Skip to main content

Effectiveness of Residual Noise Based Methods for Single Image Based Morphing Attack Detection: A Comparative Study

  • Conference paper
  • First Online:
Advances in Visual Computing (ISVC 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15046))

Included in the following conference series:

  • 181 Accesses

Abstract

Over the past few years, numerous morphing techniques have emerged that target the vulnerabilities of Face Recognition Systems (FRS). The Development of Generative Adversarial Networks (GANs) and diffusion-based high-quality morphing generation techniques has presented an even greater challenge because these techniques can capture even the most subtle details with remarkable precision. Face Morphing Attack Detection (MAD) has been extensively studied from conventional texture-based methods to more sophisticated Convolutional Neural Network (CNN) based approaches. Among these available approaches, the use of residual noise computed using image-denoising methods has gained attention owing to its generalizability. This paper presents a deep and critical analysis of existing residual noise-based Single-image-based Morphing Attack Detection (S-MAD) in terms of performance and generalization to unseen morphing generation techniques and unseen medium. To this extent, we compare and discuss six popular residual noise-based S-MAD algorithms on three different types of face morphing generation methods and two different data mediums such as digital and print-scan. A comprehensive comparison of residual-noise-based S-MAD methods is presented using three different evaluation protocols. Therefore, this study serves as a valuable resource for gaining insight into the performance of residual-noise-based S-MAD algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. DNP printer (2020). http://dnpphoto.com/en-us/Products/Printers/DS820A. Accessed Oct 2020

  2. Dabov, K., Foi, A., Katkovnik, V., Egiazarian, K.: Image denoising by sparse 3-D transform-domain collaborative filtering. IEEE Trans. Image Process. 16(8), 2080–2095 (2007). https://doi.org/10.1109/TIP.2007.901238

    Article  MathSciNet  MATH  Google Scholar 

  3. Dabov, K., Foi, A., Katkovnik, V., Egiazarian, K.: Image denoising with block-matching and 3D filtering. Proc. SPIE - Int. Soc. Opt. Eng. 6064, 354–365 (2006). https://doi.org/10.1117/12.643267

  4. Debiasi, L., Scherhag, U., Rathgeb, C., Uhl, A., Busch, C.: PRNU-based detection of morphed face images. In: 6th International Workshop on Biometrics and Forensics, pp. 1–6 (2018)

    Google Scholar 

  5. Ferrara, M., Franco, A., Maltoni, D.: Decoupling texture blending and shape warping in face morphing. In: International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE (2019)

    Google Scholar 

  6. Godage, S.R., Løvåsdal, F., Venkatesh, S., Raja, K., Ramachandra, R., Busch, C.: Analyzing human observer ability in morphing attack detection–where do we stand? IEEE Trans. Technol. Soc. 4(2), 125–145 (2023). https://doi.org/10.1109/TTS.2022.3231450

    Article  Google Scholar 

  7. International Civil Aviation Organization: Machine readable passports – part 9 – deployment of biometric identification and electronic storage of data in eMRTDs (2015). http://www.icao.int/publications/Documents/9303_p9_cons_en.pdf

  8. ISO/IEC JTC1 SC37 Biometrics: ISO/IEC 30107-3. Information Technology - Biometric presentation attack detection - Part 3: Testing and Reporting. International Organization for Standardization (2017)

    Google Scholar 

  9. Ivanovska, M., Štruc, V.: Face morphing attack detection with denoising diffusion probabilistic models. In: 2023 11th International Workshop on Biometrics and Forensics (IWBF), pp. 1–6. IEEE (2023)

    Google Scholar 

  10. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Pereira, F., Burges, C., Bottou, L., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol. 25. Curran Associates, Inc. (2012). https://proceedings.neurips.cc/paper_files/paper/2012/file/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf

  11. Landmark based face morphing, F.: Open CV. https://www.learnopencv.com/face-morph-using-opencv-cpp-python/

  12. Phillips, P.J., et al.: Overview of the face recognition grand challenge. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1, pp. 947–954 (2005). https://doi.org/10.1109/CVPR.2005.268

  13. Raghavendra, R., Raja, K., Busch, C.: Algorithmic fairness in face morphing attack detection. In: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, pp. 410–418 (2022)

    Google Scholar 

  14. Raghavendra, R., Raja, K., Venkatesh, S., Busch, C.: Face morphing versus face averaging: vulnerability and detection. In: Proceedings of International Joint Conference on Biometrics (IJCB) (2017)

    Google Scholar 

  15. Ramachandra, R., Li, G.: Multimodality for reliable single image based face morphing attack detection. IEEE Access 10, 82418–82433 (2022)

    Article  Google Scholar 

  16. Scherhag, U., Debiasi, L., Rathgeb, C., Busch, C., Uhl, A.: Detection of face morphing attacks based on PRNU analysis. Trans. Biometr. Behav. Identity Sci. (TBIOM) (2019)

    Google Scholar 

  17. Venkatesh, S., Raghavendra, R., Raja, K., Busch, C.: Face morphing attack generation and detection: a comprehensive survey. IEEE Trans. Technol. Soc. 2(3), 128–145 (2021). https://doi.org/10.1109/TTS.2021.3066254

    Article  MATH  Google Scholar 

  18. Venkatesh, S., Raghavendra, R., Raja, K., Spreeuwers, L., Veldhuis, R., Busch, C.: Detecting morphed face attacks using residual noise from deep multi-scale context aggregation network. In: 2020 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 269–278. IEEE (2020). https://doi.org/10.1109/WACV45572.2020.9093488

  19. Zhang, H., Venkatesh, S., Raghavendra, R., Raja, K., Damer, N., Busch, C.: MIPGAN–generating strong and high quality morphing attacks using identity prior driven GAN. IEEE Trans. Biometr. Behav. Identity Sci. 3(3), 365–383 (2021). https://doi.org/10.1109/TBIOM.2021.3072349

    Article  MATH  Google Scholar 

  20. Zhang, H., Ramachandra, R., Raja, K., Busch, C.: Morph-pipe: plugging in identity prior to enhance face morphing attack based on diffusion model. In: Norsk IKT-konferanse for forskning og utdanning (NISK), vol. 3, pp. 1–6 (2023)

    Google Scholar 

  21. Zhang, K., Zuo, W., Chen, Y., Meng, D., Zhang, L.: Beyond a Gaussian denoiser: residual learning of deep CNN for image denoising. IEEE Trans. Image Process. 26(7), 3142–3155 (2017). https://doi.org/10.1109/TIP.2017.2662206

    Article  MathSciNet  MATH  Google Scholar 

  22. Zhang, L., Yang, M., Feng, X.: Sparse representation or collaborative representation: which helps face recognition? In: IEEE International Conference on Computer Vision (ICCV), pp. 471–478 (2011)

    Google Scholar 

  23. Zhang, M., Gunturk, B.K.: Multiresolution bilateral filtering for image denoising. IEEE Trans. Image Process. 17(12), 2324–2333 (2008)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sushrut Patwardhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patwardhan, S., Venkatesh, S., Ramachandra, R. (2025). Effectiveness of Residual Noise Based Methods for Single Image Based Morphing Attack Detection: A Comparative Study. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2024. Lecture Notes in Computer Science, vol 15046. Springer, Cham. https://doi.org/10.1007/978-3-031-77392-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-77392-1_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-77391-4

  • Online ISBN: 978-3-031-77392-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics