Advertisement

Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts

  • Naser DamerEmail author
  • Viola Boller
  • Yaza Wainakh
  • Fadi Boutros
  • Philipp Terhörst
  • Andreas Braun
  • Arjan Kuijper
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11269)

Abstract

Face morphing attacks create face images that are verifiable to multiple identities. Associating such images to identity documents lead to building faulty identity links, causing attacks on operations like border crossing. Most of previously proposed morphing attack detection approaches directly classified features extracted from the investigated image. We discuss the operational opportunity of having a live face probe to support the morphing detection decision and propose a detection approach that take advantage of that. Our proposed solution considers the facial landmarks shifting patterns between reference and probe images. This is represented by the directed distances to avoid confusion with shifts caused by other variations. We validated our approach using a publicly available database, built on 549 identities. Our proposed detection concept is tested with three landmark detectors and proved to outperform the baseline concept based on handcrafted and transferable CNN features.

Notes

Acknowledgment

This work was supported by the German Federal Ministry of Education and Research (BMBF) as well as by the Hessen State Ministry for Higher Education, Research and the Arts (HMWK) within CRISP. Portions of the research in this paper use the FERET database of facial images collected under the FERET program, sponsored by the DOD Counterdrug Technology Development Program Office [25, 26].

References

  1. 1.
    Agarwal, A., Singh, R., Vatsa, M., Noore, A.: SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017, pp. 659–665. IEEE (2017)Google Scholar
  2. 2.
    Ahonen, T., Hadid, A., Pietikäinen, M.: Face recognition with local binary patterns. In: Pajdla, T., Matas, J. (eds.) ECCV 2004. LNCS, vol. 3021, pp. 469–481. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-24670-1_36CrossRefGoogle Scholar
  3. 3.
    Amos, B., Ludwiczuk, B., Satyanarayanan, M.: OpenFace: a general-purpose face recognition library with mobile applications. Technical report, CMU-CS-16-118, CMU School of Computer Science (2016)Google Scholar
  4. 4.
    Biometix Pty Ltd.: Face morphing dataset (for vulnerability research) (2017). http://www.biometix.com/2017/09/18/new-face-morphing-dataset-for-vulnerability-research/
  5. 5.
    Bolle, R., Pankanti, S.: Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell (1998)Google Scholar
  6. 6.
    Cao, X., Wei, Y., Wen, F., Sun, J.: Face alignment by explicit shape regression. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 16–21 June 2012, pp. 2887–2894. IEEE Computer Society (2012)Google Scholar
  7. 7.
    Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, USA, 20–26 June 2005, pp. 886–893. IEEE Computer Society (2005)Google Scholar
  8. 8.
    Damer, N., et al.: CrazyFaces: unassisted circumvention of watchlist face identification. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2018, Los Angeles, California, USA, 22–25 October 2018. IEEE (2018)Google Scholar
  9. 9.
    Damer, N., Dimitrov, K.: Practical view on face presentation attack detection. In: Wilson, R.C., Hancock, E.R., Smith, W.A.P. (eds.) Proceedings of the British Machine Vision Conference 2016, BMVC 2016, York, UK, 19–22 September 2016. BMVA Press (2016)Google Scholar
  10. 10.
    Damer, N., Saladié, A.M., Braun, A., Kuijper, A.: MorGAN: recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In: 9th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2018, Los Angeles, California, USA, 22–25 October 2018. IEEE (2018)Google Scholar
  11. 11.
    Damer, N., et al.: Deep learning-based face recognition and the robustness to perspective distortion. In: 24th International Conference on Pattern Recognition, ICPR 2018, Beijing, China, August 2018. IEEE (2018)Google Scholar
  12. 12.
    Dhamecha, T.I., Nigam, A., Singh, R., Vatsa, M.: Disguise detection and face recognition in visible and thermal spectrums. In: Fiérrez, J., Kumar, A., Vatsa, M., Veldhuis, R.N.J., Ortega-Garcia, J. (eds.) International Conference on Biometrics, ICB 2013, Madrid, Spain, 4–7 June 2013, pp. 1–8. IEEE (2013)Google Scholar
  13. 13.
    Ferrara, M., Cappelli, R., Maltoni, D.: On the feasibility of creating double-identity fingerprints. IEEE Trans. Inf. Forensics Secur. 12(4), 892–900 (2017)CrossRefGoogle Scholar
  14. 14.
    Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics, Clearwater, IJCB 2014, FL, USA, 29 September–2 October 2014, pp. 1–7. IEEE (2014)Google Scholar
  15. 15.
    Ferrara, M., Franco, A., Maltoni, D.: On the effects of image alterations on face recognition accuracy. In: Bourlai, T. (ed.) Face Recognition Across the Imaging Spectrum, pp. 195–222. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-28501-6_9CrossRefGoogle Scholar
  16. 16.
    Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. IEEE Trans. Inf. Forensics Secur. 13(4), 1008–1017 (2018)CrossRefGoogle Scholar
  17. 17.
