Hierarchical Generative Network for Face Morphing Attacks

被引:0
|
作者
He, Zuyuan [1 ]
Deng, Zongyong [1 ]
He, Qiaoyun [1 ]
Zhao, Qijun [1 ]
机构
[1] Sichuan Univ, Coll Comp Sci, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/FG59268.2024.10581963
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Face morphing attacks circumvent face recognition systems (FRSs) by creating a morphed image that contains multiple identities. However, existing face morphing attack methods either sacrifice image quality or compromise the identity preservation capability. Consequently, these attacks fail to bypass FRSs verification well while still managing to deceive human observers. These methods typically rely on global information from contributing images, ignoring the detailed information from effective facial regions. To address the above issues, we propose a novel morphing attack method to improve the quality of morphed images and better preserve the contributing identities. Our proposed method leverages the hierarchical generative network to capture both local detailed and global consistency information. Additionally, a mask-guided image blending module is dedicated to removing artifacts from areas outside the face to improve the image's visual quality. The proposed attack method is compared to state-of-the-art methods on three public datasets in terms of FRSs' vulnerability, attack detectability, and image quality. The results show our method's potential threat of deceiving FRSs while being capable of passing multiple morphing attack detection (MAD) scenarios.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] A Framework of Hierarchical Attacks to Network Controllability
    Lou, Yang
    Wang, Lin
    Chen, Guanrong
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2021, 98
  • [32] DeepPrivacy: A Generative Adversarial Network for Face Anonymization
    Hukkelas, Hakon
    Mester, Rudolf
    Lindseth, Frank
    ADVANCES IN VISUAL COMPUTING, ISVC 2019, PT I, 2020, 11844 : 565 - 578
  • [33] Face frontalization based on generative adversarial network
    Hu H.-Y.
    Gai S.-Y.
    Da F.-P.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2021, 55 (01): : 116 - 123and152
  • [34] Recurrent Generative Adversarial Network for Face Completion
    Wang, Qiang
    Fan, Huijie
    Sun, Gan
    Ren, Weihong
    Tang, Yandong
    IEEE TRANSACTIONS ON MULTIMEDIA, 2021, 23 : 429 - 442
  • [35] Evasion Attacks Based on Wasserstein Generative Adversarial Network
    Zhang, Jinlan
    Yan, Qiao
    Wang, Mingde
    2019 COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2019, : 454 - 459
  • [36] Poisoning attacks on face authentication systems by using the generative deformation model
    Chak-Tong Chan
    Szu-Hao Huang
    Patrick Puiyui Choy
    Multimedia Tools and Applications, 2023, 82 : 29457 - 29476
  • [37] Poisoning attacks on face authentication systems by using the generative deformation model
    Chan, Chak-Tong
    Huang, Szu-Hao
    Choy, Patrick Puiyui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (19) : 29457 - 29476
  • [38] Detection of Face Morphing Attacks Based on Patch-Level Features and Lightweight Networks
    Long, Min
    Zhao, Xuan
    Zhang, Le-Bing
    Peng, Fei
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [39] MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders
    Damer, Naser
    Fang, Meiling
    Siebke, Patrick
    Kolf, Jan Niklas
    Huber, Marco
    Boutros, Fadi
    2023 11TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS, IWBF, 2023,
  • [40] Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation
    Qin L.
    Peng F.
    Venkatesh S.
    Ramachandra R.
    Long M.
    Busch C.
    IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 3 (01): : 72 - 88