Professional Documents
Culture Documents
ABSTRACT Face morphing attacks have demonstrated a high vulnerability on human observers and com-
mercial off-the-shelf Face Recognition Systems (FRS), especially in the border control scenario. Therefore,
detecting face morphing attacks is paramount to achieving a reliable and secure border control operation.
This work presents a novel framework for the Single image-based Morphing Attack Detection (S-MAD)
based on the multimodal regions such as eyes, nose, and mouth. Each of these regions is processed using
colour scale-space representation on which two different types of features are extracted using Binarised
Statistical Image Features (BSIF) and Local Binary Features (LBP) techniques. These features are then
fed to the classifiers such as Probabilistic Collaborative Representation Classifier (P-CRC) and Spectral
Regression Kernel Discriminant Analysis (SRKDA). Their decisions are combined at score level to make
the final decision. Extensive experiments are carried out on three different face morphing datasets to
benchmark the performance of the proposed method with the existing methods. Further, the proposed method
is benchmarked on the Bologna Online Evaluation Platform (BOEP). Obtained results demonstrate the
improved performance of the proposed method over existing state-of-the-art methods.
INDEX TERMS Biometrics, attacks, face biometrics, morphing attacks, multimodal modality.
• RQ#5: Does the proposed method can result in improved quantitative results of the proposed method on three dif-
generalisability to an unknown source of morphing process ferent datasets together with the state-of-the-art algorithms.
when compared to existing methods? Section V discuss the benchmark results on publicly available
In this work, we address the above presented research platform. Finally, Section VI draws the conclusion.
questions in a systematic manner through the following
contributions:
• We present a novel S-MAD technique based on multi- II. PROPOSED APPROACH
modality. To our knowledge, this is the first work that Figure 2 shows the block diagram of the proposed method to
introduces multimodality for S-MAD detection. Further, reliably detect the face morphing attacks using single image.
we also present the colour scale-space based multi-feature The novel part of the proposed method is the utility of mul-
technique to extract the discriminant features from the mul- timodality achieved by independently processing the salient
timodal regions of the face that are combined at comparison regions from the face to explore both complementarities and
score level to make the final decision. taking advantage of the morphing artefacts predominant in
• Extensive experiments are carried out on three different these regions. Inspired by the success of the scale-space
datasets to benchmark the detection performance of the features [5], [25] in detecting the morphing attacks, in this
proposed method with existing state-of-the-art methods. work, we proposed a new framework using scale-space rep-
These three different databases are semi-publicly available resentation followed by the texture-based features with two
for the research community. different classifiers such as P-CRC and SRKDA. The pro-
• The proposed method is extensively evaluated to bench- posed method consists of four functional blocks: multimodal
mark the generalizability to a different kind of morph gen- region extraction, colour scale-space representation, feature
eration method and the morphing source (e.g. digital and representation, classification and multi-level fusion. In the
print-scan). following, we discuss each of these functional blocks in
• The proposed method is extensively benchmarked to study detail.