    Hildebrandt, M., Neubert, T., Makrushin, A., Dittmann, J.: Benchmarking face morphing forgery detection: application of stirtrace for impact simulation of different processing steps. In: 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, 4–5 April 2017, pp. 1–6. IEEE (2017)Google Scholar
  18. 18.
    International Civil Aviation Organisation (ICAO): ICAO draft technical report: portrait quality (reference facial images for MRTD). Technical report (version), September 2017Google Scholar
  19. 19.
    International Organization for Standardization: ISO/IEC DIS 30107–3:2016: information technology - biometric presentation attack detection - part 3: testing and reporting. Standard (2017)Google Scholar
  20. 20.
    Kähm, O., Damer, N.: 2D face liveness detection: an overview. In: Brömme, A., Busch, C. (eds.) Proceedings of the International Conference of Biometrics Special Interest Group, 2012 BIOSIG, Darmstadt, Germany, 6–7 September 2012. LNI, vol. 197, pp. 1–12. IEEE/GI (2012)Google Scholar
  21. 21.
    Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, 23–28 June 2014, pp. 1867–1874. IEEE Computer Society (2014)Google Scholar
  22. 22.
    Mallick, S.: Face morph using opencv - c++/python (2016). https://www.learnopencv.com/face-morph-using-opencv-cpp-python/
  23. 23.
    Markets and Markets: Facial recognition market by component (software tools and services), technology, use case (emotion recognition, attendance tracking and monitoring, access control, law enforcement), end-user, and region - global forecast to 2022. Report, November 2017Google Scholar
  24. 24.
    Neubert, T.: Face morphing detection: an approach based on image degradation analysis. In: Kraetzer, C., Shi, Y.-Q., Dittmann, J., Kim, H.J. (eds.) IWDW 2017. LNCS, vol. 10431, pp. 93–106. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-64185-0_8CrossRefGoogle Scholar
  25. 25.
    Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face-recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22(10), 1090–1104 (2000)CrossRefGoogle Scholar
  26. 26.
    Phillips, P.J., Wechsler, H., Huang, J., Rauss, P.J.: The FERET database and evaluation procedure for face-recognition algorithms. Image Vis. Comput. 16(5), 295–306 (1998)CrossRefGoogle Scholar
  27. 27.
    Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Face morphing versus face averaging: vulnerability and detection. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017, pp. 555–563. IEEE (2017)Google Scholar
  28. 28.
    Ramachandra, R., Raja, K.B., Venkatesh, S., Busch, C.: Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops, Honolulu, HI, USA, 21–26 July 2017, pp. 1822–1830. IEEE Computer Society (2017)Google Scholar
  29. 29.
    Ramachandra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: 8th IEEE International Conference on Biometrics Theory, Applications and Systems, BTAS 2016, Niagara Falls, NY, USA, 6–9 September 2016, pp. 1–7. IEEE (2016)Google Scholar
  30. 30.
    Rathgeb, C., Busch, C.: On the feasibility of creating morphed iris-codes. In: 2017 IEEE International Joint Conference on Biometrics, IJCB 2017, Denver, CO, USA, 1–4 October 2017, pp. 152–157. IEEE (2017)Google Scholar
  31. 31.
    Ren, S., Cao, X., Wei, Y., Sun, J.: Face alignment at 3000 FPS via regressing local binary features. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, 23–28 June 2014, pp. 1685–1692. IEEE Computer Society (2014)Google Scholar
  32. 32.
    Robertson, D.J., Kramer, R.S.S., Burton, A.M.: Fraudulent ID using face morphs: experiments on human and automatic recognition. PLoS One 12(3), 1–12 (2017)Google Scholar
  33. 33.
    Sagonas, C., Antonakos, E., Tzimiropoulos, G., Zafeiriou, S., Pantic, M.: 300 faces in-the-wild challenge: database and results. Image Vis. Comput. 47, 3–18 (2016)CrossRefGoogle Scholar
  34. 34.
    Scherhag, U., Budhrani, D., Gomez-Barrero, M., Busch, C.: Detecting morphed face images using facial landmarks. In: Mansouri, A., El Moataz, A., Nouboud, F., Mammass, D. (eds.) ICISP 2018. LNCS, vol. 10884, pp. 444–452. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-94211-7_48CrossRefGoogle Scholar
  35. 35.
    Scherhag, U., et al.: Biometric systems under morphing attacks: assessment of morphing techniques and vulnerability reporting. In: Brömme, A., Busch, C., Dantcheva, A., Rathgeb, C., Uhl, A. (eds.) International Conference of the Biometrics Special Interest Group, BIOSIG 2017, Darmstadt, Germany, 20–22 September 2017. LNI, vol. P-270, pp. 149–159. GI/IEEE (2017)Google Scholar
  36. 36.
    Scherhag, U., Ramachandra, R., Raja, K.B., Gomez-Barrero, M., Rathgeb, C., Busch, C.: On the vulnerability of face recognition systems towards morphed face attacks. In: 5th International Workshop on Biometrics and Forensics, IWBF 2017, Coventry, United Kingdom, 4–5 April 2017, pp. 1–6. IEEE (2017)Google Scholar
  37. 37.
    Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, 7–12 June 2015, pp. 815–823. IEEE Computer Society (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Fraunhofer Institute for Computer Graphics Research IGDDarmstadtGermany
  2. 2.Mathematical and Applied Visual ComputingTU DarmstadtDarmstadtGermany

Personalised recommendations