Abstract
The paper deals with the break-ins that the modern-day biometric verification systems like Automatic Border Control, facial unlocking scheme as in many smartphones, and other photo-ID documents generation and verification systems face. One of the most prominent attacks is the facial morphing attack, wherein the system is fooled by asking it to do facial recognition and matching of a person with a photo which is morphed and has features of two persons overlapped. The proposed framework gives a deep insight into the concept of image morphing and the way to analyze the features and allocate them priorities. The system tries to integrate all the features of image that could possibly have an influence on the face image if morphed with another face image. The paper also presents an account of the advantages and disadvantages as well as the intuition of various approaches of face image morphing detection, especially we take into account the deep learning models that have been used previously and try to tune in the parameters and analyze their complexity in order to try various methods to reduce the overfitting of such models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Makrushin, Andrey, Tom Neubert and Jana Dittmann. “Automatic Generation and Detection of Visually Faultless Facial Morphs.” VISIGRAPP (2017).
Beier, T., Neely, S.: Feature-based image metamorphosis. In: Proceedings of the 19th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 1992, pp. 35–42. ACM, New York (1992)
C. Seibold, W. Samek, A. Hilsmann, and P. Eisert. Detection of face morphing attacks by deep learning. In Proc. Int. Workshop on Digital Watermarking (IWDW), pages 107–120, 2017.
Clemens Seibold, Anna Hilsmann, Peter Eisert, Reflection Analysis for Face Morphing Attack Detection, arXiv:1807.02030v1 [cs.CV] 5 Jul 2018
Christian Kraetzer et al., Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing, Session: Media Forensics & Counterforensics IH&MMSec’17, June 20-22, 2017, Philadelphia, PA, USA
Andrey Makrushin,Christian Kraetzer, Tom Neubertand Jana Dittmann, Generalized Benford’s Law for Blind Detection of Morphed Face Images, Session: Biometrics and Forensics IH&MMSec’18, June 20–22, 2018, Innsbruck, Austria
J. Maatta, A. Hadid, and M. Pietikainen. Face spoofing detection from single images using micro-texture analysis. In Biometrics (IJCB), 2011 International Joint Conference on Biometrics, pages 1–7, Oct 2011.
M. Hildebrandt,T. Neubert, A. Makrushin, and J. Dittmann.2017. Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps. In Proc. 5th Int. Workshop on Biometrics and Forensics (IWBF). 1–6.
M. Ferrara, A. Franco, and D. Maltoni. The magic passport. In Biometrics (IJCB), 2014 IEEE International Joint Conference on Biometrics, pages 1–7, 2014.
U. Scherhag, et al. Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting. In Int. Conf. of the Biometrics Special Interest Group (BIOSIG), pages 1–12, 2017.
I. Chingovska, A. R. D. Anjos and S. Marcel, “Biometrics Evaluation Under Spoofing Attacks,” in IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2264–2276, Dec. 2014.
A. Hadid, N. Evans, S. Marcel and J. Fierrez, “Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned,” in IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 20–30, Sept. 2015.
U. Scherhag, C. Rathgeb and C. Busch, Towards detection of morphed face images in electronic travel documents, 2018 13th IAPR International Workshop on Document Analysis Systems
Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems 25. Curran Associates, Inc., pp. 1097–1105 (2 Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A.: Going deeper with convolutions. In: Computer Vision and Pattern Recognition (CVPR) (2015)
Clemens Seibold, Wojciech Samek, Anna Hilsmann and Peter Eisert, Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks, arXiv:1806.04265v1 [cs.CV] 11 Jun 2018
Kaiming He Xiangyu Zhang Shaoqing Ren Jian, Deep Residual Learning for Image Recognition, arXiv:1512.03385v1 [cs.CV] 10 Dec 2015
Yu, J., Zhan, Y., Yang, J., Kang, X.: A multi-purpose image counter-anti-forensic method using convolutional neural networks. In: Shi, Y.Q., Kim, H.J., PerezGonzalez, F., Liu, F. (eds.) IWDW 2016. LNCS, vol. 10082, pp. 3–15. Springer, Cham (2017). doi:https://doi.org/10.1007/978-3-319-53465-71
Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. Proc. SPIE 7541, 754110–754110–12 (2010)
Stamm, M.C., Liu, K.J.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)
Alex Krizhevsky et al., Dropout: A Simple Way to Prevent Neural Networks from Overfitting, Journal of Machine Learning Research 15 (2014) 1929–1958
S. Liao, X. Zhu, Z. Lei, L. Zhang, and S. Z. Li. Learning multi-scale block local binary patterns for face recognition. In Proc. Int’l Conf. on Biometrics (ICB’07), pages 828–837, 2007
J. Kannala and E. Rahtu. Bsif: Binarized statistical image features. In Pattern Recognition (ICPR), 2012 21st International Conference on, pages 1363–1366, 2012.
