Detection of manipulated images

Active Publication Date: 2022-09-20
NORWEGIAN UNIVERSITY OF SCIENCE AND TECHNOLOGY (NTNU)
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these attacks require a high degree of effort in generating a face artefact (i.e. artificial presentation attack instrument) and also in presenting the same to the ABC e-gate.
Furthermore, this kind of attack can only be successful if the attacker can gain access to a lost or stolen eMRTD passport that will allow him to prepare the face artefact that can resemble the face photo present in the eMRTD passport.
Indeed the risk of such an attack arising from retouched images has been recognised.
Whilst, as explained below, it causes a complex problem, the complexity of creating a morphed face image is fairly low due to the large number of freely available morphing software products available.
The vulnerability of the enrollment process for face morphing attacks has been demonstrated on commercial face recognition algorithms.
Also, the difficulty in humans detecting a morphed image has been demonstrated experimentally —even face recognition experts fail to detect morphed face images.
A further complication is that, in line with the passport application process used in most countries where a printed image is submitted, morphed face images can be printed and subsequently scanned again (at the passport office) with typically 300 dpi resolution following the ISO/IEC standards for generating the ID documents.
It has been demonstrated that ABC systems are particularly vulnerable to eMRTD passports incorporating such images.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection of manipulated images
  • Detection of manipulated images
  • Detection of manipulated images

Examples

Experimental program
Comparison scheme
Effect test

Example

[0071]In a variant of the first embodiment, the BSIF feature extraction system is replaced by a single deep convolutional neural network (D-CNN) as used in the second embodiment described below—either described D-CNN may be used. It may also use the classifier system of the second embodiment, which may receive its input from the first fully connected layer of the D-CNN, as is also described in relation to the second embodiment (the feature level fusion of the second embodiment not being required).

Experiment

[0072]The inventors constructed a new large-scale morphed face database comprised of 450 morphed images generated using different combination of facial images stemming from 110 data subjects. The first step in the data collection was to capture the face images following the ICAO capture standards as defined in the eMRTD passport specification. To this extent, they first collected the frontal face images in a studio set up with uniform illumination, uniform background, neutral pose an

Example

[0085]The second embodiment of the invention will now be discussed with reference to the remaining figures. It is particularly suited to the recognition of morphed images which have undergone a print-scan process and which are therefore more difficult to detect than “digital” morphed images. The print-scan process corresponds to the passport application process that is most widely employed.

[0086]FIG. 6 shows a block diagram of system 30 of the second embodiment. As will be discussed in more detail below, it is based upon feature-level fusion of two pre-trained deep convolutional neural networks (D-CNN) 31, 32 to detect morphed face images. The neural networks employed are known for use in image recognition and are pre-trained for that purpose.

[0087]Convolutional neural networks comprise one or more convolution layers (stages), which each have a set of learnable filters (also referred to as ‘kernels’) similar to those used in the previous embodiment. The term “deep” signifies that a plu

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An apparatus for detecting morphed or averaged images, wherein the morphed or averaged images are synthetically generated images including information from two or more different source images corresponding to two or more subjects. The apparatus may include a feature extraction module for receiving an input image and outputting a set of descriptor feature(s) characteristic of the image and a classifier module configured to allocate the input image either to a first class indicating that the image has been morphed or averaged or a second class indicating that it has not been morphed or averaged, based on the descriptor feature(s). The feature extraction module may include a plurality of neural networks providing complementary descriptor feature(s) to the classifier module. The apparatus further may include a fusion module for combining descriptor feature data from each neural network and transmitting the fused feature data to the classifier module.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner NORWEGIAN UNIVERSITY OF SCIENCE AND TECHNOLOGY (NTNU)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products