the detection performance degradation on the effect of
manual post-processing in both digital and print-scan medi-
ums. A. MULTIMODAL REGION EXTRACTION
• The proposed method is benchmarked on the Bologna The main objective of this step is to extract the salient regions
Online Evaluation Platform (BOEP). from the face image effectively. The salient regions include
The rest of the paper is organised as follows: Section II the detected face, left periocular, right periocular, nose and
discuss the proposed method, Section III presents the mouth. Given the face image Fi , we have employed the Dlib
different datasets employed to benchmark the performance of DB-I was first introduced in [36] and generated from
the proposed method. We then present the quantitative results FRGC-V2 face database [19] to achieve high quality mor-
of the proposed method together with the existing methods. phing images. DB-I consists of 140 data subjects, among
The quantitative performance of the MAD techniques is pre- which 47 are female, and 93 are male data subjects. The face
sented using the ISO/IEC metrics [15] namely the ‘‘Attack morphing is generated using two different landmarks-based
Presentation Classification Error Rate (APCER (%)) which methods (Open CV [2] approach (referred as Landmark-I),
defines the proportion of attack images (morph images) incor- and UBO [13] approach (referred as Landmark-II) with post-
rectly classified as bona fide images and the Bona fide Pre- processing) and three different deep learning-based meth-
sentation Classification Error Rate (BPCER (%)) in which ods (MIPGAN-I, MIPGAN-II and StyleGAN). Further, DB-I
bona fide images incorrectly classified as attack images are consists of three different mediums such as digital, print-scan
counted [15] along with the Detection Equal Error Rate and print-scan with compression. The morphing is carried
(D-EER (%))’’ [36]. out by following the guidelines outlined earlier [21], [27],
i.e., careful selection of subjects based on gender and com-
A. FACE MORPHING DATASETS
parison score using FRS to make attacks realistic. The DB-I
consists of 2500 × 3 (types of morph data) × 4 types of
This section presents the characteristics of the three different
morph generation technique = 30, 000 morph samples and
datasets used to benchmark the quantitative performance of
1270 × 3 (types of morph data) × 4 types of morph genera-
the proposed method. Each of these datasets is selected by
tion technique = 15, 240 bona fide samples [36]. Figure 4
considering the unique features that can cover the unique
shows the example images from the DB-I for the digital
aspects such as the different morph generation, different
medium.
print-scan processes, ageing and manual post-processing. All
three databases are semi-publicly (researchers can submit the
algorithms and get the benchmarked results or researchers can 2) DATABASE-II (DB-II)
personally visit the authors institute to get complete access
DB-II dataset is generated using landmark-based morph gen-
to the datasets) available for the research purpose. In the
eration technique that is publicly available from OpenCV [2].
following, we describe the unique characteristics of these
The unique characteristic of this dataset is the manual
datasets.
post-processing of the morphed face images to weed out
the noise resulting from the morphing process. DB-II is
1) DATABASE-I (DB-I) constructed using the FRGC face dataset [19] from which
DB-I dataset consists five different morph generation meth- 147 unique data subjects are selected by considering the
ods that include both landmarks and deep learning-based. enrolment quality. The morphing dataset is generated by
• Among three different mediums (digital, print-scan generation techniques. This can be attributed to the
and print-scan with compression), the S-MAD tech- nature of morphing generation techniques, and the
niques has indicated outstanding performance on digital post-processing applied after the generation of the mor-
medium. In contrast, the performance is degraded with phed face image.
print-scan and print-scan with compression. • The proposed method has indicated the best perfor-
• The proposed method has indicated the best perfor- mance compared to the SOTA on most of the experi-
mance compared with two different state-of-the-art tech- ments. In some cases, the proposed method’s degraded
niques. performance is noted only with the digital medium.
• The proposed method has shown outstanding perfor- • The proposed method has shown outstanding perfor-
mance with D-EER = 0% on all different types of mor- mance on the print-scan medium. This can be attributed
phing generation techniques, especially with the digital to the nature of the data, as the print-scan process with
medium. These results indicate the efficacy of the pro- the same printer and scanner will somehow normalise
posed method. the effect of morph generation techniques. Further, it can
• The proposed method also indicates the best results also be noted that the proposed method has indicated
compared to the SOTA on both print-scan and print- the best detection performance compared to SOTA on
scan with compression. These results further justify the print-scan compression process data. Further, it can
scalability of the proposed approach to the different also be noted that the compression noise will degrade
mediums. the performance of the proposed method compared to
Based on the obtained results from the inter evaluation without compression, especially in the inter evaluation
protocols, the following are the main observations: protocols.
• In general, the performance of the S-MAD algorithms • All-in-all, the proposed method has indicated the best
are degraded in the inter evaluation protocol. However, performance in the inter evaluation protocol compared
the proposed method has indicated less degradation in to the SOTA.
the detection performance compared with the SOTA.
