论文标题

对衰老对脸部变形攻击的影响:脆弱性和检测

On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection

论文作者

Venkatesh, Sushma, Raja, Kiran, Ramachandra, Raghavendra, Busch, Christoph

论文摘要

面部变形攻击引起了关键的关注,因为它们证明了面部识别系统(FRS)的新脆弱性,这些脆弱性被广泛部署在边境控制应用中。面部变形过程使用来自多个数据主体的图像,并执行图像混合操作来生成高质量的变形图像。生成的变形图像具有相似的视觉特征,与有助于复合图像的数据主体的生物特征相​​对应,从而使人类和FRS都难以检测这种攻击。在本文中,我们报告了对商业货架(COTS)FRS脆弱性(COTS)FRS的脆弱性的系统调查,当时呈现了衰老影响下的变形图像。在这个程度上,我们引入了一个新的变形的面部数据集,其衰老来自公开可用的Morph II面部数据​​集,我们称之为Morphage DataSet。该数据集具有两个基于年龄间隔的垃圾箱,第一个垃圾箱-IPhage-I数据集具有1002个独特的数据主题,年龄变化为1年至2岁,而Morphage-II数据集则由516个数据主体组成,其年龄间隔为2岁至5岁。为了有效评估变形攻击的脆弱性,我们还引入了一个新的评估度量标准,即完全交配的变形介绍匹配率(FMMPMR),以在现实的场景中有效地量化漏洞。通过使用两个不同的COTS FRS(COTS I -COGNITEC和COTS II-神经技术)来量化衰老的脆弱性,进行了广泛的实验。此外,我们还评估了五种不同的变形攻击检测(MAD)技术,以通过衰老来基准其检测性能。

Face morphing attacks have raised critical concerns as they demonstrate a new vulnerability of Face Recognition Systems (FRS), which are widely deployed in border control applications. The face morphing process uses the images from multiple data subjects and performs an image blending operation to generate a morphed image of high quality. The generated morphed image exhibits similar visual characteristics corresponding to the biometric characteristics of the data subjects that contributed to the composite image and thus making it difficult for both humans and FRS, to detect such attacks. In this paper, we report a systematic investigation on the vulnerability of the Commercial-Off-The-Shelf (COTS) FRS when morphed images under the influence of ageing are presented. To this extent, we have introduced a new morphed face dataset with ageing derived from the publicly available MORPH II face dataset, which we refer to as MorphAge dataset. The dataset has two bins based on age intervals, the first bin - MorphAge-I dataset has 1002 unique data subjects with the age variation of 1 year to 2 years while the MorphAge-II dataset consists of 516 data subjects whose age intervals are from 2 years to 5 years. To effectively evaluate the vulnerability for morphing attacks, we also introduce a new evaluation metric, namely the Fully Mated Morphed Presentation Match Rate (FMMPMR), to quantify the vulnerability effectively in a realistic scenario. Extensive experiments are carried out by using two different COTS FRS (COTS I - Cognitec and COTS II - Neurotechnology) to quantify the vulnerability with ageing. Further, we also evaluate five different Morph Attack Detection (MAD) techniques to benchmark their detection performance with ageing.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源