A Generating and Detecting Face Morphing Using Texture Techniques
Generating and Detecting Face Morphing Using Texture Techniques
DOI:
https://doi.org/10.31642/JoKMC/2018/100115Keywords:
Edge Detection , Face recognition, Wasserstein Distance, Face landmark, Local Binary Pattern, Gray-Level Co-Occurrence Matrix.Abstract
Biometric forms major and very effective role nowadays in many fields such as health, reliability, devices, phones, banking, airport security, and others because of its unique characteristics for each person that cannot be replicated in another person. Therefore, most security systems rely and verify biometric properties. Airport security systems rely directly on facial recognition, but these systems may be exposed to attacks by the use of morphing faces in the passport image that allows multiple users to use the same passport. This paper presents a complete system consist of three stage, the first stage generating morphing faces based on edge detection to determine landmark and combine between landmarks to produce morphing. The second stage passing images on to the face recognition system that using Local Binary Pattern to features extraction, the final stage how to detect image bona fide or morph using texture techniques represented by each Local binary pattern and Gray-Level Co-Occurrence Matrix. With the use of the Wasserstein Distance measure, which has not previously been used in this field. The method gave effective results showing the mechanism of reducing morphing attack.
Downloads
References
W. Ali, W. Tian, S. U. Din, D. Iradukunda, and A. A. Khan, “Classical and modern face recognition approaches: a complete review,” Multimedia Tools and Applications, 80(3), 4825-4880. [2] Parmar, D. N., & Mehta, B. B. (2014). Face recognition methods & applications. arXiv preprint arXiv:1403.0485. DOI: https://doi.org/10.1007/s11042-020-09850-1
M. Ferrara, A. Franco, and D. Maltoni, “The Magic Passport,” Proc. IEEE Int. Joint Conf. on Biometrics,” pp. 1–7, 2014. DOI: https://doi.org/10.1109/BTAS.2014.6996240
M. Ferrara, A. Franco, and D. Maltoni, “On the Effects of Image Alterations on Face Recognition Accuracy,” In Bourlai, T. (ed.) Face Recognition Across the Electromagnetic Spectrum, pp. 195–222, 2016. DOI: https://doi.org/10.1007/978-3-319-28501-6_9
U. Scherhag, R. Raghavendra, K.B. Raja, M. Gomez-Barrero, C. Rathgeb, and C. Busch, “On the Vulnerability of Face Recognition Systems: Towards Morphed Face Attacks,” Proc. IWBF, 2017. DOI: https://doi.org/10.1109/IWBF.2017.7935088
R. Raghavendra, and C. Busch, “Presentation attack detection methods for face recognition systems: A comprehensive survey,” ACM Comput. Surv., 50(1), Mar. 2017 [7] L. Wandzik, G. Kaeding, and R. V. Garcia, “Morphing detection using a general-purpose face recognition system,” In 2018 26th European Signal Processing Conference (EUSIPCO) (pp. 1012-1016). IEEE.
D. J. Robertson, A. Mungall, D. G. Watson, K. A. Wade, S. J. Nightingale, and S. Butler, “Detecting morphed passport photos: A training and individual differences approach,” Cogn. Res. Princ. Implicat., vol. 3, no. 1, p. 27, Jun. 2018. [9] Jana Dittmann, Otto-von-Guericke-Universität Magdeburg Faculty of Computer Science (FIN) Department of Technical & Business Information Systems (ITI) Research Group "Multimedia and Security" (AMSL), 39106 Magdeburg Germany,https://omen.cs.unimagdeburg.de/disclaimer/index.php. DOI: https://doi.org/10.1186/s41235-018-0113-8
N. Hazim, A. Bermani, N. Hazim Barnouti, S. Sameer Mahmood Al-Dabbagh, W. Esam Matti, and M. Abdul Sahib Naser, “Face Detection and Recognition Using Viola-Jones with PCA-LDA and Square Euclidean Distance Related papers Face Recognit ion: A Lit erat ure Review Nawaf Hazim Face Image Recognit ion Based on Linear Discernment Analysis and Cuckoo Search Opt imizat ion w,” IJACSA) Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 5, 2016. DOI: https://doi.org/10.14569/IJACSA.2016.070550
M. N. Chaudhari, M. Deshmukh, G. Ramrakhiani, and R. Parvatikar, “Face Detection Using Viola Jones Algorithm and Neural Networks,” Proc. - 2018 4th Int. Conf. Comput. Commun. Control Autom. ICCUBEA 2018, pp. 1–6, 2018. [12] S. Karanwal, and D. Manoj, “Neighborhood and center difference-based-LBP for face recognition,” Pattern Analysis and Applications 24.2: 741-761, 2021. [13] B. Niu, G. Zhenxing, and G. Bingbing, “Facial expression recognition with LBP and ORB features,” Computational Intelligence and Neuroscience 2021 (2021). [14] S. Abeer, M. A. Talab, and R.R. Al‐Dahhan, “Features Extraction for Robust Face Recognition Using GLCM and CS-LBP,” International Conference on Emerging Technologies andIntelligent Systems. Springer, Cham, 2021. [15] M. Yogeshwari, and G. Thailambal, “Automatic feature extraction and detection of plant leaf disease using GLCM features and convolutional neural networks,” Materials Today: Proceedings (2021). [16] J. Stanczuk, C. Etmann, L. M. Kreusser, and C.B. Schönlieb, “Wasserstein GANs work because they fail (to approximate the Wasserstein distance,” arXiv preprint arXiv:2103.01678,2021.
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2023 iman saleem
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.