Scholar 

  21. S. Liao, X. Zhu, Z. Lei, L. Zhang, and S. Z. Li. Learning multi-scale block local binary patterns for face recognition. In Proc. Int’l Conf. on Biometrics (ICB’07), pages 828–837, 2007

    Google Scholar 

  22. J. Kannala and E. Rahtu. Bsif: Binarized statistical image features. In Pattern Recognition (ICPR), 2012 21st International Conference on, pages 1363–1366, 2012.

    Google Scholar 

  23. H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool. SpeededUp Robust Features (SURF). Computer Vision and Image Understanding, 110(3):346–359, 2008.

    Google Scholar 

  24. Ebrahim Karami, Siva Prasad, and Mohamed Shehata, Image Matching Using SIFT, SURF, BRIEF and ORB: Performance Comparison for Distorted Images

    Google Scholar 

  25. Ulrich Scherhag, Christian Rathgeb, Christoph Busch, Morph Detection from Single Face Image: a Multi-Algorithm Fusion Approach, ICBEA ‘18 Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, Pages 6-12, Amsterdam, Netherlands—May 16–18, 2018

    Google Scholar 

  26. Vilas H. Gaidhane, Yogesh V. Hote, Vijander Singh, A New Approach for Estimation of Eigenvalues of Images, International Journal of Computer Applications (0975-8887) Volume 26–No. 9, July 2011

    Google Scholar 

  27. Erwin Kreyszig, Advanced Engineering Mathematics 9th edition

    Google Scholar 

  28. Christian Lipski, Christian Linz, Marcus Magnor. Belief Propagation Optical Flow for High-Resolution Image Morphing, SIGGRAPH 2010, Los Angeles, California, July 25–29, 2010. ISBN 978-1-4503-0210-4/10/0007

    Google Scholar 

  29. Federico Monti et al., Geometric deep learning on graphs and manifolds using mixture model CNNs, arXiv:1611.08402v3 [cs.CV] 6 Dec 2016

    Google Scholar 

  30. Lapuschkin, S., Binder, A., Montavon, G., M¨uller, K.R., Samek, W.: Analyzing classifiers: fisher vectors and deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2912–2920 (2016)

    Google Scholar 

  31. Chiyuan Zhang et al., Understanding deep learning requires rethinking generalization, arXiv:1611.03530v2 [cs.LG] 26 Feb 2017

    Google Scholar 

  32. Kirchner, M., Gloe, T.: On resampling detection in re-compressed images. In: 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), 21–25 December 2009

    Google Scholar 

  33. Ch. Nastar, B. Moghadam, and A. Pentland, “Generalized Image Matching: Statistical Learning of Physically-Based Deformations”, Lecture Notes in Computer Science, Computer Vision - ECCV ‘96, B. Buxton and R. Cipolla (Eds.), Springer, pp. 589–598, 1996.

    Google Scholar 

  34. Yasushi Yagi, Facial Feature Extraction from Frontal Face Image, Proceedings of ICSP2000

    Google Scholar 

  35. P. Viola and M. J. Jones. Robust real-time face detection. International Journal of Computer Vision, 57(2):137–154.

    Google Scholar 

  36. Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Sig. Process. 53(2), 758–767 (2005)

    Article  MathSciNet  Google Scholar 

  37. Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Secur. 3(4), 582–592 (2008)

    Article  Google Scholar 

  38. E. Rosten and T. Drummond “Fusing Points and Lines for High Performance Tracking” (2005) IEEE International Conference on Computer Vision. 2: 1508–1511 DOI:https://doi.org/10.1109/ICCV.2005.104

    Article  Google Scholar 

  39. P. J. Grother, R. J. Micheals, and P. Phillips. Face recognition vendor test 2002 performance metrics. In Proceedings of the 4th International Conference on Audio Visual Based Person Authentication, AVBPA’03, pages 937–945, Guildford, UK, June 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Cite this chapter

Rahman, M.E.U., Waseem, M.S. (2020). A Novel Framework for Detection of Morphed Images Using Deep Learning Techniques. In: Smys, S., Iliyasu, A.M., Bestak, R., Shi, F. (eds) New Trends in Computational Vision and Bio-inspired Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-41862-5_17

Download citation

Publish with us

Policies and ethics