2018 26th European Signal Processing Conference (EUSIPCO) 2018
DOI: 10.23919/eusipco.2018.8553116
|View full text |Cite
|
Sign up to set email alerts
|

Reflection Analysis for Face Morphing Attack Detection

Abstract: A facial morph is a synthetically created image of a face that looks similar to two different individuals and can even trick biometric facial recognition systems into recognizing both individuals. This attack is known as face morphing attack. The process of creating such a facial morph is well documented and a lot of tutorials and software to create them are freely available. Therefore, it is mandatory to be able to detect this kind of fraud to ensure the integrity of the face as reliable biometric feature. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(23 citation statements)
references
References 30 publications
0
23
0
Order By: Relevance
“…Under the assumption that the images are intermediately stored during the morph creation process employing lossy compression algorithms, double compression artefacts can be analyzed [17], [43]. Furthermore, inconsistencies in the image, e.g., inconsistent illumination [44] or color values, might be evaluated.…”
Section: A Single Image Madmentioning
confidence: 99%
“…Under the assumption that the images are intermediately stored during the morph creation process employing lossy compression algorithms, double compression artefacts can be analyzed [17], [43]. Furthermore, inconsistencies in the image, e.g., inconsistent illumination [44] or color values, might be evaluated.…”
Section: A Single Image Madmentioning
confidence: 99%
“…While superior accuracy has been reported for digital S-MAD with texture-based features, the main limitation of these techniques is in their generalisability across different image qualities, imaging sensors and print-scan processes [96]. b) Quality-based S-MAD: The quality-based techniques largely analyse image quality features by quantifying the image degradation to identify a given image as morphed or bona fide [45], [56], [57], [104], [111]. Several features, such as double-compression artifacts, photo response non-uniformity (PRNU), corner and edge distortions, reflection analysis and meta information in the images, are commonly used to detect distortion in a morphed image.…”
Section: Passport Application Formmentioning
confidence: 99%
“…Hence, depending on the image size and the employed compression algorithm the detection of JPEG double-compression artifacts might not be feasible. In [88], a morph detection method based on reflection analysis in face images is presented. The lightning direction is estimated based on reflections detected in the eyes of a potentially morphed image.…”
Section: ) No-reference Morphing Attack Detectionmentioning
confidence: 99%