Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications

被引:0
|
作者
Tapia, Juan E. [1 ]
Russo, Maximilian [1 ]
Busch, Christoph [1 ]
机构
[1] Hsch Darmstadt, Da Sec Biometr & Internet Secur Res Grp, D-64295 Darmstadt, Germany
来源
IEEE ACCESS | 2025年 / 13卷
基金
欧盟地平线“2020”;
关键词
Faces; Databases; Training; Generative adversarial networks; Feature extraction; Face recognition; Diffusion models; Digital images; Training data; Synthetic data; Biometrics; face generation; print-scan; morphing; GANs;
D O I
10.1109/ACCESS.2025.3555922
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The focus of Morphing Attack Detection (MAD) is to identify unauthorised attempts to use a legitimate identity. One common scenario involves creating altered images and using them in passport applications. Currently, there are limited datasets available for training the MAD algorithm due to privacy concerns and the challenges of obtaining and processing a large number of printed and scanned images. A larger and more diverse dataset representing passport application scenarios, including various devices and resulting printed, scanned, or compressed images, is needed to enhance the detection capabilities and identify such morphing attacks. However, generating training data that accurately represents the variety of attacks is a labour-intensive task since the training material is created manually. This paper presents two methods based on texture transfer techniques for the automatic generation of digital print and scan facial images, which are utilized to train a Morphing Attack Detection algorithm. Our proposed methods achieve an Equal Error Rate (EER) of 3.84% and 1.92% on the FRGC/FERET database when incorporating our synthetic and texture-transferred print/scan images at 600 dpi alongside handcrafted images, respectively.
引用
收藏
页码:55277 / 55289
页数:13
相关论文
共 50 条
  • [41] Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation
    Purnekar, Nischay
    Abady, Lydia
    Tondi, Benedetta
    Barni, Mauro
    PROCEEDINGS OF THE 2024 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2024, 2024, : 65 - 73
  • [42] DoS and Port Scan attack Detection in High Speed Networks
    Hasanifard, Masoud
    Ladani, Behrouz Tork
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 61 - 66
  • [43] PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection
    Li, Shijia
    Ming, Jiang
    Qiu, Pengda
    Chen, Qiyuan
    Liu, Lanqing
    Bao, Huaifeng
    Wang, Qiang
    Jia, Chunfu
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3078 - 3092
  • [44] Defect Detection in Textures through the Use of Entropy as a Means for Automatically Selecting the Wavelet Decomposition Level
    Navarro, Pedro J.
    Fernandez-Isla, Carlos
    Maria Alcover, Pedro
    Suardiaz, Juan
    SENSORS, 2016, 16 (08)
  • [45] Analyzing Human Observer Ability in Morphing Attack Detection - Where Do We Stand?
    Godage, Sankini Rancha
    Lovasdal, Froy
    Venkatesh, Sushma
    Raja, Kiran
    Ramachandra, Raghavendra
    Busch, Christoph
    IEEE Transactions on Technology and Society, 2023, 4 (02): : 125 - 145
  • [46] Single Morphing Attack Detection Using Feature Selection and Visualization Based on Mutual Information
    Tapia, Juan E.
    Busch, Christoph
    IEEE ACCESS, 2021, 9 : 167628 - 167641
  • [47] Generating Remote Control Interface Automatically into Cellular Phone for Controlling Applications Running on PC
    Chen, Deng-Jyi
    Peng, Shih-Jung
    Ong, Chin-Eng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (02) : 549 - 563
  • [48] Discrete scan statistics with applications to minefield detection
    Glaz, J
    DETECTION AND REMEDIATION TECHNOLOGIES FOR MINES AND MINELIKE TARGETS, 1996, 2765 : 420 - 429
  • [49] DDoS attack detection in smart home applications
    Chandak, Ashish Virendra
    Ray, Niranjan Kumar
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (10): : 2086 - 2101
  • [50] Review of XSS Attack and Detection on Web Applications
    Zhao, Wen-bing
    Wang, Dan
    Ding, Zhi-ming
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 798 - 804