Face Morphing Attack Detection Using Privacy-Aware Training Data
Images of morphed faces pose a serious threat to face recognition--based security systems, as they can be used to illegally verify the identity of multiple people with a single morphed image. Modern detection algorithms learn to identify such morphing attacks using authentic images of real individua...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Journal Article |
Language: | English |
Published: |
02-07-2022
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Images of morphed faces pose a serious threat to face recognition--based
security systems, as they can be used to illegally verify the identity of
multiple people with a single morphed image. Modern detection algorithms learn
to identify such morphing attacks using authentic images of real individuals.
This approach raises various privacy concerns and limits the amount of publicly
available training data. In this paper, we explore the efficacy of detection
algorithms that are trained only on faces of non--existing people and their
respective morphs. To this end, two dedicated algorithms are trained with
synthetic data and then evaluated on three real-world datasets, i.e.:
FRLL-Morphs, FERET-Morphs and FRGC-Morphs. Our results show that synthetic
facial images can be successfully employed for the training process of the
detection algorithms and generalize well to real-world scenarios. |
---|---|
DOI: | 10.48550/arxiv.2207.00899 |