{"id":883,"date":"2018-01-14T15:08:12","date_gmt":"2018-01-14T15:08:12","guid":{"rendered":"http:\/\/sicv.activearchives.org\/logbook\/?p=883"},"modified":"2018-01-14T15:10:22","modified_gmt":"2018-01-14T15:10:22","slug":"detection-of-face-morphing-attacks-by-deep-learning","status":"publish","type":"post","link":"https:\/\/sicv.activearchives.org\/logbook\/detection-of-face-morphing-attacks-by-deep-learning\/","title":{"rendered":"Detection of Face Morphing Attacks by Deep Learning"},"content":{"rendered":"<p><img loading=\"lazy\" src=\"http:\/\/sicv.activearchives.org\/logbook\/wp-content\/uploads\/2018\/01\/Screenshot-2018-1-14-SeiIWDW17-pdf-264x300.png\" alt=\"\" width=\"264\" height=\"300\" class=\"alignleft size-medium wp-image-884\" srcset=\"https:\/\/sicv.activearchives.org\/logbook\/wp-content\/uploads\/2018\/01\/Screenshot-2018-1-14-SeiIWDW17-pdf-264x300.png 264w, https:\/\/sicv.activearchives.org\/logbook\/wp-content\/uploads\/2018\/01\/Screenshot-2018-1-14-SeiIWDW17-pdf.png 695w\" sizes=\"(max-width: 264px) 100vw, 264px\" \/><\/p>\n<blockquote><p>Identification by biometric features has become more popular in the last decade. High  quality  video  and  fingerprint  sensors  have  become  less  expensive  and  are  nowadays standard components in many mobile devices. Thus, many devices can be unlocked via fingerprint  or  face  verification.  The  state  of  the  art  accuracy  of  biometric  facial  recognition systems prompted even systems that need high security standards like border control at airports to rely on biometric systems. While most biometric facial recognition systems perform quite accurate under a controlled environment, they can easily be tricked by morphing attacks. <strong>The concept of a morphing attack is to create one synthetic face image that contains characteristics of two different individuals and to use this image on a document or as reference image in a database. Using this image for authentication, a biometric facial recognition system accepts both individuals.<\/strong> In this paper, we propose a morphing attack detection approach based on convolutional neural networks. We present an automatic morphing pipeline to  generate  morphing  attacks,  train  neural  networks  based  on  this  data  and  analyze  their accuracy. The accuracy of different well-known network architectures are compared and the advantage of using pretrained networks compared to networks learned from scratch is studied.<\/p><\/blockquote>\n<p><a href=\"http:\/\/iphome.hhi.de\/samek\/pdf\/SeiIWDW17.pdf\">Detection of Face Morphing Attacks by Deep Learning<\/a>, Clemens Seibold, Wojciech Samek, Anna Hilsmann and Peter Eisert<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identification by biometric features has become more popular in the last decade. High quality video and fingerprint sensors have become less expensive and are nowadays standard components in many mobile devices. Thus, many devices can be unlocked via fingerprint or face verification. The state of the art accuracy of biometric facial recognition systems prompted even [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[157,160,159,47,51,9,158,75,29],"_links":{"self":[{"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/posts\/883"}],"collection":[{"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/comments?post=883"}],"version-history":[{"count":3,"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/posts\/883\/revisions"}],"predecessor-version":[{"id":887,"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/posts\/883\/revisions\/887"}],"wp:attachment":[{"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/media?parent=883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/categories?post=883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sicv.activearchives.org\/logbook\/wp-json\/wp\/v2\/tags?post=883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}