TY - GEN
T1 - Detecting morphed face images using facial landmarks
AU - Scherhag, Ulrich
AU - Budhrani, Dhanesh
AU - Gomez-Barrero, Marta
AU - Busch, Christoph
PY - 2018
Y1 - 2018
N2 - With the widespread deployment of automatic biometric recognition systems, some security issues have been unveiled. In particular, face recognition systems have been recently shown to be vulnerable to attacks carried out with morphed face images. Such synthetic images can be defined as the fusion of the face images of two (or more) different subjects. The associated risk lies on the ability of multiple subjects to be positively verified with a single enrolled morphed face image. As common texture based features have limited capabilities to tackle this problem, we propose a novel method for morphed face image detection, based on the computation of the differences between the landmarks of a probe bona fide (i.e., captured under supervision) image of the attacker, and the landmarks of the enrolled image (i.e., the suspected morphed image). In this work, a new database is created for the experiments, comprising both bona fide and morphed images created with two different morphing methods. The experiments show that for the detection task, the proposed algorithm achieves Equal Error Rates at 32.7%.
AB - With the widespread deployment of automatic biometric recognition systems, some security issues have been unveiled. In particular, face recognition systems have been recently shown to be vulnerable to attacks carried out with morphed face images. Such synthetic images can be defined as the fusion of the face images of two (or more) different subjects. The associated risk lies on the ability of multiple subjects to be positively verified with a single enrolled morphed face image. As common texture based features have limited capabilities to tackle this problem, we propose a novel method for morphed face image detection, based on the computation of the differences between the landmarks of a probe bona fide (i.e., captured under supervision) image of the attacker, and the landmarks of the enrolled image (i.e., the suspected morphed image). In this work, a new database is created for the experiments, comprising both bona fide and morphed images created with two different morphing methods. The experiments show that for the detection task, the proposed algorithm achieves Equal Error Rates at 32.7%.
U2 - 10.1007/978-3-319-94211-7_48
DO - 10.1007/978-3-319-94211-7_48
M3 - Article in proceedings
SN - 978-3-319-94210-0
VL - 10884
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 444
EP - 452
BT - Image and Signal Processing
A2 - , Alamin Mansouri
A2 - , Abderrahim El Moataz
A2 - , Fathallah Nouboud
A2 - null, Driss Mammass
PB - Springer
T2 - 8th International Conference on Image and Signal Processing
Y2 - 2 July 2018 through 4 July 2018
ER -