scholarly journals Face Morphing, a Modern Threat to Border Security: Recent Advances and Open Challenges

2021 ◽  
Vol 11 (7) ◽  
pp. 3207
Author(s):  
Erion-Vasilis Pikoulis ◽  
Zafeiria-Marina Ioannou ◽  
Mersini Paschou ◽  
Evangelos Sakkopoulos

Face morphing poses a serious threat to Automatic Border Control (ABC) and Face Recognition Systems (FRS) in general. The aim of this paper is to present a qualitative assessment of the morphing attack issue, and the challenges it entails, highlighting both the technological and human aspects of the problem. Here, after the face morphing attack scenario is presented, the paper provides an overview of the relevant bibliography and recent advances towards two central directions. First, the morphing of face images is outlined with a particular focus on the three main steps that are involved in the process, namely, landmark detection, face alignment and blending. Second, the detection of morphing attacks is presented under the prism of the so-called on-line and off-line detection scenarios and whether the proposed techniques employ handcrafted features, using classical methods, or automatically generated features, using deep-learning-based methods. The paper, then, presents the evaluation metrics that are employed in the corresponding bibliography and concludes with a discussion on open challenges that need to be address for further advancing automatic detection of morphing attacks. Despite the progress being made, the general consensus of the research community is that significant effort and resources are needed in the near future for the mitigation of the issue, especially, towards the creation of datasets capturing the full extent of the problem at hand and the availability of reference evaluation procedures for comparing novel automatic attack detection algorithms.

2020 ◽  
Author(s):  
Sushma Venkatesh ◽  
Raghavendra Ramachandra ◽  
kiran Raja ◽  
Luuk J. Spreeuwers ◽  
Raymond Veldhuis ◽  
...  

<p> Along with the deployment of the Face Recognition Systems</p> <p>(FRS), concerns were raised related to the vulnerability</p> <p>of those systems towards various attacks including morphed</p> <p>attacks. The morphed face attack involves two different</p> <p>face images in order to obtain via a morphing process</p> <p>a resulting attack image, which is sufficiently similar</p> <p>to both contributing data subjects. The obtained morphed</p> <p>image can successfully be verified against both subjects visually</p> <p>(by a human expert) and by a commercial FRS. The</p> <p>face morphing attack poses a severe security risk to the</p> <p>e-passport issuance process and to applications like border</p> <p>control, unless such attacks are detected and mitigated.</p> <p>In this work, we propose a new method to reliably detect</p> <p>a morphed face attack using a newly designed denoising</p> <p>framework. To this end, we design and introduce a new</p> <p>deep Multi-scale Context Aggregation Network (MS-CAN)</p> <p>to obtain denoised images, which is subsequently used to</p> <p>determine if an image is morphed or not. Extensive experiments</p> <p>are carried out on three different morphed face image</p> <p>datasets. The Morphing Attack Detection (MAD) performance</p> <p>of the proposed method is also benchmarked against</p> <p>14 different state-of-the-art techniques using the ISO-IEC</p> <p>30107-3 evaluation metrics. Based on the obtained quantitative</p> <p>results, the proposed method has indicated the best</p> <p>performance on all three datasets and also on cross-dataset</p> <p>experiments.</p>


2020 ◽  
Author(s):  
Sushma Venkatesh ◽  
Raghavendra Ramachandra ◽  
kiran Raja ◽  
Luuk J. Spreeuwers ◽  
Raymond Veldhuis ◽  
...  

<p> Along with the deployment of the Face Recognition Systems</p> <p>(FRS), concerns were raised related to the vulnerability</p> <p>of those systems towards various attacks including morphed</p> <p>attacks. The morphed face attack involves two different</p> <p>face images in order to obtain via a morphing process</p> <p>a resulting attack image, which is sufficiently similar</p> <p>to both contributing data subjects. The obtained morphed</p> <p>image can successfully be verified against both subjects visually</p> <p>(by a human expert) and by a commercial FRS. The</p> <p>face morphing attack poses a severe security risk to the</p> <p>e-passport issuance process and to applications like border</p> <p>control, unless such attacks are detected and mitigated.</p> <p>In this work, we propose a new method to reliably detect</p> <p>a morphed face attack using a newly designed denoising</p> <p>framework. To this end, we design and introduce a new</p> <p>deep Multi-scale Context Aggregation Network (MS-CAN)</p> <p>to obtain denoised images, which is subsequently used to</p> <p>determine if an image is morphed or not. Extensive experiments</p> <p>are carried out on three different morphed face image</p> <p>datasets. The Morphing Attack Detection (MAD) performance</p> <p>of the proposed method is also benchmarked against</p> <p>14 different state-of-the-art techniques using the ISO-IEC</p> <p>30107-3 evaluation metrics. Based on the obtained quantitative</p> <p>results, the proposed method has indicated the best</p> <p>performance on all three datasets and also on cross-dataset</p> <p>experiments.</p>


