Skip to main content

Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 11269))

Abstract

Face morphing attacks create face images that are verifiable to multiple identities. Associating such images to identity documents lead to building faulty identity links, causing attacks on operations like border crossing. Most of previously proposed morphing attack detection approaches directly classified features extracted from the investigated image. We discuss the operational opportunity of having a live face probe to support the morphing detection decision and propose a detection approach that take advantage of that. Our proposed solution considers the facial landmarks shifting patterns between reference and probe images. This is represented by the directed distances to avoid confusion with shifts caused by other variations. We validated our approach using a publicly available database, built on 549 identities. Our proposed detection concept is tested with three landmark detectors and proved to outperform the baseline concept based on handcrafted and transferable CNN features.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Agarwal, A., Singh, R., Vatsa, M., Noore, A.: SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017, pp. 659–665. IEEE (2017)

    Google Scholar 

  2. Ahonen, T., Hadid, A., Pietikäinen, M.: Face recognition with local binary patterns. In: Pajdla, T., Matas, J. (eds.) ECCV 2004. LNCS, vol. 3021, pp. 469–481. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24670-1_36

    Chapter  Google Scholar 

  3. Amos, B., Ludwiczuk, B., Satyanarayanan, M.: OpenFace: a general-purpose face recognition library with mobile applications. Technical report, CMU-CS-16-118, CMU School of Computer Science (2016)

    Google Scholar 

  4. Biometix Pty Ltd.: Face morphing dataset (for vulnerability research) (2017). http://www.biometix.com/2017/09/18/new-face-morphing-dataset-for-vulnerability-research/

  5. Bolle, R., Pankanti, S.: Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell (1998)

    Google Scholar 

  6. Cao, X., Wei, Y., Wen, F., Sun, J.: Face alignment by explicit shape regression. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 16–21 June 2012, pp. 2887–2894. IEEE Computer Society (2012)

    Google Scholar 

  7. Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, USA, 20–26 June 2005, pp. 886–893. IEEE Computer Society (2005)

    Google Scholar 

  8. Damer, N., et al.: CrazyFaces: unassisted circumvention of watchlist face identification. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2018, Los Angeles, California, USA, 22–25 October 2018. IEEE (2018)

    Google Scholar 

  9. Damer, N., Dimitrov, K.: Practical view on face presentation attack detection. In: Wilson, R.C., Hancock, E.R., Smith, W.A.P. (eds.) Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, 19–22 September 2016. BMVA Press (2016)

    Google Scholar 

  10. Damer, N., Saladié, A.M., Braun, A., Kuijper, A.: MorGAN: recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2018, Los Angeles, California, USA, 22–25 October 2018. IEEE (2018)

    Google Scholar 

  11. Damer, N., et al.: Deep learning-based face recognition and the robustness to perspective distortion. In: 24th International Conference on Pattern Recognition, ICPR 2018, Beijing, China, August 2018. IEEE (2018)

    Google Scholar 

  12. Dhamecha, T.I., Nigam, A., Singh, R., Vatsa, M.: Disguise detection and face recognition in visible and thermal spectrums. In: Fiérrez, J., Kumar, A., Vatsa, M., Veldhuis, R.N.J., Ortega-Garcia, J. (eds.) International Conference on Biometrics, ICB 2013, Madrid, Spain, 4–7 June 2013, pp. 1–8. IEEE (2013)

    Google Scholar 

  13. Ferrara, M., Cappelli, R., Maltoni, D.: On the feasibility of creating double-identity fingerprints. IEEE Trans. Inf. Forensics Secur. 12(4), 892–900 (2017)

    Article  Google Scholar 

  14. Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics, Clearwater, IJCB 2014, FL, USA, 29 September–2 October 2014, pp. 1–7. IEEE (2014)

    Google Scholar 

  15. Ferrara, M., Franco, A., Maltoni, D.: On the effects of image alterations on face recognition accuracy. In: Bourlai, T. (ed.) Face Recognition Across the Imaging Spectrum, pp. 195–222. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-28501-6_9

    Chapter  Google Scholar 

  16. Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. IEEE Trans. Inf. Forensics Secur. 13(4), 1008–1017 (2018)

    Article  Google Scholar 

  17. Hildebrandt, M., Neubert, T., Makrushin, A., Dittmann, J.: Benchmarking face morphing forgery detection: application of stirtrace for impact simulation of different processing steps. In: 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, 4–5 April 2017, pp. 1–6. IEEE (2017)

    Google Scholar 

  18. International Civil Aviation Organisation (ICAO): ICAO draft technical report: portrait quality (reference facial images for MRTD). Technical report (version), September 2017

