Skip to main content

MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2021)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 13180))

Included in the following conference series:

Abstract

Face morphing attack is becoming a serious threat to the existing face recognition systems. Some different approaches for morphing attack detection have been put forward. However, there are few methods concentrated on detecting the morphing artifacts, which often appear in morphed facial images. In this work, we propose a multiple scales attention convolutional neural network (MSA-CNN), a novel approach that can effectively detect the morphing artifacts in face morphing attacks. It utilizes the attention mechanism to continuously pay attention to the morphing artifacts in multiple scales and finally realizes face morphing detection. Experimental results and analysis show that it can effectively locate the region of morphing artifacts, and outperforms the existing deep learning-based blind face morphing detection frameworks.

This research was supported by National Natural Science Foundation of China under grant nos. 62072055 and U1936115. It was also supported by Scientific Research Foundation of Hunan Provincial Education Department under grant nos. 20K098 and 19C1468, and co-funded by Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture under grant no. ZNKZN2019.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The International Civil Aviation Organization: Machine readable travel documents - part 9: deployment of biometric identification and electronic storage of data in emrtds. Tech. rep. (2006)

    Google Scholar 

  2. Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics (IJCB), pp. 1–7 (2014)

    Google Scholar 

  3. Andrey Makrushin, T.N., Dittmann, J.: Automatic generation and detection of visually faultless facial morphs. In: International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP), pp. 39–50 (2017)

    Google Scholar 

  4. Robertson, D.J., Kramer, R.S.S., Burton, A.M.: Fraudulent id using face morphs: experiments on human and automatic recognition. PLoS ONE 12(3), 1–12 (2017)

    Google Scholar 

  5. Gomez-Barrero, M., Rathgeb, C., Scherhag, U., Busch, C.: Is your biometric system robust to morphing attacks? In: International Workshop on Biometrics and Forensics (IWBF), pp. 1–6 (2017)

    Google Scholar 

  6. Scherhag, U., Raghavendra, R., Raja, K.B., Gomez-Barrero, M., Rathgeb, C., Busch, C.: On the vulnerability of face recognition systems towards morphed face attacks. In: International Workshop on Biometrics and Forensics (IWBF), pp. 1–6 (2017)

    Google Scholar 

  7. Scherhag, U., et al.: Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting. In: International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–7 (2017)

    Google Scholar 

  8. Wandzik, L., Vicente-Garcia, R., Kaeding, G., Chen, X.: CNNs under attack: on the vulnerability of deep neural networks based face recognition to image morphing. In: International Workshop on Digital Forensics and Watermarking (IWDW), pp. 121–135 (2017)

    Google Scholar 

  9. Damer, N., Saladie, A.M., Braun, A., Kuijper, A.: Morgan: recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In: IEEE International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–10 (2018)

    Google Scholar 

  10. Damer, N., Boutros, F., Saladi, A.M., Kirchbuchner, F., Kuijper, A.: Realistic dreams: Cascaded enhancement of gan-generated images with an example in face morphing attacks. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS). pp. 1–10 (2019)

    Google Scholar 

  11. Venkatesh, S., Zhang, H., Ramachandra, R., Raja, K., Damer, N., Busch, C.: Can GAN generated morphs threaten face recognition systems equally as landmark based morphs?-vulnerability and detection. In: 2020 8th International Workshop on Biometrics and Forensics (IWBF). pp. 1–6. IEEE (2020)

    Google Scholar 

  12. Zhang, H., Venkatesh, S., Ramachandra, R., Raja, K., Damer, N., Busch, C.: Mipgangenerating strong and high quality morphing attacks using identity prior driven GAN. IEEE Trans. Biomet. Behav. Ident. Sci. 3(3), 365–383 (2021)

    Article  Google Scholar 

  13. Raghavendra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: IEEE International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–7 (2016)

    Google Scholar 

  14. Hildebrandt, M., Neubert, T., Makrushin, A., Dittmann, J.: Benchmarking face morphing forgery detection: application of stirtrace for impact simulation of different processing steps. In: International Workshop on Biometrics and Forensics (IWBF), pp. 1–6 (2017)

    Google Scholar 

  15. Kraetzer, C., Makrushin, A., Neubert, T., Hildebrandt, M., Dittmann, J.: Modeling attacks on photo-id documents and applying media forensics for the detection of facial morphing. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 21–32 (2017)

    Google Scholar 

  16. Neubert, T.: Face morphing detection: an approach based on image degradation analysis. In: International Workshop on Digital Forensics and Watermarking (IWDW), pp. 93–106 (2017)

    Google Scholar 

  17. Zhang, L., Peng, F., Long, M.: Face morphing detection using Fourier spectrum of sensor pattern noise. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6 (2018)

    Google Scholar 

  18. Debiasi, L., Scherhag, U., Rathgeb, C., Uhl, A., Busch, C.: PRNU-based detection of morphed face images. In: International Workshop on Biometrics and Forensics (IWBF), pp. 1–7 (2018)