Author(s):  
B. G.-Tóth ◽  
E. M. T. Hendrix ◽  
L. G. Casado

AbstractOver the last decades, algorithms have been developed for checking copositivity of a matrix. Methods are based on several principles, such as spatial branch and bound, transformation to Mixed Integer Programming, implicit enumeration of KKT points or face-based search. Our research question focuses on exploiting the mathematical properties of the relative interior minima of the standard quadratic program (StQP) and monotonicity. We derive several theoretical properties related to convexity and monotonicity of the standard quadratic function over faces of the standard simplex. We illustrate with numerical instances up to 28 dimensions the use of monotonicity in face-based algorithms. The question is what traversal through the face graph of the standard simplex is more appropriate for which matrix instance; top down or bottom up approaches. This depends on the level of the face graph where the minimum of StQP can be found, which is related to the density of the so-called convexity graph.


2021 ◽  
pp. 1-11
Author(s):  
Suphawimon Phawinee ◽  
Jing-Fang Cai ◽  
Zhe-Yu Guo ◽  
Hao-Ze Zheng ◽  
Guan-Chen Chen

Internet of Things is considerably increasing the levels of convenience at homes. The smart door lock is an entry product for smart homes. This work used Raspberry Pi, because of its low cost, as the main control board to apply face recognition technology to a door lock. The installation of the control sensing module with the GPIO expansion function of Raspberry Pi also improved the antitheft mechanism of the door lock. For ease of use, a mobile application (hereafter, app) was developed for users to upload their face images for processing. The app sends the images to Firebase and then the program downloads the images and captures the face as a training set. The face detection system was designed on the basis of machine learning and equipped with a Haar built-in OpenCV graphics recognition program. The system used four training methods: convolutional neural network, VGG-16, VGG-19, and ResNet50. After the training process, the program could recognize the user’s face to open the door lock. A prototype was constructed that could control the door lock and the antitheft system and stream real-time images from the camera to the app.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Takao Fukui ◽  
Mrinmoy Chakrabarty ◽  
Misako Sano ◽  
Ari Tanaka ◽  
Mayuko Suzuki ◽  
...  

AbstractEye movements toward sequentially presented face images with or without gaze cues were recorded to investigate whether those with ASD, in comparison to their typically developing (TD) peers, could prospectively perform the task according to gaze cues. Line-drawn face images were sequentially presented for one second each on a laptop PC display, and the face images shifted from side-to-side and up-and-down. In the gaze cue condition, the gaze of the face image was directed to the position where the next face would be presented. Although the participants with ASD looked less at the eye area of the face image than their TD peers, they could perform comparable smooth gaze shift to the gaze cue of the face image in the gaze cue condition. This appropriate gaze shift in the ASD group was more evident in the second half of trials in than in the first half, as revealed by the mean proportion of fixation time in the eye area to valid gaze data in the early phase (during face image presentation) and the time to first fixation on the eye area. These results suggest that individuals with ASD may benefit from the short-period trial experiment by enhancing the usage of gaze cue.


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 2003 ◽  
Author(s):  
Xiaoliang Zhu ◽  
Shihao Ye ◽  
Liang Zhao ◽  
Zhicheng Dai

As a sub-challenge of EmotiW (the Emotion Recognition in the Wild challenge), how to improve performance on the AFEW (Acted Facial Expressions in the wild) dataset is a popular benchmark for emotion recognition tasks with various constraints, including uneven illumination, head deflection, and facial posture. In this paper, we propose a convenient facial expression recognition cascade network comprising spatial feature extraction, hybrid attention, and temporal feature extraction. First, in a video sequence, faces in each frame are detected, and the corresponding face ROI (range of interest) is extracted to obtain the face images. Then, the face images in each frame are aligned based on the position information of the facial feature points in the images. Second, the aligned face images are input to the residual neural network to extract the spatial features of facial expressions corresponding to the face images. The spatial features are input to the hybrid attention module to obtain the fusion features of facial expressions. Finally, the fusion features are input in the gate control loop unit to extract the temporal features of facial expressions. The temporal features are input to the fully connected layer to classify and recognize facial expressions. Experiments using the CK+ (the extended Cohn Kanade), Oulu-CASIA (Institute of Automation, Chinese Academy of Sciences) and AFEW datasets obtained recognition accuracy rates of 98.46%, 87.31%, and 53.44%, respectively. This demonstrated that the proposed method achieves not only competitive performance comparable to state-of-the-art methods but also greater than 2% performance improvement on the AFEW dataset, proving the significant outperformance of facial expression recognition in the natural environment.


2014 ◽  
Vol 530-531 ◽  
pp. 705-708
Author(s):  
Yao Meng

This paper first engine starting defense from Intrusion Detection, Intrusion detection engine analyzes the hardware platform, the overall structure of the technology and the design of the overall structure of the plug, which on the whole structure from intrusion defense systems were designed; then described in detail improved DDOS attack detection algorithm design thesis, and the design of anomaly detection algorithms.


Sign in / Sign up

Export Citation Format

Share Document