• Based on the obtained results, the morph generation C. RESULTS AND DISCUSSION ON DB-II
technique used for training can impact the detection This section presents the quantitative results on the DB-II to
performance when tested with the other morphing understand the role of manual post-processing in detection
accuracy. We have devised four different experiments to this S-MAD techniques after post-process (3) Experiment-3: train
extent: (1) Experiment-1: train and test S-MAD techniques after and test before post-process data (4) Experiment-4: train
on before post-process data. (2) Experiment-2: train and test before and test after post-process data. The DB-II includes
689 bona fide images and 517 morphed images in the training The following are the main observations based on the
set, and 583 bona fide and 554 morphed images in the testing obtained results.
set. The detection performance of the proposed method is • The detection performance of the algorithms are influ-
benchmarked against the existing S-MAD techniques such enced by the data medium. The digital medium generally
as Ensemble features [29], Deep features [22], Steerable indicates a better detection performance than the print-
features [24] and Hybrid features [25]. Table 6, 7, 8 and 9 scan medium. Among the print-scan medium, the PS-I
indicates the quantitative results of the proposed method dataset is the most challenging one to detect, which can
compared with the existing methods. be attributed to the quality of the print-scan process.
• The performance of the S-MAD techniques indicate the performance of the MAD techniques did not degrade
best detection accuracy when trained and tested on the when trained and tested on the same data medium. These
same data medium compared to the cross-medium in all results indicated that the performance of the S-MAD
four different experiments. The proposed method has algorithms are less affected by the post-processing if
indicated the best results when trained and tested with the algorithms are trained and tested using the same
the same medium compared to the existing methods in type of data medium. However, post-processing has an
all four experiments. impact on the performance of S-MAD techniques only
• Comparing the quantitative results before and after with cross data medium. Further, it is interesting to
post-processing (from Experiment-1 and 2), the perfor- note that that proposed method has indicated the best
mance of the S-MAD techniques are degraded when performance compared to SOTA on both after and before
trained and tested across the data medium. However, the post-processing data, including the cross-data medium.
• Based on the obtained results from Experiments-3 and 4, the influence in detection accuracy only across cross-
MAD techniques are trained on after post-processing medium.
and tested on before post-processing and vice versa. • Overall, the proposed method has indicated the best
These two experiments will provide insights into the performance across all four different experiments and
influence of detection accuracy on post-processing. thus indicated less influence to the post-processing
Also, we evaluate the same in cross data medium exper- data. For simplicity, we have shown the DET plots
iments. As indicated in the Table 8 and 9, the MAD (see Figure 9) on Experiment-4 indicating the perfor-
techniques has indicated less degradation when same mance of the proposed method.
data medium is used for training and testing. How-
ever, the detection performance is degraded when the D. RESULTS AND DISCUSSION ON DB-III
cross-medium is used in training and testing. Thus, In this section, we present the quantitative results of the
the post-processing of the morphed images indicates proposed method with the existing methods on the age
FIGURE 9. DET Curves showing the performance of the proposed method on Experiment-4 (a) Train on Digital (b) Train on PS-I (c) Train on PS-II.
TABLE 10. Experiment-I: Quantitative performance of the MAD TABLE 11. Experiment-I: Quantitative performance of the MAD
techniques on MorphAge-I. techniques on MorphAge-II.
variation datasets [32]. We have followed the same perfor- quantitative results of the proposed method together with the
mance evaluation protocol that of [32] with the same images existing methods. Based on the obtained results following are
used for training and testing. Table 10, 11 and 12 presents the the main observation:
VOLUME 10, 2022 82429
R. Ramachandra, G. Li: Multimodality for Reliable Single Image Based Face Morphing Attack Detection
FIGURE 11. Quantitative results from Bologna Online Evaluation Platform (BOEP).
TABLE 13. Execution time of MAD algorithms. improved performance over existing S-MAD techniques
on all five different types of morph generation.
• Q3. Does the proposed method indicates improved perfor-
mance on the morphing data with ageing?
– Based on the results obtained on DB-III, the proposed
method has indicated an outstanding performance on
all three experiments compared to the existing meth-
ods. Thus, the use of multimodality together with the
proposed features extraction and classifications scheme
has resulted in the robust S-MAD system for ageing
variation.
• Q4. Does the manual post-processing to remove morphing
artefacts in the morphed face image can degrade the perfor-
mance of the proposed method?
