簡易檢索 / 詳目顯示

研究生: 陳欣怡
Chen, Xinyi
論文名稱: 基於PRNU之臉部變形攻擊偵測與合成來源預測
PRNU-Based Face Morphing Attack Detection and Synthetic Source Prediction
指導教授: 王明習
Wang, Ming-Shi
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系
Department of Engineering Science
論文出版年: 2019
畢業學年度: 107
語文別: 中文
論文頁數: 46
中文關鍵詞: 變形攻擊人臉識別光響應非均勻性
外文關鍵詞: Morphing Attack, Face Recognition, Photo Response Non-Uniformity
相關次數: 點閱:113下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 人臉變形攻擊對各種以人臉識別為基準的安全機制構成了嚴重的威脅,目前也尚未有可靠的方法來對抗這類攻擊。在本論文中提出了兩種基於光響應非均勻性雜訊特性提取特徵的方法,並結合兩種特徵,對由兩個不同資料集生成的多種變形參數變形圖像進行了實驗,分析出最有效的變形偵測方法,並與其他方法進行對比,證明了該方法的優勢。另外,針對變形圖片,我們提出一種結合實時圖像,從變形圖像中提取出變形源圖像成分,由此預測變形來源的方法,並證明了該方法的有效性。

    The face morphing attack posed a serious threat to various security mechanisms based on face recognition, and there is no reliable approach to deal with the attack. In this research, we proposed two kinds of feature extraction methods based on the photo response non-uniformity (PRNU) and combine these two features to carry out the experiments. The experimental morphed images are generated from two different data sets. The PRNU of a face image is detected firstly, then the feature of the celled histograms of the DFT magnitudes of the detected PRNU are created. The bin with the maximum value in the celled histogram is used as an indicator to judge the real and morphed images. These bins with maximum value extracted from each cell is aggregated to calculate the root mean square as the global score S for the image. This score is used to decide if it is a morphing image. According to the experiments, the proposed method is outperformed then other methods. In addition, we propose a method to predict source face image by extracting the original face information from morphed face image and real-time face image, which simulates the real two-images detection scenario, and prove the effectiveness of this method.

    目錄 摘要 i Extended Abstract ii 誌謝 xvi 目錄 xvii 表目錄 xix 圖目錄 xx 第一章 緒論 1 1.1 研究背景與動機 1 1.2 研究目的 2 1.3 論文架構 2 第二章 相關資料探討 4 2.1 影像變形 4 2.2 數位圖像檢測技術 8 2.2.1 主動取證技術 8 2.2.2 被動取證技術 9 2.3 光響應非均勻性 10 2.4 相關文獻探討 14 第三章 研究方法 16 3.1 DFT頻譜直方圖特徵提取 17 3.1.1 PRNU分割 17 3.1.2 Cell特徵提取 17 3.1.3 Cell特徵聚合 18 3.2 頻譜特徵提取 19 3.2.1 劃分區域 19 3.2.2 特徵提取 20 3.3 變形來源預測 20 3.3.1 臉部成分提取 20 3.3.2 人臉匹配 23 第四章 實驗結果與討論 24 4.1 實驗環境 24 4.2 變形圖像生成和預處理 25 4.3 實驗結果 30 4.3.1 變形攻擊偵測實驗結果 30 4.3.2 變形源圖像預測實驗結果 34 第五章 結論與未來方向 36 5.1 結論 36 5.2 未來方向 36 參考文獻 37 附錄 40 附錄A:變形圖像偵測結果數據 40

