Norwegian University of Science and Technology (NTNU), Gjøvik, Norway.
Hochschule Darmstadt, Darmstadt, Germany.
PLoS One. 2024 May 31;19(5):e0304610. doi: 10.1371/journal.pone.0304610. eCollection 2024.
Face Morphing Attacks pose a threat to the security of identity documents, especially with respect to a subsequent access control process, because they allow both involved individuals to use the same document. Several algorithms are currently being developed to detect Morphing Attacks, often requiring large data sets of morphed face images for training. In the present study, face embeddings are used for two different purposes: first, to pre-select images for the subsequent large-scale generation of Morphing Attacks, and second, to detect potential Morphing Attacks. Previous studies have demonstrated the power of embeddings in both use cases. However, we aim to build on these studies by adding the more powerful MagFace model to both use cases, and by performing comprehensive analyses of the role of embeddings in pre-selection and attack detection in terms of the vulnerability of face recognition systems and attack detection algorithms. In particular, we use recent developments to assess the attack potential, but also investigate the influence of morphing algorithms. For the first objective, an algorithm is developed that pairs individuals based on the similarity of their face embeddings. Different state-of-the-art face recognition systems are used to extract embeddings in order to pre-select the face images and different morphing algorithms are used to fuse the face images. The attack potential of the differently generated morphed face images will be quantified to compare the usability of the embeddings for automatically generating a large number of successful Morphing Attacks. For the second objective, we compare the performance of the embeddings of two state-of-the-art face recognition systems with respect to their ability to detect morphed face images. Our results demonstrate that ArcFace and MagFace provide valuable face embeddings for image pre-selection. Various open-source and commercial-off-the-shelf face recognition systems are vulnerable to the generated Morphing Attacks, and their vulnerability increases when image pre-selection is based on embeddings compared to random pairing. In particular, landmark-based closed-source morphing algorithms generate attacks that pose a high risk to any tested face recognition system. Remarkably, more accurate face recognition systems show a higher vulnerability to Morphing Attacks. Among the systems tested, commercial-off-the-shelf systems were the most vulnerable to Morphing Attacks. In addition, MagFace embeddings stand out as a robust alternative for detecting morphed face images compared to the previously used ArcFace embeddings. The results endorse the benefits of face embeddings for more effective image pre-selection for face morphing and for more accurate detection of morphed face images, as demonstrated by extensive analysis of various designed attacks. The MagFace model is a powerful alternative to the often-used ArcFace model in detecting attacks and can increase performance depending on the use case. It also highlights the usability of embeddings to generate large-scale morphed face databases for various purposes, such as training Morphing Attack Detection algorithms as a countermeasure against attacks.
人脸变形攻击对身份证件的安全性构成威胁,尤其是在后续的访问控制过程中,因为它们允许两个相关人员使用同一份文件。目前正在开发几种算法来检测变形攻击,这些算法通常需要大量经过变形处理的人脸图像数据集进行训练。在本研究中,使用人脸嵌入来实现两个不同的目的:首先,预先选择用于随后大规模生成人脸变形攻击的图像,其次,检测潜在的人脸变形攻击。先前的研究已经证明了嵌入在这两种情况下的强大功能。然而,我们的目标是在这些研究的基础上,将更强大的 MagFace 模型应用于这两种情况,并从人脸识别系统的脆弱性和攻击检测算法的角度,对嵌入在预选择和攻击检测中的作用进行全面分析。特别是,我们使用最新的研究进展来评估攻击的潜在性,同时还研究了变形算法的影响。对于第一个目标,我们开发了一种基于人脸嵌入相似度对个体进行配对的算法。为了预先选择人脸图像,使用了不同的最新人脸识别系统来提取嵌入,同时使用不同的变形算法来融合人脸图像。量化不同生成的变形人脸图像的攻击潜力,以比较嵌入自动生成大量成功的人脸变形攻击的可用性。对于第二个目标,我们比较了两种最先进的人脸识别系统的嵌入在检测变形人脸图像方面的性能。我们的结果表明,ArcFace 和 MagFace 为图像预选择提供了有价值的人脸嵌入。各种开源和商业现成的人脸识别系统容易受到生成的人脸变形攻击的影响,并且与随机配对相比,基于嵌入进行图像预选择会增加其脆弱性。特别是,基于地标定位的闭源变形算法生成的攻击对任何经过测试的人脸识别系统都构成了高风险。值得注意的是,更精确的人脸识别系统对人脸变形攻击的脆弱性更高。在所测试的系统中,商业现成的系统最容易受到人脸变形攻击的影响。此外,与之前使用的 ArcFace 嵌入相比,MagFace 嵌入在检测变形人脸图像方面表现出作为一种稳健替代的优势。通过对各种设计的攻击进行广泛分析,证明了人脸嵌入在更有效地进行人脸变形的图像预选择和更准确地检测变形人脸图像方面的优势。MagFace 模型是检测攻击的强大替代模型,经常使用的 ArcFace 模型,它可以根据用例提高性能。它还突出了嵌入的可用性,用于生成各种目的的大规模人脸变形数据库,例如作为对抗攻击的一种对策来训练人脸变形攻击检测算法。