    Google Scholar 

  19. International Organization for Standardization: ISO/IEC DIS 30107–3:2016: information technology - biometric presentation attack detection - part 3: testing and reporting. Standard (2017)

    Google Scholar 

  20. Kähm, O., Damer, N.: 2D face liveness detection: an overview. In: Brömme, A., Busch, C. (eds.) Proceedings of the International Conference of Biometrics Special Interest Group, 2012 BIOSIG, Darmstadt, Germany, 6–7 September 2012. LNI, vol. 197, pp. 1–12. IEEE/GI (2012)

    Google Scholar 

  21. Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, 23–28 June 2014, pp. 1867–1874. IEEE Computer Society (2014)

    Google Scholar 

  22. Mallick, S.: Face morph using opencv - c++/python (2016). https://www.learnopencv.com/face-morph-using-opencv-cpp-python/

  23. Markets and Markets: Facial recognition market by component (software tools and services), technology, use case (emotion recognition, attendance tracking and monitoring, access control, law enforcement), end-user, and region - global forecast to 2022. Report, November 2017

    Google Scholar 

  24. Neubert, T.: Face morphing detection: an approach based on image degradation analysis. In: Kraetzer, C., Shi, Y.-Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 93–106. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-64185-0_8

    Chapter  Google Scholar 

  25. Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1090–1104 (2000)

    Article  Google Scholar 

  26. Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.J.: The FERET database and evaluation procedure for face-recognition algorithms. Image Vis. Comput. 16(5), 295–306 (1998)

    Article  Google Scholar 

  27. Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Face morphing versus face averaging: vulnerability and detection. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017, pp. 555–563. IEEE (2017)

    Google Scholar 

  28. Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops, Honolulu, HI, USA, 21–26 July 2017, pp. 1822–1830. IEEE Computer Society (2017)

    Google Scholar 

  29. Ramachandra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: 8th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, Niagara Falls, NY, USA, 6–9 September 2016, pp. 1–7. IEEE (2016)

    Google Scholar 

  30. Rathgeb, C., Busch, C.: On the feasibility of creating morphed iris-codes. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017, pp. 152–157. IEEE (2017)

    Google Scholar 

  31. Ren, S., Cao, X., Wei, Y., Sun, J.: Face alignment at 3000 FPS via regressing local binary features. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, 23–28 June 2014, pp. 1685–1692. IEEE Computer Society (2014)

    Google Scholar 

  32. Robertson, D.J., Kramer, R.S.S., Burton, A.M.: Fraudulent ID using face morphs: experiments on human and automatic recognition. PLoS One 12(3), 1–12 (2017)

    Google Scholar 

  33. Sagonas, C., Antonakos, E., Tzimiropoulos, G., Zafeiriou, S., Pantic, M.: 300 faces in-the-wild challenge: database and results. Image Vis. Comput. 47, 3–18 (2016)

    Article  Google Scholar 

  34. Scherhag, U., Budhrani, D., Gomez-Barrero, M., Busch, C.: Detecting morphed face images using facial landmarks. In: Mansouri, A., El Moataz, A., Nouboud, F., Mammass, D. (eds.) ICISP 2018. LNCS, vol. 10884, pp. 444–452. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94211-7_48

    Chapter  Google Scholar 

  35. Scherhag, U., et al.: Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: Brömme, A., Busch, C., Dantcheva, A., Rathgeb, C., Uhl, A. (eds.) International Conference of the Biometrics Special Interest Group, BIOSIG 2017, Darmstadt, Germany, 20–22 September 2017. LNI, vol. P-270, pp. 149–159. GI/IEEE (2017)

    Google Scholar 

  36. Scherhag, U., Ramachandra, R., Raja, K.B., Gomez-Barrero, M., Rathgeb, C., Busch, C.: On the vulnerability of face recognition systems towards morphed face attacks. In: 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, 4–5 April 2017, pp. 1–6. IEEE (2017)

    Google Scholar 

  37. Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, 7–12 June 2015, pp. 815–823. IEEE Computer Society (2015)

    Google Scholar 

Download references

Acknowledgment

This work was supported by the German Federal Ministry of Education and Research (BMBF) as well as by the Hessen State Ministry for Higher Education, Research and the Arts (HMWK) within CRISP. Portions of the research in this paper use the FERET database of facial images collected under the FERET program, sponsored by the DOD Counterdrug Technology Development Program Office [25, 26].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naser Damer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Damer, N. et al. (2019). Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts. In: Brox, T., Bruhn, A., Fritz, M. (eds) Pattern Recognition. GCPR 2018. Lecture Notes in Computer Science(), vol 11269. Springer, Cham. https://doi.org/10.1007/978-3-030-12939-2_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12939-2_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12938-5

  • Online ISBN: 978-3-030-12939-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics