GENERATION AND DETECTION OF FACE MORPHING ATTACKS

Authors

  • E. Pavithra Author
  • B.Nithin Author
  • E.Anil Kumar Author
  • A.Ganesh Author

Keywords:

Extended Yale, FEI, FGNET, GT-DB, MULTI-PIE, FERET, FRLL, authentication system, Failure of facial recognition

Abstract

Failure of facial recognition and authentication system may lead to several unlawful activities. The current facial recognition systems are vulnerable to different biometric attacks. This research focuses on morphing attack detection. This research proposes a robust detection mechanism that can deal with variation in age, illumination, eye and head gears. A deep learning based feature extractor along with a classifier is adopted. Additionally, image enhancement and feature combination are proposed to augment the detection results. A versatile dataset is also developed that contains Morph-2 and Morph-3 images, created by sophisticated tools with manual intervention. Morph-3 images can give more realistic appearance and hence difficult to detect. Moreover, Morph-3 images are not considered in the literature before. Professional morphing software depicts more realistic morph attack scenario as compared to the morphs generated in the previous work from free programs and code scripts. Eight face databases are used for creation of morphs to encompass the variation. These databases are Celebrity2000, Extended Yale, FEI, FGNET, GT-DB, MULTI-PIE, FERET and FRLL. Results are investigated using multiple experimental setups and it is concluded that the proposed methodology gives promising results.

Downloads

Download data is not yet available.

Downloads

Published

06-01-2024

How to Cite

GENERATION AND DETECTION OF FACE MORPHING ATTACKS. (2024). International Journal of Information Technology and Computer Engineering, 12(1), 522-531. https://ijitce.org/index.php/ijitce/article/view/580