H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool. SpeededUp Robust Features (SURF). Computer Vision and Image Understanding, 110(3):346–359, 2008.
Ebrahim Karami, Siva Prasad, and Mohamed Shehata, Image Matching Using SIFT, SURF, BRIEF and ORB: Performance Comparison for Distorted Images
Ulrich Scherhag, Christian Rathgeb, Christoph Busch, Morph Detection from Single Face Image: a Multi-Algorithm Fusion Approach, ICBEA ‘18 Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, Pages 6-12, Amsterdam, Netherlands—May 16–18, 2018
Vilas H. Gaidhane, Yogesh V. Hote, Vijander Singh, A New Approach for Estimation of Eigenvalues of Images, International Journal of Computer Applications (0975-8887) Volume 26–No. 9, July 2011
Erwin Kreyszig, Advanced Engineering Mathematics 9th edition
Christian Lipski, Christian Linz, Marcus Magnor. Belief Propagation Optical Flow for High-Resolution Image Morphing, SIGGRAPH 2010, Los Angeles, California, July 25–29, 2010. ISBN 978-1-4503-0210-4/10/0007
Federico Monti et al., Geometric deep learning on graphs and manifolds using mixture model CNNs, arXiv:1611.08402v3 [cs.CV] 6 Dec 2016
Lapuschkin, S., Binder, A., Montavon, G., M¨uller, K.R., Samek, W.: Analyzing classifiers: fisher vectors and deep neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2912–2920 (2016)
Chiyuan Zhang et al., Understanding deep learning requires rethinking generalization, arXiv:1611.03530v2 [cs.LG] 26 Feb 2017
Kirchner, M., Gloe, T.: On resampling detection in re-compressed images. In: 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), 21–25 December 2009
Ch. Nastar, B. Moghadam, and A. Pentland, “Generalized Image Matching: Statistical Learning of Physically-Based Deformations”, Lecture Notes in Computer Science, Computer Vision - ECCV ‘96, B. Buxton and R. Cipolla (Eds.), Springer, pp. 589–598, 1996.
Yasushi Yagi, Facial Feature Extraction from Frontal Face Image, Proceedings of ICSP2000
P. Viola and M. J. Jones. Robust real-time face detection. International Journal of Computer Vision, 57(2):137–154.
Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of resampling. IEEE Trans. Sig. Process. 53(2), 758–767 (2005)
Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Secur. 3(4), 582–592 (2008)
E. Rosten and T. Drummond “Fusing Points and Lines for High Performance Tracking” (2005) IEEE International Conference on Computer Vision. 2: 1508–1511 DOI:https://doi.org/10.1109/ICCV.2005.104
P. J. Grother, R. J. Micheals, and P. Phillips. Face recognition vendor test 2002 performance metrics. In Proceedings of the 4th International Conference on Audio Visual Based Person Authentication, AVBPA’03, pages 937–945, Guildford, UK, June 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rahman, M.E.U., Waseem, M.S. (2020). A Novel Framework for Detection of Morphed Images Using Deep Learning Techniques. In: Smys, S., Iliyasu, A.M., Bestak, R., Shi, F. (eds) New Trends in Computational Vision and Bio-inspired Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-41862-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-41862-5_17
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41861-8
Online ISBN: 978-3-030-41862-5
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)