Cargando…

Detecting Morphing Attacks through Face Geometry Features

Face-morphing operations allow for the generation of digital faces that simultaneously carry the characteristics of two different subjects. It has been demonstrated that morphed faces strongly challenge face-verification systems, as they typically match two different identities. This poses serious s...

Descripción completa

Detalles Bibliográficos
Autores principales: Autherith, Stephanie, Pasquini, Cecilia
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8321196/
https://www.ncbi.nlm.nih.gov/pubmed/34460559
http://dx.doi.org/10.3390/jimaging6110115
_version_ 1783730793350168576
author Autherith, Stephanie
Pasquini, Cecilia
author_facet Autherith, Stephanie
Pasquini, Cecilia
author_sort Autherith, Stephanie
collection PubMed
description Face-morphing operations allow for the generation of digital faces that simultaneously carry the characteristics of two different subjects. It has been demonstrated that morphed faces strongly challenge face-verification systems, as they typically match two different identities. This poses serious security issues in machine-assisted border control applications and calls for techniques to automatically detect whether morphing operations have been previously applied on passport photos. While many proposed approaches analyze the suspect passport photo only, our work operates in a differential scenario, i.e., when the passport photo is analyzed in conjunction with the probe image of the subject acquired at border control to verify that they correspond to the same identity. To this purpose, in this study, we analyze the locations of biologically meaningful facial landmarks identified in the two images, with the goal of capturing inconsistencies in the facial geometry introduced by the morphing process. We report the results of extensive experiments performed on images of various sources and under different experimental settings showing that landmark locations detected through automated algorithms contain discriminative information for identifying pairs with morphed passport photos. Sensitivity of supervised classifiers to different compositions on the training and testing sets are also explored, together with the performance of different derived feature transformations.
format Online
Article
Text
id pubmed-8321196
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-83211962021-08-26 Detecting Morphing Attacks through Face Geometry Features Autherith, Stephanie Pasquini, Cecilia J Imaging Article Face-morphing operations allow for the generation of digital faces that simultaneously carry the characteristics of two different subjects. It has been demonstrated that morphed faces strongly challenge face-verification systems, as they typically match two different identities. This poses serious security issues in machine-assisted border control applications and calls for techniques to automatically detect whether morphing operations have been previously applied on passport photos. While many proposed approaches analyze the suspect passport photo only, our work operates in a differential scenario, i.e., when the passport photo is analyzed in conjunction with the probe image of the subject acquired at border control to verify that they correspond to the same identity. To this purpose, in this study, we analyze the locations of biologically meaningful facial landmarks identified in the two images, with the goal of capturing inconsistencies in the facial geometry introduced by the morphing process. We report the results of extensive experiments performed on images of various sources and under different experimental settings showing that landmark locations detected through automated algorithms contain discriminative information for identifying pairs with morphed passport photos. Sensitivity of supervised classifiers to different compositions on the training and testing sets are also explored, together with the performance of different derived feature transformations. MDPI 2020-10-29 /pmc/articles/PMC8321196/ /pubmed/34460559 http://dx.doi.org/10.3390/jimaging6110115 Text en © 2020 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) ).
spellingShingle Article
Autherith, Stephanie
Pasquini, Cecilia
Detecting Morphing Attacks through Face Geometry Features
title Detecting Morphing Attacks through Face Geometry Features
title_full Detecting Morphing Attacks through Face Geometry Features
title_fullStr Detecting Morphing Attacks through Face Geometry Features
title_full_unstemmed Detecting Morphing Attacks through Face Geometry Features
title_short Detecting Morphing Attacks through Face Geometry Features
title_sort detecting morphing attacks through face geometry features
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8321196/
https://www.ncbi.nlm.nih.gov/pubmed/34460559
http://dx.doi.org/10.3390/jimaging6110115
work_keys_str_mv AT autherithstephanie detectingmorphingattacksthroughfacegeometryfeatures
AT pasquinicecilia detectingmorphingattacksthroughfacegeometryfeatures