five

FRGC-Morphs

收藏
NIAID Data Ecosystem2026-03-14 收录
下载链接:
https://zenodo.org/records/4415270
下载链接
链接失效反馈
官方服务:
资源简介:
*** DISCLAIMER Distribution of FRGC-Morph has been suspended. ***   Database Description FRGC-Morphs is a dataset of morphed faces selected from the publicly available FRGC dataset (https://www.nist.gov/programs-projects/face-recognition-grand-challenge-frgc). We created the database by selecting similar looking pairs of people, and made 3 types of morphs for each pair using the following morphing tools: OpenCV (https://www.learnopencv.com/face-morph-using-opencv-cpp-python/) FaceMorpher (https://github.com/yaopang/FaceMorpher/tree/master/facemorpher) StyleGAN 2 (https://github.com/NVlabs/stylegan2)   Instructions This dataset is planned for vulnerability analysis experiments in the context of face recognition. Therefore, it is intended to be used in conjunction with the original FRGC dataset. The `copy_original_frgc.py` file included with this dataset helps with preparing the file structure so this folder may easily be used for such experiments.     $ python copy_original_frgc.py /path/to/bonafide/frgc/folder Once completed the directory's structure should be as given below: +-- frgc |   +-- morph_facemorpher |   +-- morph_opencv |   +-- morph_stylegan |   +-- raw |   +-- protocols |   +-- copy_original_frgc.py |   +-- frgc_selection.csv |   +-- README.txt   Protocols The vulnerability analysis can be conducted in two ways, using: morphed images as references (`reverse-protocol`) morphed images as probes (`scores-protocol`) The protocols for both types of experiments are provided in the `protocols` folder, each of which contains the file lists of detailing the exact images used as references (`for_models.lst`) and as probes (`for_probes.lst`) for each morphing tool. The data is *not* split into subsets, rather a single set is provided both as the development (`dev`) and evaluation set (`eval`) in order to be easily used by a toolkit such as bob (https://www.idiap.ch/software/bob).   References Any publication (eg. conference paper, journal article, technical report, book chapter, etc) resulting from the usage of FRGC_Morphs must cite the following paper: @article{Sarkar2020,     title   = {Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks},     author  = {Eklavya Sarkar and Pavel Korshunov and Laurent Colbois and S\'{e}bastien Marcel},     year    = {2020},     month   = oct,     journal = {arXiv preprint},     url     = {https://arxiv.org/abs/2012.05344} }   Any publication (eg. conference paper, journal article, technical report, book chapter, etc) resulting from the usage of FRGC and subsequently FRGC_Morphs must also cite the following paper:  P. J. Phillips, P. J. Flynn, T. Scruggs, K. W. Bowyer, Jin Chang, K. Hoffman, J. Marques, Jaesik Min, and W. Worek,  Overview of the face recognition grand challenge.  IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), Vol. 1, pp. 947–954, 2005.
创建时间:
2022-12-21
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作