– Based on the obtained results on the DB-II, the man-
S-MAD method can be easily deployed in real-life experi-
ual post-processing of the morphed face images will
ments to achieve reliable detection accuracy.
impact the detection performance of both the proposed
method and existing methods. The proposed method has
IV. DISCUSSION
indicated the best performance even with manual post-
Based on the extensive experiments conducted, obtained
processing data.
results and the observations made above, the research ques-
• Q5. Does the proposed method can result in improved
tions formulated in Section I are answered below.
generalisability to an unknown source of morphing process
• Q1. Does the use of multimodality will improve the overall
when compared to existing methods?
performance of S-MAD?
– Based on the extensive experiments, the proposed
– Based on the extensive experiments reported using
method has indicated the improved performance over
three different datasets with varying characteristics
existing state-of-the-art on all three databases. Thus,
(like morphing generation type, manual post-processing
indicating the improved generalisability to an unknown
and ageing), the proposed method has consistently
source of morphing process
out-performed the existing S-MAD techniques. Thus,
the proposed method has indicated the best performance V. BENCHMARK RESULTS FROM BOLOGNA ONLINE
in detecting the single image face morphing attacks. EVALUATION PLATFORM (BOEP)
• Q2. Does the proposed S-MAD algorithm can indicate In this section, we present the quantitative results of
superior performance irrespective of the morphing gener- the proposed method on the Bologna Online Evaluation
ation techniques (e.g. landmark and deep learning-based)? Platform (BOEP) [1]. The proposed method is trained using
– Based on the results reported on DB-I in which the the data from all three different mediums such as: digital,
proposed method is evaluated on five different morph print-scan and print-scan compression. The training data is
generation techniques. The proposed method shows the sampled from all three datasets used in this work that are
discussed in section III-A. Figure 11a and 11b shows the [3] O. A. Abisoye and A. D. Mohammed, ‘‘Face morphing attack detection
performance of the proposed method on BOEP benchmark in the presence of post-processed image sources using neighborhood com-
ponent analysis and decision tree classifier,’’ in Proc. 3rd Int. Conf. Inf.
with two different datasets such as: SMAD-BIOLAB-1.0 [11] Commun. Technol. Appl. (ICTA), vol. 1350. Minna, Nigeria: Springer,
and SMAD-MORPHDB_D-1.0 [12] respectively. For the Nov. 2020, p. 340.
detailed description of these datasets readers can refer to [4] P. Aghdaie, B. Chaudhary, S. Soleymani, J. Dawson, and N. M. Nasrabadi,
‘‘Attention aware wavelet-based detection of morphed face images,’’ in
Bologna Online Evaluation Platform (BOEP) [1]. Based on Proc. IEEE Int. Joint Conf. Biometrics (IJCB), Aug. 2021, pp. 1–8.
the obtained results following can be noticed: [5] P. Aghdaie, B. Chaudhary, S. Soleymani, J. Dawson, and N. M. Nasrabadi,
• The proposed method indicates the variation in the ‘‘Detection of morphed face images using discriminative wavelet sub-
bands,’’ 2021, arXiv:2106.08565.
detection accuracy depending on the type of the dataset [6] B. Yip, G. Bingham, K. Kempfert, J. Fabish, T. Kling, C. Chen, and
used for the testing. Y. Wang, ‘‘Preliminary studies on a large face database,’’ in Proc. IEEE
• The proposed method indicates the performance with Int. Conf. Big Data (Big Data). IEEE, 2018, pp. 2572–2579.
[7] P. Burt and E. Adelson, ‘‘The Laplacian pyramid as a compact image
D-ERR = 23.92% on the SMAD-MORPHDB_ code,’’ IEEE Trans. Commun., vol. 31, no. 4, pp. 532–540, Apr. 2003.
D-1.0 [12] and D-EER = 40.45% on SMAD-BIOLAB- [8] N. Damer, N. Spiller, M. Fang, F. Boutros, F. Kirchbuchner, and A. Kuijper,
1.0 [11] dataset. ‘‘PW-MAD: Pixel-wise supervision for generalized face morphing attack
detection,’’ 2021, arXiv:2108.10291.
