• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

为最小化变形攻击的工作量——用于变形对选择的深度嵌入和改进的变形攻击检测。

Towards minimizing efforts for Morphing Attacks-Deep embeddings for morphing pair selection and improved Morphing Attack Detection.

机构信息

Norwegian University of Science and Technology (NTNU), Gjøvik, Norway.

Hochschule Darmstadt, Darmstadt, Germany.

出版信息

PLoS One. 2024 May 31;19(5):e0304610. doi: 10.1371/journal.pone.0304610. eCollection 2024.

DOI:10.1371/journal.pone.0304610
PMID:38820451
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11142600/
Abstract

Face Morphing Attacks pose a threat to the security of identity documents, especially with respect to a subsequent access control process, because they allow both involved individuals to use the same document. Several algorithms are currently being developed to detect Morphing Attacks, often requiring large data sets of morphed face images for training. In the present study, face embeddings are used for two different purposes: first, to pre-select images for the subsequent large-scale generation of Morphing Attacks, and second, to detect potential Morphing Attacks. Previous studies have demonstrated the power of embeddings in both use cases. However, we aim to build on these studies by adding the more powerful MagFace model to both use cases, and by performing comprehensive analyses of the role of embeddings in pre-selection and attack detection in terms of the vulnerability of face recognition systems and attack detection algorithms. In particular, we use recent developments to assess the attack potential, but also investigate the influence of morphing algorithms. For the first objective, an algorithm is developed that pairs individuals based on the similarity of their face embeddings. Different state-of-the-art face recognition systems are used to extract embeddings in order to pre-select the face images and different morphing algorithms are used to fuse the face images. The attack potential of the differently generated morphed face images will be quantified to compare the usability of the embeddings for automatically generating a large number of successful Morphing Attacks. For the second objective, we compare the performance of the embeddings of two state-of-the-art face recognition systems with respect to their ability to detect morphed face images. Our results demonstrate that ArcFace and MagFace provide valuable face embeddings for image pre-selection. Various open-source and commercial-off-the-shelf face recognition systems are vulnerable to the generated Morphing Attacks, and their vulnerability increases when image pre-selection is based on embeddings compared to random pairing. In particular, landmark-based closed-source morphing algorithms generate attacks that pose a high risk to any tested face recognition system. Remarkably, more accurate face recognition systems show a higher vulnerability to Morphing Attacks. Among the systems tested, commercial-off-the-shelf systems were the most vulnerable to Morphing Attacks. In addition, MagFace embeddings stand out as a robust alternative for detecting morphed face images compared to the previously used ArcFace embeddings. The results endorse the benefits of face embeddings for more effective image pre-selection for face morphing and for more accurate detection of morphed face images, as demonstrated by extensive analysis of various designed attacks. The MagFace model is a powerful alternative to the often-used ArcFace model in detecting attacks and can increase performance depending on the use case. It also highlights the usability of embeddings to generate large-scale morphed face databases for various purposes, such as training Morphing Attack Detection algorithms as a countermeasure against attacks.

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/2dfb15f13363/pone.0304610.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/6c403651bc24/pone.0304610.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/b5e1d06b94ff/pone.0304610.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/6ff94fda449b/pone.0304610.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/e4669dd2297d/pone.0304610.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/89e4a9c14c40/pone.0304610.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/6aef639eeee6/pone.0304610.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/34cb870081a1/pone.0304610.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/19bc6bc179eb/pone.0304610.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/9ec79d93deee/pone.0304610.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/2dfb15f13363/pone.0304610.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/6c403651bc24/pone.0304610.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/b5e1d06b94ff/pone.0304610.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/6ff94fda449b/pone.0304610.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/e4669dd2297d/pone.0304610.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/89e4a9c14c40/pone.0304610.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/6aef639eeee6/pone.0304610.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/34cb870081a1/pone.0304610.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/19bc6bc179eb/pone.0304610.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/9ec79d93deee/pone.0304610.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f394/11142600/2dfb15f13363/pone.0304610.g010.jpg
摘要

