TY - JOUR
T1 - Morphing Attack Detection - Database, Evaluation Platform and Benchmarking
AU - Raja, Kiran
AU - Ferrara, Matteo
AU - Franco, Annalisa
AU - Spreeuwers, Luuk
AU - Batskos, Ilias
AU - de Wit, Florens Frans
AU - Gomez-Barrero, Marta
AU - Scherhag, Ulrich
AU - Fischer, Daniel
AU - Venkatesh, Sushma
AU - Mohan Singh, Jag
AU - Ramachandra, Raghavendra
AU - Rathgeb, Christian
AU - Frings, Dinusha
AU - Seidel, Uwe
AU - Knopjes, Fons
AU - Veldhuis, Raymond N.J.
AU - Maltoni, Davide
AU - Busch, Christoph
N1 - Funding Information:
Manuscript received June 8, 2020; revised September 18, 2020; accepted September 19, 2020. Date of publication November 2, 2020; date of current version September 2, 2021. This work was supported by the European Commission funded by SOTAMD Project. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Adams W. K. Kong. (Corresponding author: Kiran Raja.) Kiran Raja is with the Department of Computer Science, NTNU, 2815 Gjøvik, Norway (e-mail: [email protected]).
Publisher Copyright:
© 2005-2012 IEEE.
PY - 2021/1/1
Y1 - 2021/1/1
N2 - Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to age, gender, ethnicity that are inadequately addressed. Morphing Attack Detection (MAD) algorithms often are prone to generalization challenges as they are database dependent. The existing databases, mostly of semi-public nature, lack in diversity in terms of ethnicity, various morphing process and post-processing pipelines. Further, they do not reflect a realistic operational scenario for Automated Border Control (ABC) and do not provide a basis to test MAD on unseen data, in order to benchmark the robustness of algorithms. In this work, we present a new sequestered dataset for facilitating the advancements of MAD where the algorithms can be tested on unseen data in an effort to better generalize. The newly constructed dataset consists of facial images from 150 subjects from various ethnicities, age-groups and both genders. In order to challenge the existing MAD algorithms, the morphed images are with careful subject pre-selection created from the contributing images, and further post-processed to remove morphing artifacts. The images are also printed and scanned to remove all digital cues and to simulate a realistic challenge for MAD algorithms. Further, we present a new online evaluation platform to test algorithms on sequestered data. With the platform we can benchmark the morph detection performance and study the generalization ability. This work also presents a detailed analysis on various subsets of sequestered data and outlines open challenges for future directions in MAD research.
AB - Morphing attacks have posed a severe threat to Face Recognition System (FRS). Despite the number of advancements reported in recent works, we note serious open issues such as independent benchmarking, generalizability challenges and considerations to age, gender, ethnicity that are inadequately addressed. Morphing Attack Detection (MAD) algorithms often are prone to generalization challenges as they are database dependent. The existing databases, mostly of semi-public nature, lack in diversity in terms of ethnicity, various morphing process and post-processing pipelines. Further, they do not reflect a realistic operational scenario for Automated Border Control (ABC) and do not provide a basis to test MAD on unseen data, in order to benchmark the robustness of algorithms. In this work, we present a new sequestered dataset for facilitating the advancements of MAD where the algorithms can be tested on unseen data in an effort to better generalize. The newly constructed dataset consists of facial images from 150 subjects from various ethnicities, age-groups and both genders. In order to challenge the existing MAD algorithms, the morphed images are with careful subject pre-selection created from the contributing images, and further post-processed to remove morphing artifacts. The images are also printed and scanned to remove all digital cues and to simulate a realistic challenge for MAD algorithms. Further, we present a new online evaluation platform to test algorithms on sequestered data. With the platform we can benchmark the morph detection performance and study the generalization ability. This work also presents a detailed analysis on various subsets of sequestered data and outlines open challenges for future directions in MAD research.
KW - Biometrics
KW - face recognition
KW - morphing attack detection
KW - vulnerability of biometric systems
UR - http://www.scopus.com/inward/record.url?scp=85114798062&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2020.3035252
DO - 10.1109/TIFS.2020.3035252
M3 - Article
AN - SCOPUS:85114798062
SN - 1556-6013
VL - 16
SP - 4336
EP - 4351
JO - IEEE transactions on information forensics and security
JF - IEEE transactions on information forensics and security
M1 - 9246583
ER -