• The performance variation of the proposed method can [9] L. Debiasi, C. Rathgeb, U. Scherhag, A. Uhl, and C. Busch, ‘‘PRNU
be attributed to the variation in the data used for testing variance analysis for morphed face image detection,’’ in Proc. IEEE 9th
as well as for training. The degraded performance noted Int. Conf. Biometrics Theory, Appl. Syst. (BTAS), Oct. 2018, pp. 1–9.
[10] M. Ferrara, A. Franco, and D. Maltoni, ‘‘The magic passport,’’ in Proc.
with SMAD-BIOLAB-1.0 [11] can be attributed to the IEEE Int. Joint Conf. Biometrics, Sep. 2014, pp. 1–7.
nature of image manipulations in the dataset. SMAD- [11] M. Ferrara, A. Franco, and D. Maltoni, Face Recognition Across the
BIOLAB-1.0 dataset includes the face morphing images Imaging Spectrum, chapter On the Effects of Image Alterations on Face
Recognition Accuracy. Cham, Switzerland: Springer, 2016, pp. 195–222.
generated from manually generated landmarks and man- [12] M. Ferrara, A. Franco, and D. Maltoni, ‘‘Face demorphing,’’ IEEE Trans.
ually retouched. Inf. Forensics Security, vol. 13, no. 4, pp. 1008–1017, Apr. 2018.
• The obtained benchmarking results are similar to the [13] M. Ferrara, A. Franco, and D. Maltoni, ‘‘Decoupling texture blending and
shape warping in face morphing,’’ in Proc. Int. Conf. Biometrics Special
cross dataset results reported in our experiments in Interest Group (BIOSIG), Sep. 2019, pp. 1–5.
Section III-B. These results justifies our finding on gen- [14] W. T. Freeman and E. H. Adelson, ‘‘The design and use of steerable filters,’’
eralising to unknown morphing attacks are challenging IEEE Trans. Pattern Anal. Mach. Intell., vol. 13, no. 9, pp. 891–906,
Sep. 1991.
especially in the S-MAD scenario. [15] Information Technology Biometric Presentation Attack Detection—Part
3: Testing and Reporting, Standard ISO/IEC JTC1 SC37 Biometrics.
VI. CONCLUSION ISO/IEC 30107-3, International Organization for Standardization, 2017.
[16] A. Makrushin, T. Neubert, and J. Dittmann, ‘‘Humans Vs. algorithms:
This work presented a new framework to detect face mor- Assessment of security risks posed by facial morphing to identity verifica-
phing attacks based on a single image. The proposed method tion at border control,’’ in Proc. 14th Int. Joint Conf. Comput. Vis., Imag.
will explore the multimodal regions from the face that include Comput. Graph. Theory Appl., 2019, pp. 513–520.
[17] M. Ferrara, A. Franco, and D. Maltoni, ‘‘Face morphing detection in the
eyes, mouth, and nose processed independently using feature presence of printing/scanning and heterogeneous image sources,’’ 2019,
extraction and classification. In this work, we have used BSIF arXiv:1901.08811.
and LBP to extract both course and detailed texture fea- [18] M. Ngan, P. Grother, K. Hanaoka, and J. Kuo, ‘‘Face recognition
vendor test (FRVT)—Part 4: MORPH-performance of automated face
tures from the multimodal regions. The extracted features are Morph detection,’’ Nat. Inst. Technol. (NIST), Gaithersburg, MD, USA,
classified independently using P-CRC and SRKDA, whose Tech. Rep. NISTIR, 8292, 2021.
scores are combined at multiple levels to make the final [19] P. J. Phillips, P. J. Flynn, T. Scruggs, K. W. Bowyer, J. Chang, K. Hoffman,
J. Marques, J. Min, and W. Worek, ‘‘Overview of the face recognition
decision. Extensive experiments are carried out on three dif- grand challenge,’’ in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern
ferent datasets to benchmark the proposed method’s detection Recognit. (CVPR), vol. 1, Jun. 2005, pp. 947–954.
performance and the existing methods. Experimental eval- [20] R. Raghavendra and C. Busch, ‘‘Novel image fusion scheme based on
dependency measure for robust multispectral palmprint recognition,’’ Pat-
uation protocols are designed to benchmark the detection tern Recognit., vol. 47, no. 6, pp. 2205–2221, Jun. 2014.
performance on cross morph generation techniques, manual [21] R. Raghavendra, K. Raja, S. Venkatesh, and C. Busch, ‘‘Face morphing
post-processing and ageing variation. The proposed method versus face averaging: Vulnerability and detection,’’ in Proc. IEEE Int.
Joint Conf. Biometrics (IJCB), Oct. 2017, pp. 555–563.
has indicated the best performance over existing methods on [22] R. Raghavendra, K. B. Raja, S. Venkatesh, and C. Busch, ‘‘Transferable
all three datasets with different performance evaluation pro- deep-CNN features for detecting digital and print-scanned morphed face
tocols. The obtained results demonstrate the efficacy of the images,’’ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit. Workshops
(CVPRW), Jul. 2017, pp. 1822–1830.
proposed framework for reliable single image-based morph [23] R. Raghavendra, K. B. Raja, and C. Busch, ‘‘Detecting morphed face
attack detection. images,’’ in Proc. IEEE 8th Int. Conf. Biometrics Theory, Appl. Syst.
(BTAS), Sep. 2016, pp. 1–8.
[24] R. Raghavendra, S. Venkatesh, K. Raja, and C. Busch, ‘‘Detecting face
REFERENCES morphing attacks with collaborative representation of steerable features,’’
[1] Bologna Online Evaluation Platform (BOEP). Accessed: in Proc. IAPR Int. Conf. Comput. Vis. Image Process. (CVIP), 2018,
Apr. 4, 2022. [Online]. Available: https://biolab.csr.unibo.it/fvcongoing/ pp. 1–7.
UI/Form/boep.aspx [25] R. Ramachandra, S. Venkatesh, K. Raja, and C. Busch, ‘‘Towards making
[2] (2017). Face Morph Using OpenCV. Accessed: Apr. 10, 2017. morphing attack detection robust using hybrid scale-space colour texture
[Online]. Available: https://learnopencv.com/face-morph-using-opencv- features,’’ in Proc. IEEE 5th Int. Conf. Identity, Secur., Behav. Anal. (ISBA),
cpp-python/ Jan. 2019, pp. 1–7.
[26] K. Raja et al., ‘‘Morphing attack detection-database, evaluation plat- RAGHAVENDRA RAMACHANDRA (Senior
form, and benchmarking,’’ IEEE Trans. Inf. Forensics Security, vol. 16, Member, IEEE) received the Ph.D. degree in com-
pp. 4336–4351, 2021. puter science and technology from the University
[27] U. Scherhag, A. Nautsch, C. Rathgeb, M. Gomez-Barrero, of Mysore, Mysore India and Institute Telecom,
R. N. J. Veldhuis, L. Spreeuwers, M. Schils, D. Maltoni, P. Grother, and Telecom SudParis, Evry, France (carried out
S. Marcel, R. Breithaupt, R. Ramachandra, and C. Busch, ‘‘Biometric as a collaborative work), in 2010. He was a
systems under morphing attacks: Assessment of morphing techniques and Researcher with the Istituto Italiano di Tecnologia,
vulnerability reporting,’’ in Proc. Int. Conf. Biometrics Special Interest Genoa, Italy, where he worked with video surveil-
Group (BIOSIG), Sep. 2017, pp. 1–7.
lance and social signal processing. He is currently
[28] U. Scherhag, R. Raghavendra, K. B. Raja, M. Gomez-Barrero, C. Rathgeb,
a Full Professor at the Institute of Information
and C. Busch, ‘‘On the vulnerability of face recognition systems towards
Security and Communication Technology (IIK), Norwegian University of
morphed face attacks,’’ in Proc. 5th Int. Workshop Biometrics Forensics
(IWBF), Apr. 2017, pp. 1–6. Science and Technology (NTNU), Gjøvik, Norway. He is also working as a
[29] S. Venkatesh, R. Ramachandra, K. Raja, and C. Busch, ‘‘Single image face Research and Development Chief at MOBAI AS. He has authored several
morphing attack detection using ensemble of features,’’ in Proc. IEEE 23rd articles and is a reviewer for several international conferences and journals.