人脸变形攻击对身份证件的安全性构成威胁,尤其是在后续的访问控制过程中,因为它们允许两个相关人员使用同一份文件。目前正在开发几种算法来检测变形攻击,这些算法通常需要大量经过变形处理的人脸图像数据集进行训练。在本研究中,使用人脸嵌入来实现两个不同的目的:首先,预先选择用于随后大规模生成人脸变形攻击的图像,其次,检测潜在的人脸变形攻击。先前的研究已经证明了嵌入在这两种情况下的强大功能。然而,我们的目标是在这些研究的基础上,将更强大的 MagFace 模型应用于这两种情况,并从人脸识别系统的脆弱性和攻击检测算法的角度,对嵌入在预选择和攻击检测中的作用进行全面分析。特别是,我们使用最新的研究进展来评估攻击的潜在性,同时还研究了变形算法的影响。对于第一个目标,我们开发了一种基于人脸嵌入相似度对个体进行配对的算法。为了预先选择人脸图像,使用了不同的最新人脸识别系统来提取嵌入,同时使用不同的变形算法来融合人脸图像。量化不同生成的变形人脸图像的攻击潜力,以比较嵌入自动生成大量成功的人脸变形攻击的可用性。对于第二个目标,我们比较了两种最先进的人脸识别系统的嵌入在检测变形人脸图像方面的性能。我们的结果表明,ArcFace 和 MagFace 为图像预选择提供了有价值的人脸嵌入。各种开源和商业现成的人脸识别系统容易受到生成的人脸变形攻击的影响,并且与随机配对相比,基于嵌入进行图像预选择会增加其脆弱性。特别是,基于地标定位的闭源变形算法生成的攻击对任何经过测试的人脸识别系统都构成了高风险。值得注意的是,更精确的人脸识别系统对人脸变形攻击的脆弱性更高。在所测试的系统中,商业现成的系统最容易受到人脸变形攻击的影响。此外,与之前使用的 ArcFace 嵌入相比,MagFace 嵌入在检测变形人脸图像方面表现出作为一种稳健替代的优势。通过对各种设计的攻击进行广泛分析,证明了人脸嵌入在更有效地进行人脸变形的图像预选择和更准确地检测变形人脸图像方面的优势。MagFace 模型是检测攻击的强大替代模型,经常使用的 ArcFace 模型,它可以根据用例提高性能。它还突出了嵌入的可用性,用于生成各种目的的大规模人脸变形数据库,例如作为对抗攻击的一种对策来训练人脸变形攻击检测算法。

相似文献

1
Towards minimizing efforts for Morphing Attacks-Deep embeddings for morphing pair selection and improved Morphing Attack Detection.为最小化变形攻击的工作量——用于变形对选择的深度嵌入和改进的变形攻击检测。
PLoS One. 2024 May 31;19(5):e0304610. doi: 10.1371/journal.pone.0304610. eCollection 2024.
2
A Double Siamese Framework for Differential Morphing Attack Detection.一种用于差分变形攻击检测的双联体框架。
Sensors (Basel). 2021 May 16;21(10):3466. doi: 10.3390/s21103466.
3
Detecting Morphing Attacks through Face Geometry Features.通过面部几何特征检测变形攻击。
J Imaging. 2020 Oct 29;6(11):115. doi: 10.3390/jimaging6110115.
4
Presentation Attack Face Image Generation Based on a Deep Generative Adversarial Network.基于深度生成对抗网络的人脸图像生成
Sensors (Basel). 2020 Mar 25;20(7):1810. doi: 10.3390/s20071810.
5
Feature Interaction-Based Face De-Morphing Factor Prediction for Restoring Accomplice's Facial Image.基于特征交互的面部变形因子预测以恢复 accomplice 的面部图像 。 注:这里“accomplice”不太明确在该语境下准确含义,或许结合上下文会更清晰其指代。
Sensors (Basel). 2024 Aug 25;24(17):5504. doi: 10.3390/s24175504.
6
Fingerphoto morphing attack generation using texture descriptors based landmarks.基于纹理描述符地标生成手指照片变形攻击。
Sci Rep. 2024 Jul 13;14(1):16182. doi: 10.1038/s41598-024-66790-8.
7
MagNet: Detecting Digital Presentation Attacks on Face Recognition.MagNet:检测针对人脸识别的数字呈现攻击。
Front Artif Intell. 2021 Dec 8;4:643424. doi: 10.3389/frai.2021.643424. eCollection 2021.
8
The Influence of the Other-Race Effect on Susceptibility to Face Morphing Attacks.异族效应对面部变形攻击易感性的影响。
ACM Trans Appl Percept. 2024 Jan;21(1). doi: 10.1145/3618113. Epub 2023 Dec 9.
9
Head poses and grimaces: Challenges for automated face identification algorithms?头部姿势与面部表情:对自动人脸识别算法的挑战?
Sci Justice. 2024 Jul;64(4):421-442. doi: 10.1016/j.scijus.2024.06.002. Epub 2024 Jun 18.
10
Visible-Light Camera Sensor-Based Presentation Attack Detection for Face Recognition by Combining Spatial and Temporal Information.基于可见光相机传感器的融合空间和时间信息的人脸识别演示攻击检测。
Sensors (Basel). 2019 Jan 20;19(2):410. doi: 10.3390/s19020410.

本文引用的文献

1
ArcFace: Additive Angular Margin Loss for Deep Face Recognition.ArcFace:用于深度人脸识别的附加角度间隔损失。
IEEE Trans Pattern Anal Mach Intell. 2022 Oct;44(10):5962-5979. doi: 10.1109/TPAMI.2021.3087709. Epub 2022 Sep 14.
2
Face Recognition Systems: A Survey.人脸识别系统:综述。
Sensors (Basel). 2020 Jan 7;20(2):342. doi: 10.3390/s20020342.