Deep Composite Face Image Attacks: Generation, Vulnerability and Detection

Face manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks (CFIA) based on facial attributes using Generative Adversarial Networks (GANs). Gi...

Full description

Bibliographic Details
Main Authors: Jag Mohan Singh, Raghavendra Ramachandra
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10078862/
_version_ 1797768404965261312
author Jag Mohan Singh
Raghavendra Ramachandra
author_facet Jag Mohan Singh
Raghavendra Ramachandra
author_sort Jag Mohan Singh
collection DOAJ
description Face manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks (CFIA) based on facial attributes using Generative Adversarial Networks (GANs). Given the face images corresponding to two unique data subjects, the proposed CFIA method will independently generate the segmented facial attributes, then blend them using transparent masks to generate the CFIA samples. We generate 526 unique CFIA combinations of facial attributes for each pair of contributory data subjects. Extensive experiments are carried out on our newly generated CFIA dataset consisting of 1000 unique identities with 2000 bona fide samples and 526000 CFIA samples, thus resulting in an overall 528000 face image samples. We present a sequence of experiments to benchmark the attack potential of CFIA samples using four different automatic FRS. We introduced a new metric named Generalized Morphing Attack Potential (G-MAP) to benchmark the vulnerability of generated attacks on FRS effectively. Additional experiments are performed on the representative subset of the CFIA dataset to benchmark both perceptual quality and human observer response. Finally, the CFIA detection performance is benchmarked using three different single image based face Morphing Attack Detection (MAD) algorithms. The source code of the proposed method together with CFIA dataset will be made publicly available: <uri>https://github.com/jagmohaniiit/LatentCompositionCode</uri>
first_indexed 2024-03-12T20:53:50Z
format Article
id doaj.art-5744cd0f198a4a2f8fa05c77e8c2e971
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-12T20:53:50Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-5744cd0f198a4a2f8fa05c77e8c2e9712023-07-31T23:00:23ZengIEEEIEEE Access2169-35362023-01-0111764687648510.1109/ACCESS.2023.326124710078862Deep Composite Face Image Attacks: Generation, Vulnerability and DetectionJag Mohan Singh0https://orcid.org/0000-0002-8901-6791Raghavendra Ramachandra1https://orcid.org/0000-0003-0484-3956Department of Information Security and Communication Technology, Norwegian Biometrics Laboratory, Norwegian University of Science and Technology (NTNU), Gj&#x00F8;vik, NorwayDepartment of Information Security and Communication Technology, Norwegian Biometrics Laboratory, Norwegian University of Science and Technology (NTNU), Gj&#x00F8;vik, NorwayFace manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks (CFIA) based on facial attributes using Generative Adversarial Networks (GANs). Given the face images corresponding to two unique data subjects, the proposed CFIA method will independently generate the segmented facial attributes, then blend them using transparent masks to generate the CFIA samples. We generate 526 unique CFIA combinations of facial attributes for each pair of contributory data subjects. Extensive experiments are carried out on our newly generated CFIA dataset consisting of 1000 unique identities with 2000 bona fide samples and 526000 CFIA samples, thus resulting in an overall 528000 face image samples. We present a sequence of experiments to benchmark the attack potential of CFIA samples using four different automatic FRS. We introduced a new metric named Generalized Morphing Attack Potential (G-MAP) to benchmark the vulnerability of generated attacks on FRS effectively. Additional experiments are performed on the representative subset of the CFIA dataset to benchmark both perceptual quality and human observer response. Finally, the CFIA detection performance is benchmarked using three different single image based face Morphing Attack Detection (MAD) algorithms. The source code of the proposed method together with CFIA dataset will be made publicly available: <uri>https://github.com/jagmohaniiit/LatentCompositionCode</uri>https://ieeexplore.ieee.org/document/10078862/Biometricsface recognitionmorphing attacksimage compositingvulnerabilitygeneralized morphing attack potential
spellingShingle Jag Mohan Singh
Raghavendra Ramachandra
Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
IEEE Access
Biometrics
face recognition
morphing attacks
image compositing
vulnerability
generalized morphing attack potential
title Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
title_full Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
title_fullStr Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
title_full_unstemmed Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
title_short Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
title_sort deep composite face image attacks generation vulnerability and detection
topic Biometrics
face recognition
morphing attacks
image compositing
vulnerability
generalized morphing attack potential
url https://ieeexplore.ieee.org/document/10078862/
work_keys_str_mv AT jagmohansingh deepcompositefaceimageattacksgenerationvulnerabilityanddetection
AT raghavendraramachandra deepcompositefaceimageattacksgenerationvulnerabilityanddetection