Abstract
Passports have used face characteristics to verify and establish the identity of an individual. Face images provide high accuracy in verification and also present the opportunity of verifying the identity visually against the passport face image if the need arises. Morphed image-based identity attacks are recently shown to exploit the vulnerability of passport issuance and verification systems, where two different identities are morphed into one image to match against both images. The challenge is further increased when the properties in the digital domain are lost after the process of print and scan. This work addresses such a problem of detecting the morphing of face images such that the attacks are detected even after the print and scan process. As the first contribution of this work, we extend an existing database with 693 bonafide and 1202 morphed face images with the newly added of 579 bonafide and 1315 morphed images. We further propose a new approach based on extracting textural features across scale-space and classifying them using collaborative representation. With a set of extensive experiments and benchmarking against the traditional (non-deep-learning methods) and deep-learning methods, we illustrate the applicability of the proposed approach in detecting the morphing attacks. With an obtained Bonafide Presentation Classification Error (BPCER) of \(13.12\%\) at Attack Presentation Classification Error Rate (APCER) of \(10\%\), the use of the proposed method can be envisioned for detecting morph attacks even after print and scan process.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Asaad, A., Jassim, S.: Topological data analysis for image tampering detection. In: International Workshop on Digital Watermarking, pp. 136–146 (2017)
Ferrara, M., Franco, A., Maltoni, D.: The magic passport. In: IEEE International Joint Conference on Biometrics, pp. 1–7 (2014)
Ferrara, M., Franco, A., Maltoni, D.: Face recognition across the imaging spectrum. In: On the Effects of Image Alterations on Face Recognition Accuracy, pp. 195–222. Springer International Publishing (2016)
Ferrara, M., Franco, A., Maltoni, D.: Face demorphing. IEEE Trans. Inf. Forensics Secur. 13(4), 1008–1017 (2018)
Freeman, W.T., Adelson, E.H., et al.: The design and use of steerable filters. IEEE Trans. Pattern Anal. Mach. Intell. 13(9), 891–906 (1991)
Hildebrandt, M., Neubert, T., Makrushin, A., Dittmann, J.: Benchmarking face morphing forgery detection: application of stirtrace for impact simulation of different processing steps. In: International Workshop on Biometrics and Forensics (IWBF 2017), pp. 1–6 (2017)
International Organization for Standardization: Information Technology—Biometric Presentation Attack Detection—Part 3: Testing and Reporting. ISO/IEC DIS 30107-3:2016, JTC 1/SC 37, Geneva, Switzerland (2016)
Makrushin, A., Neubert, T., Dittmann, J.: Automatic generation and detection of visually faultless facial morphs. In: Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications—vol. 6: VISAPP, (VISIGRAPP 2017), pp. 39–50 (2017)
Mittal, A., Moorthy, A.K., Bovik, A.C.: No-reference image quality assessment in the spatial domain. IEEE Trans. Image Process. 21(12), 4695–4708 (2012)
Neubert, T.: Face morphing detection: an approach based on image degradation analysis. In: International Workshop on Digital Watermarking, pp. 93–106 (2017)
Poynton, C.: Digital Video and HD: Algorithms and Interfaces. Elsevier (2012)
Raghavendra, R., Raja, K.B., Busch, C.: Detecting morphed face images. In: 8th IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS), pp. 1–8 (2016)
Raghavendra, R., Raja, K.B., Venkatesh, S., Busch, C.: Transferable deep-CNN features for detecting digital and print-scanned morphed face images. In: Proceedings of the IEEE Conference on Computer Vision Pattern Recognition Workshops (CVPRW), pp. 1822–1830 (2017)
Raghavendra, R., Raja, K., Venkatesh, S., Busch, C.: Face morphing versus face averaging: vulnerability and detection. In: IEEE International Joint Conference on Biometrics (IJCB), pp. 555–563 (2017)
Robertson, D., Kramer, R.S., Burton, A.M.: Fraudulent id using face morphs: experiments on human and automatic recognition. PLoS ONE 12(3), 1–12 (2017)
Scherhag, U., Raghavendra, R., Raja, K., Gomez-Barrero, M., Rathgeb, C., Busch, C.: On the vulnerability of face recognition systems towards morphed face attack. In: International Workshop on Biometrics and Forensics (IWBF 2017), pp. 1–6 (2017)
Seibold, C., Samek, W., Hilsmann, A., Eisert, P.: Detection of face morphing attacks by deep learning. In: International Workshop on Digital Watermarking, pp. 107–120 (2017)
Zhang, L., Yang, M., Feng, X.: Sparse representation or collaborative representation: which helps face recognition? In: IEEE International Conference on Computer Vision (ICCV), pp. 471–478 (2011)
Acknowledgements
This work was carried out under the funding of the Research Council of Norway under Grant No. IKTPLUSS 248030/O70.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ramachandra, R., Venkatesh, S., Raja, K., Busch, C. (2020). Detecting Face Morphing Attacks with Collaborative Representation of Steerable Features. In: Chaudhuri, B., Nakagawa, M., Khanna, P., Kumar, S. (eds) Proceedings of 3rd International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 1022. Springer, Singapore. https://doi.org/10.1007/978-981-32-9088-4_22
Download citation
DOI: https://doi.org/10.1007/978-981-32-9088-4_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9087-7
Online ISBN: 978-981-32-9088-4
eBook Packages: EngineeringEngineering (R0)