论文标题

面部变形攻击生成和检测:一项全面的调查

Face Morphing Attack Generation & Detection: A Comprehensive Survey

论文作者

Venkatesh, Sushma, Ramachandra, Raghavendra, Raja, Kiran, Busch, Christoph

论文摘要

面部识别系统(FRS)对各种攻击(直接和直接攻击)以及面部变形攻击的脆弱性引起了生物识别社区的极大兴趣。变形攻击的目的是通过呈现电子机器可读的旅行文档(EMRTD)或基于变形的面部图像获得的电子机器可读文档(EMRTD)或E-PASSPORT来颠覆FRS。由于在大多数国家 /地区的电子passport的申请过程要求申请人提供护照照片,因此恶意演员和同伙可以生成变形的面部图像并获得电子passport。具有变形脸部图像的电子passport可以由恶意演员和同伙越过边界使用,因为可以验证形变的面部图像。这可能会导致巨大的威胁,因为恶意演员可以越过边界而不会揭示其犯罪背景的轨道,而同谋的细节记录在访问控制系统的日志中。这项调查旨在介绍从变体产生和变形检测方面在面部变形领域取得的进展的系统概述。在本文中,我们描述和说明了面部变形攻击的各个方面,包括不同的技术来产生变形的面部图像,以及基于严格的分类法的变形攻击检测(MAD)算法的最新技术,并最终基于公共数据库的可用性,从而使新的Mad Algorith在可再现的方式中进行基于新的Mad Algorithm。还以全面的方式提供了竞争/基准测试,漏洞评估和绩效评估指标的结果。此外,我们讨论了在这个不断发展的生物识别领域中需要解决的开放挑战和潜在的未来工作。

The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community. The goal of a morphing attack is to subvert the FRS at Automatic Border Control (ABC) gates by presenting the Electronic Machine Readable Travel Document (eMRTD) or e-passport that is obtained based on the morphed face image. Since the application process for the e-passport in the majority countries requires a passport photo to be presented by the applicant, a malicious actor and the accomplice can generate the morphed face image and to obtain the e-passport. An e-passport with a morphed face images can be used by both the malicious actor and the accomplice to cross the border as the morphed face image can be verified against both of them. This can result in a significant threat as a malicious actor can cross the border without revealing the track of his/her criminal background while the details of accomplice are recorded in the log of the access control system. This survey aims to present a systematic overview of the progress made in the area of face morphing in terms of both morph generation and morph detection. In this paper, we describe and illustrate various aspects of face morphing attacks, including different techniques for generating morphed face images but also the state-of-the-art regarding Morph Attack Detection (MAD) algorithms based on a stringent taxonomy and finally the availability of public databases, which allow to benchmark new MAD algorithms in a reproducible manner. The outcomes of competitions/benchmarking, vulnerability assessments and performance evaluation metrics are also provided in a comprehensive manner. Furthermore, we discuss the open challenges and potential future works that need to be addressed in this evolving field of biometrics.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源