Abstract
Over the past few years, numerous morphing techniques have emerged that target the vulnerabilities of Face Recognition Systems (FRS). The Development of Generative Adversarial Networks (GANs) and diffusion-based high-quality morphing generation techniques has presented an even greater challenge because these techniques can capture even the most subtle details with remarkable precision. Face Morphing Attack Detection (MAD) has been extensively studied from conventional texture-based methods to more sophisticated Convolutional Neural Network (CNN) based approaches. Among these available approaches, the use of residual noise computed using image-denoising methods has gained attention owing to its generalizability. This paper presents a deep and critical analysis of existing residual noise-based Single-image-based Morphing Attack Detection (S-MAD) in terms of performance and generalization to unseen morphing generation techniques and unseen medium. To this extent, we compare and discuss six popular residual noise-based S-MAD algorithms on three different types of face morphing generation methods and two different data mediums such as digital and print-scan. A comprehensive comparison of residual-noise-based S-MAD methods is presented using three different evaluation protocols. Therefore, this study serves as a valuable resource for gaining insight into the performance of residual-noise-based S-MAD algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
DNP printer (2020). http://dnpphoto.com/en-us/Products/Printers/DS820A. Accessed Oct 2020
Dabov, K., Foi, A., Katkovnik, V., Egiazarian, K.: Image denoising by sparse 3-D transform-domain collaborative filtering. IEEE Trans. Image Process. 16(8), 2080–2095 (2007). https://doi.org/10.1109/TIP.2007.901238
Dabov, K., Foi, A., Katkovnik, V., Egiazarian, K.: Image denoising with block-matching and 3D filtering. Proc. SPIE - Int. Soc. Opt. Eng. 6064, 354–365 (2006). https://doi.org/10.1117/12.643267
Debiasi, L., Scherhag, U., Rathgeb, C., Uhl, A., Busch, C.: PRNU-based detection of morphed face images. In: 6th International Workshop on Biometrics and Forensics, pp. 1–6 (2018)
Ferrara, M., Franco, A., Maltoni, D.: Decoupling texture blending and shape warping in face morphing. In: International Conference of the Biometrics Special Interest Group (BIOSIG). IEEE (2019)
Godage, S.R., Løvåsdal, F., Venkatesh, S., Raja, K., Ramachandra, R., Busch, C.: Analyzing human observer ability in morphing attack detection–where do we stand? IEEE Trans. Technol. Soc. 4(2), 125–145 (2023). https://doi.org/10.1109/TTS.2022.3231450
International Civil Aviation Organization: Machine readable passports – part 9 – deployment of biometric identification and electronic storage of data in eMRTDs (2015). http://www.icao.int/publications/Documents/9303_p9_cons_en.pdf
ISO/IEC JTC1 SC37 Biometrics: ISO/IEC 30107-3. Information Technology - Biometric presentation attack detection - Part 3: Testing and Reporting. International Organization for Standardization (2017)
Ivanovska, M., Štruc, V.: Face morphing attack detection with denoising diffusion probabilistic models. In: 2023 11th International Workshop on Biometrics and Forensics (IWBF), pp. 1–6. IEEE (2023)
Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Pereira, F., Burges, C., Bottou, L., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol. 25. Curran Associates, Inc. (2012). https://proceedings.neurips.cc/paper_files/paper/2012/file/c399862d3b9d6b76c8436e924a68c45b-Paper.pdf
Landmark based face morphing, F.: Open CV. https://www.learnopencv.com/face-morph-using-opencv-cpp-python/
Phillips, P.J., et al.: Overview of the face recognition grand challenge. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1, pp. 947–954 (2005). https://doi.org/10.1109/CVPR.2005.268
Raghavendra, R., Raja, K., Busch, C.: Algorithmic fairness in face morphing attack detection. In: Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, pp. 410–418 (2022)
Raghavendra, R., Raja, K., Venkatesh, S., Busch, C.: Face morphing versus face averaging: vulnerability and detection. In: Proceedings of International Joint Conference on Biometrics (IJCB) (2017)
Ramachandra, R., Li, G.: Multimodality for reliable single image based face morphing attack detection. IEEE Access 10, 82418–82433 (2022)
Scherhag, U., Debiasi, L., Rathgeb, C., Busch, C., Uhl, A.: Detection of face morphing attacks based on PRNU analysis. Trans. Biometr. Behav. Identity Sci. (TBIOM) (2019)
Venkatesh, S., Raghavendra, R., Raja, K., Busch, C.: Face morphing attack generation and detection: a comprehensive survey. IEEE Trans. Technol. Soc. 2(3), 128–145 (2021). https://doi.org/10.1109/TTS.2021.3066254
Venkatesh, S., Raghavendra, R., Raja, K., Spreeuwers, L., Veldhuis, R., Busch, C.: Detecting morphed face attacks using residual noise from deep multi-scale context aggregation network. In: 2020 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 269–278. IEEE (2020). https://doi.org/10.1109/WACV45572.2020.9093488
Zhang, H., Venkatesh, S., Raghavendra, R., Raja, K., Damer, N., Busch, C.: MIPGAN–generating strong and high quality morphing attacks using identity prior driven GAN. IEEE Trans. Biometr. Behav. Identity Sci. 3(3), 365–383 (2021). https://doi.org/10.1109/TBIOM.2021.3072349
Zhang, H., Ramachandra, R., Raja, K., Busch, C.: Morph-pipe: plugging in identity prior to enhance face morphing attack based on diffusion model. In: Norsk IKT-konferanse for forskning og utdanning (NISK), vol. 3, pp. 1–6 (2023)
Zhang, K., Zuo, W., Chen, Y., Meng, D., Zhang, L.: Beyond a Gaussian denoiser: residual learning of deep CNN for image denoising. IEEE Trans. Image Process. 26(7), 3142–3155 (2017). https://doi.org/10.1109/TIP.2017.2662206
Zhang, L., Yang, M., Feng, X.: Sparse representation or collaborative representation: which helps face recognition? In: IEEE International Conference on Computer Vision (ICCV), pp. 471–478 (2011)
Zhang, M., Gunturk, B.K.: Multiresolution bilateral filtering for image denoising. IEEE Trans. Image Process. 17(12), 2324–2333 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Patwardhan, S., Venkatesh, S., Ramachandra, R. (2025). Effectiveness of Residual Noise Based Methods for Single Image Based Morphing Attack Detection: A Comparative Study. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2024. Lecture Notes in Computer Science, vol 15046. Springer, Cham. https://doi.org/10.1007/978-3-031-77392-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-031-77392-1_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-77391-4
Online ISBN: 978-3-031-77392-1
eBook Packages: Computer ScienceComputer Science (R0)