Int. Conf. Inf. Fusion (FUSION), Jul. 2020, pp. 1–5. He also holds several patents in biometric presentation attack detection and
[30] S. Venkatesh, R. Ramachandra, K. Raja, L. Spreeuwers, R. Veldhuis, and morphing attack detection. His main research interests include deep learning,
C. Busch, ‘‘Detecting morphed face attacks using residual noise from deep machine learning, data fusion schemes, and image/video processing, with
multi-scale context aggregation network,’’ in Proc. IEEE Winter Conf. applications to biometrics, multimodal biometric fusion, human behavior
Appl. Comput. Vis. (WACV), Mar. 2020, pp. 1–8. analysis, and crowd behavior analysis. He has received several best paper
[31] S. Venkatesh, R. Ramachandra, K. Raja, L. Spreeuwers, R. Veldhuis, and awards. He has also been involved in various conference organizing and
C. Busch, ‘‘Morphed face detection based on deep color residual noise,’’ in program committees and has served as an associate editor for various
Proc. 9th Int. Conf. Image Process. Theory, Tools Appl. (IPTA), Nov. 2019, journals. He has participated (as a PI, a Co-PI or a Contributor) in several
pp. 1–8. EU projects, IARPA USA, and other national projects. He is serving as an
[32] S. Venkatesh, K. Raja, R. Ramachandra, and C. Busch, ‘‘On the Editor for the ISO/IEC 24722 standards on multimodal biometrics and an
influence of ageing on face morph attacks: Vulnerability and detec- Active Contributor for the ISO/IEC SC 37 standards on biometrics.
tion,’’ in Proc. IEEE Int. Joint Conf. Biometrics (IJCB), Sep. 2020,
pp. 1–8. GUOQIANG LI (Member, IEEE) received the
[33] S. Venkatesh, R. Ramachandra, and K. Raja, ‘‘Face morphing of new- bachelor’s degree from Jilin University, China,
borns can be threatening too : Preliminary study on vulnerability and in 2005, the master’s degree from the Harbin Insti-
detection,’’ in Proc. IEEE Int. Joint Conf. Biometrics (IJCB), Aug. 2021, tute of Technology, China, in 2007, and the Ph.D.
pp. 1–8.
degree in information security from the Norwegian
[34] S. Venkatesh, R. Ramachandra, K. Raja, and C. Busch, ‘‘Face morphing
University of Technology and Science (NTNU),
attack generation and detection: A comprehensive survey,’’ IEEE Trans.
Gjøvik, Norway, in 2016. He is currently working
Technol. Soc., vol. 2, no. 3, pp. 128–145, 2021.
[35] S. Venkatesh, H. Zhang, R. Ramachandra, K. Raja, N. Damer, and
as a Senior Researcher at the Institute of Infor-
C. Busch, ‘‘Can GAN generated morphs threaten face recognition sys- mation Security and Communication Technology
tems equally as landmark based morphs?—Vulnerability and detection,’’ (IIK), NTNU. He also holds a post as a Chief
in Proc. 8th Int. Workshop Biometrics Forensics (IWBF), Apr. 2020, Scientist at MOBAI AS, Norway. He has participated in several EU projects,
pp. 1–6. such as FIDELITY Project, PIDaaS Project, and iMARS Project, and a
[36] H. Zhang, S. Venkatesh, R. Ramachandra, K. Raja, N. Damer, and couple of national projects. His research interests include related to finger-
C. Busch, ‘‘MIPGAN—Generating strong and high quality morphing print recognition, face recognition, biometric template protection, behavioral
attacks using identity prior driven GAN,’’ IEEE Trans. Biometrics, Behav., biometrics, and image processing.
Identity Sci., vol. 3, no. 3, pp. 365–383, Jul. 2021.