Abstract
Face morphing attack is becoming a serious threat to the existing face recognition systems. Some different approaches for morphing attack detection have been put forward. However, there are few methods concentrated on detecting the morphing artifacts, which often appear in morphed facial images. In this work, we propose a multiple scales attention convolutional neural network (MSA-CNN), a novel approach that can effectively detect the morphing artifacts in face morphing attacks. It utilizes the attention mechanism to continuously pay attention to the morphing artifacts in multiple scales and finally realizes face morphing detection. Experimental results and analysis show that it can effectively locate the region of morphing artifacts, and outperforms the existing deep learning-based blind face morphing detection frameworks.
This research was supported by National Natural Science Foundation of China under grant nos. 62072055 and U1936115. It was also supported by Scientific Research Foundation of Hunan Provincial Education Department under grant nos. 20K098 and 19C1468, and co-funded by Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture under grant no. ZNKZN2019.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
The International Civil Aviation Organization: Machine readable travel documents - part 9: deployment of biometric identification and electronic storage of data in emrtds. Tech. rep. (2006)
Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics (IJCB), pp. 1–7 (2014)
Andrey Makrushin, T.N., Dittmann, J.: Automatic generation and detection of visually faultless facial morphs. In: International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP), pp. 39–50 (2017)
Robertson, D.J., Kramer, R.S.S., Burton, A.M.: Fraudulent id using face morphs: experiments on human and automatic recognition. PLoS ONE 12(3), 1–12 (2017)
Gomez-Barrero, M., Rathgeb, C., Scherhag, U., Busch, C.: Is your biometric system robust to morphing attacks? In: International Workshop on Biometrics and Forensics (IWBF), pp. 1–6 (2017)
Scherhag, U., Raghavendra, R., Raja, K.B., Gomez-Barrero, M., Rathgeb, C., Busch, C.: On the vulnerability of face recognition systems towards morphed face attacks. In: International Workshop on Biometrics and Forensics (IWBF), pp. 1–6 (2017)
Scherhag, U., et al.: Biometric systems under morphing attacks: Assessment of morphing techniques and vulnerability reporting. In: International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–7 (2017)
Wandzik, L., Vicente-Garcia, R., Kaeding, G., Chen, X.: CNNs under attack: on the vulnerability of deep neural networks based face recognition to image morphing. In: International Workshop on Digital Forensics and Watermarking (IWDW), pp. 121–135 (2017)
Damer, N., Saladie, A.M., Braun, A., Kuijper, A.: Morgan: recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In: IEEE International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–10 (2018)
Damer, N., Boutros, F., Saladi, A.M., Kirchbuchner, F., Kuijper, A.: Realistic dreams: Cascaded enhancement of gan-generated images with an example in face morphing attacks. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS). pp. 1–10 (2019)
Venkatesh, S., Zhang, H., Ramachandra, R., Raja, K., Damer, N., Busch, C.: Can GAN generated morphs threaten face recognition systems equally as landmark based morphs?-vulnerability and detection. In: 2020 8th International Workshop on Biometrics and Forensics (IWBF). pp. 1–6. IEEE (2020)
Zhang, H., Venkatesh, S., Ramachandra, R., Raja, K., Damer, N., Busch, C.: Mipgangenerating strong and high quality morphing attacks using identity prior driven GAN. IEEE Trans. Biomet. Behav. Ident. Sci. 3(3), 365–383 (2021)
Raghavendra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: IEEE International Conference on Biometrics Theory, Applications and Systems (BTAS), pp. 1–7 (2016)
Hildebrandt, M., Neubert, T., Makrushin, A., Dittmann, J.: Benchmarking face morphing forgery detection: application of stirtrace for impact simulation of different processing steps. In: International Workshop on Biometrics and Forensics (IWBF), pp. 1–6 (2017)
Kraetzer, C., Makrushin, A., Neubert, T., Hildebrandt, M., Dittmann, J.: Modeling attacks on photo-id documents and applying media forensics for the detection of facial morphing. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 21–32 (2017)
Neubert, T.: Face morphing detection: an approach based on image degradation analysis. In: International Workshop on Digital Forensics and Watermarking (IWDW), pp. 93–106 (2017)
Zhang, L., Peng, F., Long, M.: Face morphing detection using Fourier spectrum of sensor pattern noise. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6 (2018)