    [1] N. K. Ratha, J. H. Connell, R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, vol. 40, no. 3, 2001, pp. 614-634.
    [2] R. Raghavendra, C. Busch, "Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey", ACM Comput. Surv., vol. 50, no. 1, 2017.
    [3] R. Raghavendra, K. B. Raja, C. Busch, "Detecting morphed face images", Proc. IEEE 8th Int. Conf. Biometrics Theory Appl. Syst. (BTAS), 2016, pp. 1-7.
    [4] U. Scherhag et al. , "On the vulnerability of face recognition systems towards morphed face attacks", Proc. Int. Workshop Biometrics Forensics (IWBF), 2017, pp. 1-7.
    [5] Best Practice Technical Guidelines for Automated Border Control (ABC) Systems—V2.0 , Warsaw, Poland, Aug. 2012.
    [6] Acuity Market Intelligence, “The Airport Automated Biometric Facilitation Report: From Curb to Gate”, 2018.
    [7] International Air Transport Association (IATA), IATA Automated Border Control Map, Mar. 2019, [Online]. Available: https://www.iata.org/whatwedo/passenger/Pages/automated-border-control-maps.aspx
    [8] D. E. King , "Dlib-ml: A machine learning toolkit", Journal of Machine Learning Research, 2009, vol. 10.
    [9] G. Wolberg, "Digital Image Warping", IEEE computer society press, Los Alamitos, CA, 1994.
    [10] M. Chen, J. Fridrich, M. Goljan, J. Lukas, "Determining image origin and integrity using sensor noise", IEEE Transactions on information forensics and security, vol. 3, no. 1, Mar. 2008, pp. 74-90.
    [11] M. Goljan, J. Fridrich, and J. Lukas, “Camera identification from printed images” , Proceedings of SPIE, Jan. 2008.
    [12] J. Fridrich , "Digital image forensic using sensor noise", IEEE Signal Processing Magazine, vol. 26, no. 2, Mar. 2009.
    [13] PyWavelets, Wavelet Properties Browser, 2019, [online]. Available: http://wavelets.pybytes.com/wavelet/db8/.
    [14] M. Ferrara, A. Franco, D. Maltoni, “The magic passport”, IEEE International Joint Conference on Biometrics, 2014, pp. 1–7.
    [15] FIDELITY European Project Web Site, Nov. 2017, [online]. Available: http://www.fidelity-project.eu/.
    [16] A. Makrushin, T. Neubert, J. Dittmann , “Automatic generation and detection of visually faultless facial morphs”, International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2017, pp. 39–50
    [17] M. Hildebrandt, T. Neubert, A. Makrushin, J. Dittmann,“Benchmarking face morphing forgery detection: Application of StirTrace for impact simulation of different processing steps”, International Workshop on Biometrics and Forensics, 2017, pp. 1–6.
    [18] C. Kraetzer, A. Makrushin, T. Neubert, M. Hildebrandt, J. Dittmann, “Modeling attacks on photo-id documents and applying media forensics for the detection of facial morphing”, The ACM Workshop on Information Hiding and Multimedia Security, 2017, pp. 21–32.
    [19] C. Seibold, W. Samek, A. Hilsmann, P. Eisert, "Detection of face morphing attacks by deep learning", International Workshop Digit. Watermarking (IWDW), 2017, pp. 107-120.
    [20] D. King, "High Quality Face Recognition with Deep Metric Learning", 2017, [Online]. Available: http://blog.dlib.net/2017/02/high-quality-face-recognition-with-deep.html
    [21] Merge Face API (V1), Face++, 2019, [Online]. Available: https://console.faceplusplus.com.cn/documents/20813963.
    [22] A. Martínez, R. Benavente, "The AR face database", 1998.
    [23] Psychological Image Collection at Stirling (PICS), 2D face sets, 2008, [Online]. Available: http://pics.psych.stir.ac.uk/2D_face_sets.htm.
    [24] Information Technology—Biometric Data Interchange Formats—Part 5: Face Image Data, 2012.
    [25] D. J. Robertson et al. , "Fraudulent ID using face morphs: Experiments on human and automatic recognition" in PloS One, 12(3), e0173319, 2017.
    [26] T. Neubert et al. , "Extended StirTrace Benchmarking of Biometric and Forensic Qualities of Morphed Face Images" in IET Biometrics, 2018.
    [27] P. Viola, M. J. Jones, "Robust real-time face detection", International Journal of Computer Vision, vol. 57, no. 2, 2014, pp. 137-154.
    [28] Information Technology—Biometric Presentation Attack Detection—Part 3: Testing and Reporting, 2017.

    無法下載圖示 校內:立即公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE