GENERATION AND DETECTION OF FACT MORPHING ATTACKS

Authors

  • Mrs. M. SHARADA Author
  • J. DEEPTHI SREE Author
  • K. KIRTHI Author
  • P. KOTIBABU Author
  • K. BALA VENKATA SWAMI Author

DOI:

https://doi.org/10.5281/zenodo.15575850

Keywords:

Cloud Computing, Data Security

Abstract

Failure of facial recognition and authentication system may lead to several unlawful activities. The current facial recognition systems are vulnerable to different biometric attacks. This research focuses on morphing attack detection. This research proposes a robust detection mechanism that can deal with variation in age, illumination, eye and head gears. A deep learning-based feature extractor along with a classifier is adopted. Additionally, image enhancement and feature combination are proposed to augment the detection results. A versatile dataset is also developed that contains Morph-2 and Morph-3 images, created by sophisticated tools with manual intervention. Morph-3 images can give more realistic appearance and hence difficult to detect. Moreover, Morph-3 images are not considered in the literature before. Professional morphing software depicts more realistic morph attack scenario as compared to the morphs generated in the previous work from free programs and code scripts. Eight face databases are used for creation of morphs to encompass the variation. These databases are Celebrity2000, Extended Yale, FEI, FGNET, GT-DB, MULTI-PIE, FERET and FRLL. Results are investigated using multiple experimental setups and it is concluded that the proposed methodology gives promising results

Downloads

Published

02-06-2025

How to Cite

GENERATION AND DETECTION OF FACT MORPHING ATTACKS. (2025). International Journal of Engineering Research and Science & Technology, 21(2), 2030-2036. https://doi.org/10.5281/zenodo.15575850