Debiasi, L., Scherhag, U., Rathgeb, C., Uhl, A., Busch, C.: PRNU-based detection of morphed face images. In: International Workshop on Biometrics and Forensics (IWBF), pp. 1–7 (2018)
Scherhag, U., Debiasi, L., Rathgeb, C., Busch, C., Uhl, A.: Detection of face morphing attacks based on PRNU analysis. IEEE Trans. Biomet. Behav. Ident. Sci. (TBIOM) 1(4), 302–317 (2019)
Seibold, C., Wojciech Samek, A.H., Eisert, P.: Detection of face morphing attacks by deep learning. In: International Workshop on Digital Forensics and Watermarking (IWDW), pp. 107–120 (2017)
Scherhag, U., Rathgeb, C., Merkle, J., Breithaupt, R., Busch, C.: Face recognition systems under morphing attacks: a survey. IEEE Access 7, 23012–23026 (2019)
Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. IEEE Trans. Inf. Forensics Secur. 13(4), 1008–1017 (2018)
Peng, F., Zhang, L.B., Long, M.: FD-GAN: face de-morphing generative adversarial network for restoring accomplices facial image. IEEE Access 7, 75122–75131 (2019)
Scherhag, U., Rathgeb, C., Merkle, J., Busch, C.: Deep face representations for differential morphing attack detection. Trans. Inf. Forensics Secur. (TIFS) 15, 3625–3639 (2020)
Chaudhary, B., Aghdaie, P., Soleymani, S., Dawson, J., Nasrabadi, N.M.: Differential morph face detection using discriminative wavelet sub-bands. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 1425–1434 (2021)
Luxand FaceSDK. https://www.luxand.com/facesdk/. Accessed 11 Apr 2015
Kannala, J., Rahtu, E.: BSIF: binarized statistical image features. In: International Conference on Pattern Recognition (ICPR2012), pp. 1363–1366. IEEE (2012)
Zhang, L.B., Peng, F., Long, M.: Identifying source camera using guided image estimation and block weighted average. J. Vis. Commun. Image Represent. 48, 471–479 (2017)
Raghavendra, R., Raja, K.B., Venkatesh, S., Busch, C.: Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 1822–1830 (2017)
Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition (2014). http://arxiv.org/abs/1409.1556
Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Adv. Neural Inf. Process. Syst. 25, 1097–1105 (2012)
Szegedy, C., et al.: Going deeper with convolutions. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1–9 (2015)
He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778 (2016)
Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.A.: Inception-v4, inception-resNet and the impact of residual connections on learning. In: Thirty-first AAAI Conference on Artificial Intelligence (2017)
Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems (NIPS), pp. 5998–6008 (2017)
Wang, F., et al.: Residual attention network for image classification. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6450–6458 (2017)
Chen, L., et al.: SCA-CNN: spatial and channel-wise attention in convolutional networks for image captioning. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6298–6306 (2017)
Woo, S., Park, J., Lee, J.Y., Kweon, I.S.: CBAM: convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 3–19 (2018)
Fu, J., Zheng, H., Mei, T.: Look closer to see better: recurrent attention convolutional neural network for fine-grained image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4438–4446 (2017)
Raja, K., et al.: Morphing attack detection - database, evaluation platform and benchmarking. IEEE Trans. Inf. Forensics Secur. 99, 1–1 (2020)
Scherhag, U., Rathgeb, C., Busch, C.: Performance variation of morphed face image detection algorithms across different datasets. In: 2018 International Workshop on Biometrics and Forensics (IWBF), pp. 1–6 (2018)
Face++ compare API. https://www.faceplusplus.com/face-comparing/. Accessed 15 May 2017
Information technology - biometric presentation attack detection - part 3: testing and reporting. Tech. rep. (2017)
Pytorch. https://www.http://pytorch.org/. Accessed 23 Apr 2019
Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., Batra, D.: Grad-cam: visual explanations from deep networks via gradient-based localization. In: IEEE International Conference on Computer Vision (ICCV), pp. 618–626 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, LB., Cai, J., Peng, F., Long, M. (2022). MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network. In: Zhao, X., Piva, A., Comesaña-Alfaro, P. (eds) Digital Forensics and Watermarking. IWDW 2021. Lecture Notes in Computer Science(), vol 13180. Springer, Cham. https://doi.org/10.1007/978-3-030-95398-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-95398-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95397-3
Online ISBN: 978-3-030-95398-0
eBook Packages: Computer ScienceComputer Science (R0)