KurdFace Morph Dataset Creation Using OpenCV

Authors

  • Arezu Rezgar Hussein Dept. Of Computer Science and IT, College of Science, University of Salahaddin, Erbil, Kurdistan Region, Iraq
  • Rasber Dhahir Rashid Dept. Of Computer Science and IT, College of Science, University of Salahaddin, Erbil, Kurdistan Region, Iraq

DOI:

https://doi.org/10.25271/sjuoz.2022.10.4.943

Keywords:

Face Recognition System, Biometric System, Morphing Attacks, OpenCV, LBP, Dataset creation

Abstract

Automated facial recognition is rapidly being used to reliably identify the identities of individuals for a variety of applications, from automated border control to unlocking mobile phones. The attack of Morphing has presented a significant risk to the face recognition system (FRS) at automated border control. Face morphing is a technique for blending the facial images of two or more people such that the outcome looks like both of them.  For example, a morphing attack may be used to get a fake passport by using a morphed image. This passport can be used by both the modified image contributors while crossing the border. Due to the publicly available digital altering tools that criminals may use to carry out face morphing attacks. Morph Attack Detection (MAD) systems have received a lot of attention in recent years. In the absence of automated morphing detection, Face Recognition Systems (FRS) are extremely susceptible to morphing attacks. Due to the limited number of publicly available face morph datasets to investigate, especially to our knowledge, there is no Kurdish morph dataset. In this work, we decided to generate a new face dataset, including morphed images which we named as "KurdFace" dataset. OpenCV was used to generate morphed images. Then we study the susceptibility of biometric systems to such morphed face attacks by designing and creating a Morph Attack Detection model to distinguish morphed images from genuine ones. To evaluate the robustness of our dataset regarding morphing attack detection, we compare it with the AMSL dataset to determine the classification error rate on both datasets to see how our dataset is different from others.  Local Binary Pattern and Uniform Local Binary Pattern are used as feature extraction techniques, and as a classifier, SVM is utilized. The experimental result shows that our dataset is suitable for research purposes.

Author Biographies

Arezu Rezgar Hussein, Dept. Of Computer Science and IT, College of Science, University of Salahaddin, Erbil, Kurdistan Region, Iraq

Dept. Of Computer Science and IT, College of Science, University of Salahaddin, Erbil, Kurdistan Region, Iraq – (arezu.hussein@su.edu.krd)

Rasber Dhahir Rashid, Dept. Of Computer Science and IT, College of Science, University of Salahaddin, Erbil, Kurdistan Region, Iraq

Dept. Of Computer Science and IT, College of Science, University of Salahaddin, Erbil, Kurdistan Region, Iraq – (rasber.rashid@su.edu.krd)

References

Adjabi, I., Ouahabi, A., Benzaoui, A., & Jacques, S. (2021). Multi-Block Color-Binarized Statistical Images for Single-Sample Face Recognition. Sensors, 21(3), 728. https://doi.org/10.3390/s21030728

Asma, Z., & Brahim, N. (2022). Local Binary Pattern Regrouping for Rotation Invariant Texture Classification: Journal of Information Technology Research, 15(1), 1–15. https://doi.org/10.4018/JITR.299945

Banerjee, S., & Ross, A. (2021). Conditional Identity Disentanglement for Differential Face Morph Detection. International Joint Conference on Biometrics (IJCB), 1–8. IEEE http://arxiv.org/abs/2107.02162

Damer, N., Boller, V., Wainakh, Y., Boutros, F., Terhörst, P., Braun, A., & Kuijper, A. (2019). Detecting Face Morphing Attacks by Analyzing the Directed Distances of Facial Landmarks Shifts. In T. Brox, A. Bruhn, & M. Fritz (Eds.), Pattern Recognition,11269, 518–534. Springer International Publishing. https://doi.org/10.1007/978-3-030-12939-2_36

Damer, N., Raja, K., Süßmilch, M., Venkatesh, S., Boutros, F., Fang, M., Kirchbuchner, F., Ramachandra, R., & Kuijper, A. (2021). ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation (arXiv:2108.09130). arXiv.1–23. Springer. http://arxiv.org/abs/2108.09130

Damer, N., Saladie, A. M., Braun, A., & Kuijper, A. (2018). MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network. 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), 1–10. https://doi.org/10.1109/BTAS.2018.8698563

Debiasi, L., Scherhag, U., Rathgeb, C., Uhl, A., & Busch, C. (2018). PRNU-based detection of morphed face images. 2018 International Workshop on Biometrics and Forensics (IWBF), 1–7. https://doi.org/10.1109/IWBF.2018.8401555

DeBruine, L., & Jones, B. (2021, April 1). Face research lab London set. figshare. Retrieved October 15, 2022, from https://figshare.com/articles/dataset/Face_Research_Lab_London_Set/5047666

