2020
DOI: 10.1109/tifs.2020.2994750
|View full text |Cite
|
Sign up to set email alerts
|

Deep Face Representations for Differential Morphing Attack Detection

Abstract: The vulnerability of facial recognition systems to face morphing attacks is well known. Many different approaches for morphing attack detection (MAD) have been proposed in the scientific literature. However, the MAD algorithms proposed so far have mostly been trained and tested on datasets whose distributions of image characteristics are either very limited (e.g., only created with a single morphing tool) or rather unrealistic (e.g., no print-scan transformation). As a consequence, these methods easily overfit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
133
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

5
4

Authors

Journals

citations
Cited by 100 publications
(135 citation statements)
references
References 47 publications
1
133
1
Order By: Relevance
“…This is a private database that consists of both digital and print-scan samples of morphed images and is composed of 964 + 964 + 529 morphed face images generated from subjects contained in the FRGCv2 and FERET databases. Another database by Scherhag et al [110] employs landmark-based morph generation techniques that include OpenCV, FaceMorphed, FaceFusion and the UBO morphing method. This database consists of approximately 791+3246 morphed face images from the FERET and FRGCv2 databases.…”
Section: Databases For Morphing Attack Detectionmentioning
confidence: 99%
“…This is a private database that consists of both digital and print-scan samples of morphed images and is composed of 964 + 964 + 529 morphed face images generated from subjects contained in the FRGCv2 and FERET databases. Another database by Scherhag et al [110] employs landmark-based morph generation techniques that include OpenCV, FaceMorphed, FaceFusion and the UBO morphing method. This database consists of approximately 791+3246 morphed face images from the FERET and FRGCv2 databases.…”
Section: Databases For Morphing Attack Detectionmentioning
confidence: 99%
“…Differences which indicate M-PAs can be learned in a training stage employing a machine learningbased classifier. Differential attack detection systems have already been successfully proposed for detection of face morphing [50] and facial retouching [51]. Therefore, main focus is put on differential M-PAD.…”
Section: Makeup Presentation Attack Detectionmentioning
confidence: 99%
“…In contrast, differential detection methods aiming to unveil digital image manipulation, e.g. [50], [51], consider the probe image to be a trusted live capture. In rare scenarios, a differential M-PAD might not be possible, i.e.…”
Section: Makeup Presentation Attack Detectionmentioning
confidence: 99%
“…Some of these works also address authentication, network security, privacy data, and processing power. Unfortunately, some of them also have a few drawbacks [22]- [27]. Moreover, even with the guidelines of the IEEE Biometric Open Protocol Standard (IEEE BOPS) [28], it is not possible to use each of these schemes in different biometric databases and make them communicate in a way that is reasonably security proof and does not compromise a person's privacy.…”
Section: Introductionmentioning
confidence: 99%