Due to the importance of the Morphing Attack, the development of new and accurate Morphing Attack Detection (MAD) systems is urgently needed by private and public institutions. In this context, D-MAD methods, i.e. detectors fed with a trusted live image and a probe tend to show better performance with respect to S-MAD approaches, that are based on a single input image. However, D-MAD methods usually leverage the identity of the two input face images only, and then present two main drawbacks: they lose performance when the two subjects look alike, and they do not consider potential artifacts left by the morphing procedure (which are instead typically exploited by S-MAD approaches). Therefore, in this paper, we investigate the combined use of D-MAD and S-MAD to improve detection performance through the fusion of the features produced by these two MAD approaches.

Combining Identity Features and Artifact Analysis for Differential Morphing Attack Detection / Di Domenico, Nicolò; Borghi, Guido; Franco, Annalisa; Maltoni, Davide. - 14233:(2023), pp. 100-111. ( Proceedings of the 22nd International Conference on Image Analysis and Processing, ICIAP 2023 Udine, Italy September 11-15, 2023) [10.1007/978-3-031-43148-7_9].

Combining Identity Features and Artifact Analysis for Differential Morphing Attack Detection

Borghi, Guido;
2023

Abstract

Due to the importance of the Morphing Attack, the development of new and accurate Morphing Attack Detection (MAD) systems is urgently needed by private and public institutions. In this context, D-MAD methods, i.e. detectors fed with a trusted live image and a probe tend to show better performance with respect to S-MAD approaches, that are based on a single input image. However, D-MAD methods usually leverage the identity of the two input face images only, and then present two main drawbacks: they lose performance when the two subjects look alike, and they do not consider potential artifacts left by the morphing procedure (which are instead typically exploited by S-MAD approaches). Therefore, in this paper, we investigate the combined use of D-MAD and S-MAD to improve detection performance through the fusion of the features produced by these two MAD approaches.
2023
Inglese
Proceedings of the 22nd International Conference on Image Analysis and Processing, ICIAP 2023
Udine, Italy
September 11-15, 2023
https://link.springer.com/chapter/10.1007/978-3-031-43148-7_9
Image Analysis and Processing – ICIAP 2023
Foresti G.L. Fusiello A. Hancock E.
14233
100
111
12
9783031431470
Springer Science and Business Media Deutschland GmbH
Morphing Attack; Morphing Attack Detection; Differential MAD (D-MAD); Single image MAD (S-MAD); Feature Fusion
Di Domenico, Nicolò; Borghi, Guido; Franco, Annalisa; Maltoni, Davide
Atti di CONVEGNO::Relazione in Atti di Convegno
273
4
Combining Identity Features and Artifact Analysis for Differential Morphing Attack Detection / Di Domenico, Nicolò; Borghi, Guido; Franco, Annalisa; Maltoni, Davide. - 14233:(2023), pp. 100-111. ( Proceedings of the 22nd International Conference on Image Analysis and Processing, ICIAP 2023 Udine, Italy September 11-15, 2023) [10.1007/978-3-031-43148-7_9].
partially_open
info:eu-repo/semantics/conferenceObject
File in questo prodotto:
File Dimensione Formato  
978-3-031-43148-7_9.pdf

Open access

Tipologia: AAM - Versione dell'autore revisionata e accettata per la pubblicazione
Licenza: [IR] other-oa
Dimensione 1.47 MB
Formato Adobe PDF
1.47 MB Adobe PDF Visualizza/Apri
ICIAP+2023.pdf

Accesso riservato

Tipologia: VOR - Versione pubblicata dall'editore
Licenza: [IR] closed
Dimensione 1.29 MB
Formato Adobe PDF
1.29 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

Licenza Creative Commons
I metadati presenti in IRIS UNIMORE sono rilasciati con licenza Creative Commons CC0 1.0 Universal, mentre i file delle pubblicazioni sono rilasciati con licenza Attribuzione 4.0 Internazionale (CC BY 4.0), salvo diversa indicazione.
In caso di violazione di copyright, contattare Supporto Iris

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11380/1339396
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 12
  • ???jsp.display-item.citation.isi??? 9
social impact