Ferrara, M., Franco, A., & Maltoni, D. (2014). The magic passport. IEEE International Joint Conference on Biometrics, 1–7. https://doi.org/10.1109/BTAS.2014.6996240

Ferrara, M., Franco, A., & Maltoni, D. (2016). On the Effects of Image Alterations on Face Recognition Accuracy. In T. Bourlai (Ed.), Face Recognition Across the Imaging Spectrum,195–222. Springer International Publishing. https://doi.org/10.1007/978-3-319-28501-6_9

Ferrara, M., Franco, A., & Maltoni, D. (2018). Face Demorphing. IEEE Transactions on Information Forensics and Security, 13(4), 1008–1017.https://doi.org/10.1109/TIFS.2017.2777340

Ferrara, M., Franco, A., & Maltoni, D. (2021). Face morphing detection in the presence of printing/scanning and heterogeneous image sources. IET Biometrics, 10(3), 290–303. https://doi.org/10.1049/bme2.12021

Gomez-Barrero, M., Rathgeb, C., Scherhag, U., & Busch, C. (2017). Is your biometric system robust to morphing attacks? 2017 5th International Workshop on Biometrics and Forensics (IWBF), 1–6. https://doi.org/10.1109/IWBF.2017.7935079

Jassim, S., & Asaad, A. (2018). Automatic Detection of Image Morphing by Topology-based Analysis. 2018 26th European Signal Processing Conference (EUSIPCO), 1007–1011. https://doi.org/10.23919/EUSIPCO.2018.8553317

King, D. E. (2009). Dlib-ml: A Machine Learning Toolkit. The Journal of Machine Learning Research, 10, 1755-1758.https://doi.org/10.1145/3082031.3083244

Kraetzer, C., Makrushin, A., Neubert, T., Hildebrandt, M., & Dittmann, J. (2017). Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing. Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 21–32. https://doi.org/10.1145/3082031.3083244

Makrushin, A., Kraetzer, C., Neubert, T., & Dittmann, J. (2018). Generalized Benford’s Law for Blind Detection of Morphed Face Images. Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 49–54. https://doi.org/10.1145/3206004.3206018

Makrushin, A., Neubert, T., & Dittmann, J. (2019). Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control: Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 513–520. https://doi.org/10.5220/0007378905130520

Misra, S., & Arumugam, C. (Eds.). (2022). Illumination of Artificial Intelligence in Cybersecurity and Forensics (Vol. 109). Springer International Publishing. https://doi.org/10.1007/978-3-030-93453-8

Neubert, T., Makrushin, A., Hildebrandt, M., Kraetzer, C., & Dittmann, J. (2018). Extended StirTrace benchmarking of biometric and forensic qualities of morphed face images. IET Biometrics, 7(4), 325–332. https://doi.org/10.1049/iet-bmt.2017.0147

Ojala, T., & Pietikainen, M. (1996). A comparative study of texture measures with classification based on featured distributions. Pattern recognition, 29(1), 51-59. https://doi.org/10.1016/0031-3203(95)00067-4

Ojala, T., Pietikainen, M., & Maenpaa, T. (2002). Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(7), 971–987. https://doi.org/10.1109/TPAMI.2002.1017623

Pikoulis, E.-V., Ioannou, Z.-M., Paschou, M., & Sakkopoulos, E. (2021). Face Morphing, a Modern Threat to Border Security: Recent Advances and Open Challenges. Applied Sciences, 11(7), 3207, 1–15. https://doi.org/10.3390/app11073207

Raghavendra, R., Raja, K. B., & Busch, C. (2016). Detecting morphed face images. 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), 1–7. https://doi.org/10.1109/BTAS.2016.7791169

Raghavendra, R., Raja, K. B., Venkatesh, S., & Busch, C. (2017a). Transferable Deep-CNN Features for Detecting Digital and Print-Scanned Morphed Face Images. 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 1822–1830. https://doi.org/10.1109/CVPRW.2017.228

Raghavendra, R., Raja, KiranB., Venkatesh, S., & Busch, C. (2017b). Face morphing versus face averaging: Vulnerability and detection. 2017 IEEE International Joint Conference on Biometrics (IJCB), 555–563. https://doi.org/10.1109/BTAS.2017.8272742

Raghavendra, R., Venkatesh, S., Raja, K. B., Wasnik, P., Stokkenes, M., & Busch, C. (2018). Fusion of Multi-Scale Local Phase Quantization Features for Face Presentation Attack Detection. 2018 21st International Conference on Information Fusion (FUSION), 2107–2112. https://doi.org/10.23919/ICIF.2018.8455781

Ramachandra, R., & Busch, C. (2018). Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey. ACM Computing Surveys, 50(1), 1–37. https://doi.org/10.1145/3038924

