Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation

被引:21
|
作者
Qin L. [1 ]
Peng F. [1 ]
Venkatesh S. [2 ]
Ramachandra R. [2 ]
Long M. [3 ]
Busch C. [2 ]
机构
[1] College of Computer Science and Electronic Engineering, Hunan University, Changsha
[2] Norwegian Biometrics Laboratory, Norwegian University of Science and Technology, Gjovik
[3] College of Computer Science and Electronic Engineering, Hunan University, Changsha
关键词
Access control; face authentication; face morphing attack; facial manipulation; morphing attack detection;
D O I
10.1109/TBIOM.2020.3022007
中图分类号
学科分类号
摘要
Face verification is a popular way for verifying identities in access control systems. In this work, a partial face manipulation-based morphing attack (MA) is proposed to compromise the uniqueness of face templates. Different from existing research, this work changes MA from a holistic face level to component level, and only the most effective facial components (eyes and nose) are used. Therefore, a manipulated face is more similar to a bona fide one in terms of visual quality, texture, and noise characteristics. To validate the effectiveness of the proposed attack, a novel metric called actual mated morph presentation match rate (AMPMR) is proposed to evaluate MA performance under real-world conditions. With a collected dataset containing different attack types, image qualities, and manipulation parameters, the results indicate the proposed attack has better anti-detectability compared with the existing complete, splicing, and combined MAs. Moreover, it has low visual distortion and can reach a better tradeoff among facial biometrics verification, anti-detectability, and visual differences. © 2019 IEEE.
引用
收藏
页码:72 / 88
页数:16
相关论文
共 50 条
  • [31] A new object-based image watermarking robust to geometrical attacks
    Lee, Jung-Soo
    Kim, Whoi-Yul
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3332 : 58 - 64
  • [32] A Robust DCT Based Technique for Image Watermarking Against Cropping Attacks
    Rajabi, Mohammad Javad
    Abdullah, Shahidan M.
    Bakhtiari, Majid
    Bakhtiari, Saeid
    RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2018, 5 : 747 - 757
  • [33] Attacks on a robust watermarking scheme based on self-reference image
    Ting, Grace C. -W.
    Goi, Bok-Min
    Heng, Swee-Huay
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) : 32 - 35
  • [34] A new object-based image watermarking robust to geometrical attacks
    Lee, JS
    Kim, WY
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 2, PROCEEDINGS, 2004, 3332 : 58 - 64
  • [35] Robust Image Watermarking Algorithm Based on ASIFT against Geometric Attacks
    Wang, Chengyou
    Zhang, Yunpeng
    Zhou, Xiao
    APPLIED SCIENCES-BASEL, 2018, 8 (03):
  • [36] CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing
    Wandzik, Lukasz
    Garcia, Raul Vicente
    Kaeding, Gerald
    Chen, Xi
    DIGITAL FORENSICS AND WATERMARKING, 2017, 10431 : 121 - 135
  • [37] ICA based face recognition robust to partial occlusions and local distortions
    Kim, J
    Choi, J
    Yi, J
    BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 147 - 154
  • [38] Toward image-based visual servoing for cooperative aerial manipulation
    Mebarki, Rafik
    Lippiello, Vincenzo
    Siciliano, Bruno
    2015 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA), 2015, : 6074 - 6080
  • [39] Robust image-based visual servoing using invariant visual information
    Tahri, Omar
    Araujo, Helder
    Chaumette, Francois
    Mezouar, Youcef
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2013, 61 (12) : 1588 - 1600
  • [40] FaceSimile: A Mobile Application for Face Image Search based on Interactive Shape Manipulation
    Zhu, Shengqi
    Smith, Brandon M.
    Zhang, Li
    2011 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCV WORKSHOPS), 2011,