Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

KurdFace Morph Dataset Creation Using OpenCV

View through CrossRef
Automated facial recognition is rapidly being used to reliably identify the identities of individuals for a variety of applications, from automated border control to unlocking mobile phones. The attack of Morphing has presented a significant risk to the face recognition system (FRS) at automated border control. Face morphing is a technique for blending the facial images of two or more people such that the outcome looks like both of them.  For example, a morphing attack may be used to get a fake passport by using a morphed image. This passport can be used by both the modified image contributors while crossing the border. Due to the publicly available digital altering tools that criminals may use to carry out face morphing attacks. Morph Attack Detection (MAD) systems have received a lot of attention in recent years. In the absence of automated morphing detection, Face Recognition Systems (FRS) are extremely susceptible to morphing attacks. Due to the limited number of publicly available face morph datasets to investigate, especially to our knowledge, there is no Kurdish morph dataset. In this work, we decided to generate a new face dataset, including morphed images which we named as "KurdFace" dataset. OpenCV was used to generate morphed images. Then we study the susceptibility of biometric systems to such morphed face attacks by designing and creating a Morph Attack Detection model to distinguish morphed images from genuine ones. To evaluate the robustness of our dataset regarding morphing attack detection, we compare it with the AMSL dataset to determine the classification error rate on both datasets to see how our dataset is different from others.  Local Binary Pattern and Uniform Local Binary Pattern are used as feature extraction techniques, and as a classifier, SVM is utilized. The experimental result shows that our dataset is suitable for research purposes.
Title: KurdFace Morph Dataset Creation Using OpenCV
Description:
Automated facial recognition is rapidly being used to reliably identify the identities of individuals for a variety of applications, from automated border control to unlocking mobile phones.
The attack of Morphing has presented a significant risk to the face recognition system (FRS) at automated border control.
Face morphing is a technique for blending the facial images of two or more people such that the outcome looks like both of them.
  For example, a morphing attack may be used to get a fake passport by using a morphed image.
This passport can be used by both the modified image contributors while crossing the border.
Due to the publicly available digital altering tools that criminals may use to carry out face morphing attacks.
Morph Attack Detection (MAD) systems have received a lot of attention in recent years.
In the absence of automated morphing detection, Face Recognition Systems (FRS) are extremely susceptible to morphing attacks.
Due to the limited number of publicly available face morph datasets to investigate, especially to our knowledge, there is no Kurdish morph dataset.
In this work, we decided to generate a new face dataset, including morphed images which we named as "KurdFace" dataset.
OpenCV was used to generate morphed images.
Then we study the susceptibility of biometric systems to such morphed face attacks by designing and creating a Morph Attack Detection model to distinguish morphed images from genuine ones.
To evaluate the robustness of our dataset regarding morphing attack detection, we compare it with the AMSL dataset to determine the classification error rate on both datasets to see how our dataset is different from others.
  Local Binary Pattern and Uniform Local Binary Pattern are used as feature extraction techniques, and as a classifier, SVM is utilized.
The experimental result shows that our dataset is suitable for research purposes.

Related Results

How to Co-Create: A Compendium of Methods for Co-Creating Solutions to Complex and Wicked Problems in Public Health
How to Co-Create: A Compendium of Methods for Co-Creating Solutions to Complex and Wicked Problems in Public Health
Background: Co-creation has become a vital approach in public health, engaging diverse stakeholders, including vulnerable and marginalized populations, to collaboratively design an...
Multiple signaling functions of song in a polymorphic species with alternative reproductive strategies
Multiple signaling functions of song in a polymorphic species with alternative reproductive strategies
AbstractVocal traits can be sexually selected to reflect male quality, but may also evolve to serve additional signaling functions. We used a long‐term dataset to examine the signa...
Audio and video editing system design based on OpenCV
Audio and video editing system design based on OpenCV
With the rapid development of the Internet, a new carrier for people to perceive the world and communicate with each other - audio and video - is gradually being favoured by the pu...
Patterns of differentiation in a colour polymorphism and in neutral markers reveal rapid genetic changes in natural damselfly populations
Patterns of differentiation in a colour polymorphism and in neutral markers reveal rapid genetic changes in natural damselfly populations
The existence and mode of selection operating on heritable adaptive traits can be inferred by comparing population differentiation in neutral genetic variation between populations ...
Morph algorithms on GPUs
Morph algorithms on GPUs
There is growing interest in using GPUs to accelerate graph algorithms such as breadth-first search, computing page-ranks, and finding shortest paths. However, these algorithms do ...
Morphing orthogonal planar graph drawings
Morphing orthogonal planar graph drawings
We give an algorithm to morph between two planar orthogonal drawings of a graph, preserving planarity and orthogonality. The morph uses a quadratic number of steps, where each step...
Evolutionary dynamics and population biology of a polymorphic insect
Evolutionary dynamics and population biology of a polymorphic insect
Conspicuous heritable polymorphisms are useful to address the question if morph frequencies are stable or whether they fluctuate between generations. Ecological geneticists have st...
Survey on Different Morphology Detection Techniques
Survey on Different Morphology Detection Techniques
There is a lot of data traffic that translates and transports data in the digital environment of the World Wide Web. The data is presented as files and photos. Data can morph, so i...

Back to Top