MorCode: Face Morphing Attack Generation using Generative Codebooks

Aravinda Reddy PN,Raghavendra Ramachandra,Sushma Venkatesh,Krothapalli Sreenivasa Rao,Pabitra Mitra,Rakesh Krishna
2024-10-10
Abstract:Face recognition systems (FRS) can be compromised by face morphing attacks, which blend textural and geometric information from multiple facial images. The rapid evolution of generative AI, especially Generative Adversarial Networks (GAN) or Diffusion models, where encoded images are interpolated to generate high-quality face morphing images. In this work, we present a novel method for the automatic face morphing generation method \textit{MorCode}, which leverages a contemporary encoder-decoder architecture conditioned on codebook learning to generate high-quality morphing images. Extensive experiments were performed on the newly constructed morphing dataset using five state-of-the-art morphing generation techniques using both digital and print-scan data. The attack potential of the proposed morphing generation technique, \textit{MorCode}, was benchmarked using three different face recognition systems. The obtained results indicate the highest attack potential of the proposed \textit{MorCode} when compared with five state-of-the-art morphing generation methods on both digital and print scan data.
Computer Vision and Pattern Recognition
What problem does this paper attempt to address?
### Problems the paper attempts to solve This paper aims to solve the problem that **facial recognition systems (FRS) are vulnerable to face morphing attacks**. Specifically, face morphing attacks generate a synthetic facial image by mixing the texture and geometric information of multiple facial images, which may lead to misrecognition in facial recognition systems and thus undermine their security. ### Main research contents 1. **Propose a new face morphing generation method, MorCode**: - Utilize the modern encoder - decoder architecture and combine it with the vector - quantized generative adversarial network (VQGAN). Interpolate the encoded latent features of two facial images through spherical interpolation and finally decode to generate high - quality morphed images. 2. **Construct a new dataset**: - Construct a new face morphing dataset, MorCode Morphing Dataset (MMD), which contains data in both digital and print - scan forms and is used to evaluate the effects of different face morphing generation techniques. 3. **Experimental verification**: - Conduct extensive experiments on the newly proposed MorCode method using three different deep - learning facial recognition systems (ArcFace, MagFace, and AdaFace). The results show that MorCode is superior to the existing five state - of - the - art face morphing generation methods in terms of attack potential. ### Key contributions 1. **Propose a 2D face morphing generation method based on codebooks and spherical interpolation** to achieve high - quality face morphing image generation. 2. **Introduce a new face morphing dataset, MMD**, which is constructed from the publicly available facial dataset FRGC V2, contains 160 data subjects, a total of 1,277 real samples and 2,526 morphed images. 3. **Use the Generalized Morphing Attack Potential (G - MAP) vulnerability metric** to quantitatively benchmark the proposed morphing generation technique against existing methods. 4. **Open - source the MorCode method** to support reproducible research: [https://github.com/Aravinda27/MorCode](https://github.com/Aravinda27/MorCode) ### Conclusions The research shows that the MorCode method has the highest attack potential in generating face morphing attack images, especially performing well on both digital and print - scan data. This indicates that the MorCode - driven method has a significant effect in face morphing generation and provides an important reference for improving the security of facial recognition systems. ### Formula representation - Spherical interpolation formula: \[ z_{ab} = \text{slerp}(z_a, z_b; \gamma) = \frac{\sin((1 - \gamma)\Omega)}{\sin(\Omega)} z_a + \frac{\sin(\gamma \Omega)}{\sin(\Omega)} z_b \] where \(\Omega\) is the angle between \(z_a\) and \(z_b\), and \(\gamma\) is the interpolation factor. - G - MAP calculation formula: \[ \text{G - MAP} = \frac{1}{|D|} \sum_{d \in D} \frac{1}{|P|} \sum_{i,j} \left[ \left( S_{ij}^1 > \tau_l \right) \wedge \cdots \wedge \left( S_{ij}^k > \tau_l \right) \right] \times \left[ 1 - \text{FTAR}(i, l) \right] \] where \(P\) represents the set of paired probe images, \(F\) represents the set of facial recognition systems, \(D\) represents the set of morphing attack generation types.