    Google Scholar 

  19. Scherhag, U., Debiasi, L., Rathgeb, C., Busch, C., Uhl, A.: Detection of face morphing attacks based on PRNU analysis. IEEE Trans. Biomet. Behav. Ident. Sci. (TBIOM) 1(4), 302–317 (2019)

    Google Scholar 

  20. Seibold, C., Wojciech Samek, A.H., Eisert, P.: Detection of face morphing attacks by deep learning. In: International Workshop on Digital Forensics and Watermarking (IWDW), pp. 107–120 (2017)

    Google Scholar 

  21. Scherhag, U., Rathgeb, C., Merkle, J., Breithaupt, R., Busch, C.: Face recognition systems under morphing attacks: a survey. IEEE Access 7, 23012–23026 (2019)

    Article  Google Scholar 

  22. Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. IEEE Trans. Inf. Forensics Secur. 13(4), 1008–1017 (2018)

    Article  Google Scholar 

  23. Peng, F., Zhang, L.B., Long, M.: FD-GAN: face de-morphing generative adversarial network for restoring accomplices facial image. IEEE Access 7, 75122–75131 (2019)

    Article  Google Scholar 

  24. Scherhag, U., Rathgeb, C., Merkle, J., Busch, C.: Deep face representations for differential morphing attack detection. Trans. Inf. Forensics Secur. (TIFS) 15, 3625–3639 (2020)

    Article  Google Scholar 

  25. Chaudhary, B., Aghdaie, P., Soleymani, S., Dawson, J., Nasrabadi, N.M.: Differential morph face detection using discriminative wavelet sub-bands. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1425–1434 (2021)

    Google Scholar 

  26. Luxand FaceSDK. https://www.luxand.com/facesdk/. Accessed 11 Apr 2015

  27. Kannala, J., Rahtu, E.: BSIF: binarized statistical image features. In: International Conference on Pattern Recognition (ICPR2012), pp. 1363–1366. IEEE (2012)

    Google Scholar 

  28. Zhang, L.B., Peng, F., Long, M.: Identifying source camera using guided image estimation and block weighted average. J. Vis. Commun. Image Represent. 48, 471–479 (2017)

    Article  Google Scholar 

  29. Raghavendra, R., Raja, K.B., Venkatesh, S., Busch, C.: Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1822–1830 (2017)

    Google Scholar 

  30. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition (2014). http://arxiv.org/abs/1409.1556

  31. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Adv. Neural Inf. Process. Syst. 25, 1097–1105 (2012)

    Google Scholar 

  32. Szegedy, C., et al.: Going deeper with convolutions. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1–9 (2015)

    Google Scholar 

  33. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778 (2016)

    Google Scholar 

  34. Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.A.: Inception-v4, inception-resNet and the impact of residual connections on learning. In: Thirty-first AAAI Conference on Artificial Intelligence (2017)

    Google Scholar 

  35. Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems (NIPS), pp. 5998–6008 (2017)

    Google Scholar 

  36. Wang, F., et al.: Residual attention network for image classification. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6450–6458 (2017)

    Google Scholar 

  37. Chen, L., et al.: SCA-CNN: spatial and channel-wise attention in convolutional networks for image captioning. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6298–6306 (2017)

    Google Scholar 

  38. Woo, S., Park, J., Lee, J.Y., Kweon, I.S.: CBAM: convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 3–19 (2018)

    Google Scholar 

  39. Fu, J., Zheng, H., Mei, T.: Look closer to see better: recurrent attention convolutional neural network for fine-grained image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4438–4446 (2017)

    Google Scholar 

  40. Raja, K., et al.: Morphing attack detection - database, evaluation platform and benchmarking. IEEE Trans. Inf. Forensics Secur. 99, 1–1 (2020)

    Google Scholar 

  41. Scherhag, U., Rathgeb, C., Busch, C.: Performance variation of morphed face image detection algorithms across different datasets. In: 2018 International Workshop on Biometrics and Forensics (IWBF), pp. 1–6 (2018)

    Google Scholar 

  42. Face++ compare API. https://www.faceplusplus.com/face-comparing/. Accessed 15 May 2017

  43. Information technology - biometric presentation attack detection - part 3: testing and reporting. Tech. rep. (2017)

    Google Scholar 

  44. Pytorch. https://www.http://pytorch.org/. Accessed 23 Apr 2019

  45. Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: visual explanations from deep networks via gradient-based localization. In: IEEE International Conference on Computer Vision (ICCV), pp. 618–626 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Cai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, LB., Cai, J., Peng, F., Long, M. (2022). MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network. In: Zhao, X., Piva, A., Comesaña-Alfaro, P. (eds) Digital Forensics and Watermarking. IWDW 2021. Lecture Notes in Computer Science(), vol 13180. Springer, Cham. https://doi.org/10.1007/978-3-030-95398-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-95398-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-95397-3

  • Online ISBN: 978-3-030-95398-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics