• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种用于差分变形攻击检测的双联体框架。

A Double Siamese Framework for Differential Morphing Attack Detection.

机构信息

DISI-Dipartimento di Informatica-Scienza e Ingegneria, Università di Bologna, 47521 Cesena, Italy.

出版信息

Sensors (Basel). 2021 May 16;21(10):3466. doi: 10.3390/s21103466.

DOI:10.3390/s21103466
PMID:34065699
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8156018/
Abstract

Face morphing and related morphing attacks have emerged as a serious security threat for automatic face recognition systems and a challenging research field. Therefore, the availability of effective and reliable morphing attack detectors is strongly needed. In this paper, we proposed a framework based on a double Siamese architecture to tackle the morphing attack detection task in the differential scenario, in which two images, a trusted live acquired image and a probe image (morphed or bona fide) are given as the input for the system. In particular, the presented framework aimed to merge the information computed by two different modules to predict the final score. The first one was designed to extract information about the identity of the input faces, while the second module was focused on the detection of artifacts related to the morphing process. Experimental results were obtained through several and rigorous cross-dataset tests, exploiting three well-known datasets, namely PMDB, MorphDB, and AMSL, containing automatic and manually refined facial morphed images, showing that the proposed framework was able to achieve satisfying results.

摘要

人脸变形和相关的变形攻击已经成为自动人脸识别系统的严重安全威胁,也是一个具有挑战性的研究领域。因此,强烈需要有效的、可靠的变形攻击探测器。在本文中,我们提出了一个基于双暹罗网络架构的框架,以解决差分场景中的变形攻击检测任务,其中系统的输入是两个图像,一个可信的活体采集图像和一个探针图像(变形或真实的)。特别地,所提出的框架旨在合并由两个不同模块计算的信息以预测最终分数。第一个模块旨在提取关于输入人脸身份的信息,而第二个模块则专注于检测与变形过程相关的伪影。通过在三个知名数据集(即 PMDB、MorphDB 和 AMSL)上进行多次严格的跨数据集测试,获得了实验结果,这些数据集包含自动和手动细化的人脸变形图像,表明所提出的框架能够取得令人满意的结果。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/c3f792225ad4/sensors-21-03466-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/4be10b1e9494/sensors-21-03466-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/d4c82efa1349/sensors-21-03466-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/b5bf5f9fe443/sensors-21-03466-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/436e725eb39f/sensors-21-03466-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/20a3eb55bcd0/sensors-21-03466-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/c3f792225ad4/sensors-21-03466-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/4be10b1e9494/sensors-21-03466-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/d4c82efa1349/sensors-21-03466-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/b5bf5f9fe443/sensors-21-03466-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/436e725eb39f/sensors-21-03466-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/20a3eb55bcd0/sensors-21-03466-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7a89/8156018/c3f792225ad4/sensors-21-03466-g006.jpg

相似文献

1
A Double Siamese Framework for Differential Morphing Attack Detection.一种用于差分变形攻击检测的双联体框架。
Sensors (Basel). 2021 May 16;21(10):3466. doi: 10.3390/s21103466.
2
Towards minimizing efforts for Morphing Attacks-Deep embeddings for morphing pair selection and improved Morphing Attack Detection.为最小化变形攻击的工作量——用于变形对选择的深度嵌入和改进的变形攻击检测。
PLoS One. 2024 May 31;19(5):e0304610. doi: 10.1371/journal.pone.0304610. eCollection 2024.
3
Feature Interaction-Based Face De-Morphing Factor Prediction for Restoring Accomplice's Facial Image.基于特征交互的面部变形因子预测以恢复 accomplice 的面部图像 。 注:这里“accomplice”不太明确在该语境下准确含义,或许结合上下文会更清晰其指代。
Sensors (Basel). 2024 Aug 25;24(17):5504. doi: 10.3390/s24175504.
4
Detecting Morphing Attacks through Face Geometry Features.通过面部几何特征检测变形攻击。
J Imaging. 2020 Oct 29;6(11):115. doi: 10.3390/jimaging6110115.
5
The Influence of the Other-Race Effect on Susceptibility to Face Morphing Attacks.异族效应对面部变形攻击易感性的影响。
ACM Trans Appl Percept. 2024 Jan;21(1). doi: 10.1145/3618113. Epub 2023 Dec 9.
6
Face morphing attacks: Investigating detection with humans and computers.面部变形攻击:研究人类和计算机的检测方法。
Cogn Res Princ Implic. 2019 Jul 29;4(1):28. doi: 10.1186/s41235-019-0181-4.
7
Face morphing attack detection based on high-frequency features and progressive enhancement learning.基于高频特征和渐进增强学习的人脸变形攻击检测
Front Neurorobot. 2023 Jun 5;17:1182375. doi: 10.3389/fnbot.2023.1182375. eCollection 2023.
8
Fingerphoto morphing attack generation using texture descriptors based landmarks.基于纹理描述符地标生成手指照片变形攻击。
Sci Rep. 2024 Jul 13;14(1):16182. doi: 10.1038/s41598-024-66790-8.
9
MagNet: Detecting Digital Presentation Attacks on Face Recognition.MagNet:检测针对人脸识别的数字呈现攻击。
Front Artif Intell. 2021 Dec 8;4:643424. doi: 10.3389/frai.2021.643424. eCollection 2021.
10
Morphing radiologic images: applications on a desktop computer.变形放射影像:在台式计算机上的应用
AJR Am J Roentgenol. 1996 Mar;166(3):527-9. doi: 10.2214/ajr.166.3.8623621.

本文引用的文献

1
Detecting Morphing Attacks through Face Geometry Features.通过面部几何特征检测变形攻击。
J Imaging. 2020 Oct 29;6(11):115. doi: 10.3390/jimaging6110115.