Creating a high-quality morphed image is a laborious and time-intensive endeavor due to the necessity of manual post-processing to eliminate typical artifacts produced by landmark-based morphing techniques. At the same time, morphed images of superior quality, without noticeable visual artifacts like ghosts, noise, or blurring, present heightened success probabilities to deceive human evaluators and commercial face verification systems. Therefore, in this paper, we investigate the use of Face Restoration to automatically retouch morphed images. Specifically, we investigate the efficacy of CodeFormer in removing artifacts and preserving the identity of the contributing subjects. An effective retouching method would allow the generation of large datasets containing high-quality retouched morphs, even starting from existing data, that are crucial for developing and evaluating the robustness of Morphing Attack Detection (MAD) algorithms
Di Domenico, N., Borghi, G., Franco, A., Maltoni, D. (2024). Face Restoration for Morphed Images Retouching [10.1109/IWBF62628.2024.10593948].
Face Restoration for Morphed Images Retouching
Di Domenico, Nicolò;Borghi, Guido;Franco, Annalisa;Maltoni, Davide
2024
Abstract
Creating a high-quality morphed image is a laborious and time-intensive endeavor due to the necessity of manual post-processing to eliminate typical artifacts produced by landmark-based morphing techniques. At the same time, morphed images of superior quality, without noticeable visual artifacts like ghosts, noise, or blurring, present heightened success probabilities to deceive human evaluators and commercial face verification systems. Therefore, in this paper, we investigate the use of Face Restoration to automatically retouch morphed images. Specifically, we investigate the efficacy of CodeFormer in removing artifacts and preserving the identity of the contributing subjects. An effective retouching method would allow the generation of large datasets containing high-quality retouched morphs, even starting from existing data, that are crucial for developing and evaluating the robustness of Morphing Attack Detection (MAD) algorithmsFile | Dimensione | Formato | |
---|---|---|---|
IWBF_2024.pdf
accesso aperto
Tipo:
Postprint
Licenza:
Licenza per accesso libero gratuito
Dimensione
428.7 kB
Formato
Adobe PDF
|
428.7 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.