Ramachandra, R., Venkatesh, S., Raja, K., & Busch, C. (2019). Towards making Morphing Attack Detection robust using hybrid Scale-Space Colour Texture Features. 2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA), 1–8. https://doi.org/10.1109/ISBA.2019.8778488

Rashid, R. D., Jassim, S. A., & Sellahewa, H. (2013). LBP based on multi wavelet sub-bands feature extraction used for face recognition. 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP), 1–6. https://doi.org/10.1109/MLSP.2013.6661911

Scherhag, U., Debiasi, L., Rathgeb, C., Busch, C., & Uhl, A. (2019). Detection of Face Morphing Attacks Based on PRNU Analysis. IEEE Transactions on Biometrics, Behavior, and Identity Science, 1(4), 302–317. https://doi.org/10.1109/TBIOM.2019.2942395

Scherhag, U., Raghavendra, R., Raja, K. B., Gomez-Barrero, M., Rathgeb, C., & Busch, C. (2017). On the vulnerability of face recognition systems towards morphed face attacks. 2017 5th International Workshop on Biometrics and Forensics (IWBF), 1–6. https://doi.org/10.1109/IWBF.2017.7935088

Scherhag, U., Rathgeb, C., Merkle, J., Breithaupt, R., & Busch, C. (2019). Face Recognition Systems Under Morphing Attacks: A Survey. IEEE Access, 7, 23012–23026. https://doi.org/10.1109/ACCESS.2019.2899367

Scherhag, U., Rathgeb, C., Merkle, J., & Busch, C. (2020). Deep Face Representations for Differential Morphing Attack Detection. IEEE Transactions on Information Forensics and Security, 15, 3625–3639. https://doi.org/10.1109/TIFS.2020.2994750

Singh, J. M., Ramachandra, R., Raja, K. B., & Busch, C. (2019). Robust Morph-Detection at Automated Border Control Gate using Deep Decomposed 3D Shape and Diffuse Reflectance. 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), 106-112. IEEE. http://arxiv.org/abs/1912.01372

Venkatesh, S., Ramachandra, R., Raja, K., & Busch, C. (2020). Single Image Face Morphing Attack Detection Using Ensemble of Features. 2020 IEEE 23rd International Conference on Information Fusion (FUSION), 1–6. https://doi.org/10.23919/FUSION45008.2020.9190629

Venkatesh, S., Ramachandra, R., Raja, K., & Busch, C. (2021). Face Morphing Attack Generation and Detection: A Comprehensive Survey. IEEE Transactions on Technology and Society, 2(3), 128–145. https://doi.org/10.1109/TTS.2021.3066254

Venkatesh, S., Ramachandra, R., Raja, K., Spreeuwers, L., Veldhuis, R., & Busch, C. (2019). Morphed Face Detection Based on Deep Color Residual Noise. 2019 Ninth International Conference on Image Processing Theory, Tools and Applications (IPTA), 1–6. https://doi.org/10.1109/IPTA.2019.8936088

Venkatesh, S., Zhang, H., Ramachandra, R., Raja, K., Damer, N., & Busch, C. (2020). Can GAN Generated Morphs Threaten Face Recognition Systems Equally as Landmark Based Morphs? -- Vulnerability and Detection. 2020 8th International Workshop on Biometrics and Forensics (IWBF) 1-6. IEEE. http://arxiv.org/abs/2007.03621

Wandzik, L., Garcia, R. V., Kaeding, G., & Chen, X. (2017). CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing. In C. Kraetzer, Y.-Q. Shi, J. Dittmann, & H. J. Kim (Eds.), Digital Forensics and Watermarking10431, 121–135. Springer International Publishing. https://doi.org/10.1007/978-3-319-64185-0_10

Yang, W., Wang, S., Sahri, N. M., Karie, N. M., Ahmed, M., & Valli, C. (2021). Biometrics for Internet-of-Things Security: A Review. Sensors, 21(18), 6163. https://doi.org/10.3390/s21186163

Zhang, H., Venkatesh, S., Ramachandra, R., Raja, K., Damer, N., & Busch, C. (2021). MIPGAN—Generating Strong and High Quality Morphing Attacks Using Identity Prior Driven GAN. IEEE Transactions on Biometrics, Behavior, and Identity Science, 3(3), 365–383. https://doi.org/10.1109/TBIOM.2021.3072349

Zhang, L.-B., Peng, F., & Long, M. (2018). Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise. 2018 IEEE International Conference on Multimedia and Expo (ICME), 1–6. https://doi.org/10.1109/ICME.2018.8486607

Downloads

Published

2022-12-14

How to Cite

Hussein, A. R., & Rashid, R. D. (2022). KurdFace Morph Dataset Creation Using OpenCV. Science Journal of University of Zakho, 10(4), 258–267. https://doi.org/10.25271/sjuoz.2022.10.4.943

Issue

Section

Science Journal of University of Zakho