Fusion-based Few-Shot Morphing Attack Detection and Fingerprinting

by   Na Zhang, et al.

The vulnerability of face recognition systems to morphing attacks has posed a serious security threat due to the wide adoption of face biometrics in the real world. Most existing morphing attack detection (MAD) methods require a large amount of training data and have only been tested on a few predefined attack models. The lack of good generalization properties, especially in view of the growing interest in developing novel morphing attacks, is a critical limitation with existing MAD research. To address this issue, we propose to extend MAD from supervised learning to few-shot learning and from binary detection to multiclass fingerprinting in this paper. Our technical contributions include: 1) We propose a fusion-based few-shot learning (FSL) method to learn discriminative features that can generalize to unseen morphing attack types from predefined presentation attacks; 2) The proposed FSL based on the fusion of the PRNU model and Noiseprint network is extended from binary MAD to multiclass morphing attack fingerprinting (MAF). 3) We have collected a large-scale database, which contains five face datasets and eight different morphing algorithms, to benchmark the proposed few-shot MAF (FS-MAF) method. Extensive experimental results show the outstanding performance of our fusion-based FS-MAF. The code and data will be publicly available at https://github.com/nz0001na/mad maf.


page 1

page 2

page 6

page 7

page 8

page 10


Attacking Face Recognition with T-shirts: Database, Vulnerability Assessment and Detection

Face recognition systems are widely deployed for biometric authenticatio...

SynthASpoof: Developing Face Presentation Attack Detection Based on Privacy-friendly Synthetic Data

Recently, significant progress has been made in face presentation attack...

Single Morphing Attack Detection using Siamese Network and Few-shot Learning

Face morphing attack detection is challenging and presents a concrete an...

Extensive Threat Analysis of Vein Attack Databases and Attack Detection by Fusion of Comparison Scores

The last decade has brought forward many great contributions regarding p...

BadPrompt: Backdoor Attacks on Continuous Prompts

The prompt-based learning paradigm has gained much research attention re...

Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance

Face Recognition Systems (FRS) are vulnerable to various attacks perform...

Asymmetric Modality Translation For Face Presentation Attack Detection

Face presentation attack detection (PAD) is an essential measure to prot...

Please sign up or login with your details

Forgot password? Click here to reset