defense 2026

R-FLoRA: Residual-Statistic-Gated Low-Rank Adaptation for Single-Image Face Morphing Attack Detection

Raghavendra Ramachandra

0 citations

α

Published on arXiv

2604.17321

Input Manipulation Attack

OWASP ML Top 10 — ML01

Key Finding

Consistently surpasses nine recent state-of-the-art S-MAD algorithms in detection accuracy and cross-domain generalization with real-time efficiency using frozen backbone and minimal trainable parameters

R-FLoRA

Novel technique introduced


Face morphing attacks pose a substantial risk to the reliability of face recognition systems used in passport issuance, border control, and digital identity verification. Detecting morphing attacks from a single facial image remains challenging owing to the lack of a trusted reference and the diversity of attack generation methods. This paper presents a new Single-Image Face Morphing Attack Detection (S-MAD) framework that integrates high-frequency Laplacian residual statistics with representations from a frozen, foundation-scale vision transformer. The approach employs residual-statistic-gated low-rank adapters (R-FLoRA) and feature-wise residual fusion (Res-FiLM) to enhance sensitivity to local morphing artefacts while preserving the semantic context of the backbone. A novel residual-contrastive alignment loss further regularises the fused token space, improving discrimination under unseen morphing conditions. Comprehensive experiments on four ICAO-compliant datasets, encompassing seven morph generation techniques, demonstrate that the proposed method consistently surpasses nine recent state-of-the-art S-MAD algorithms in detection accuracy and cross-domain (or dataset) generalisation. With a frozen backbone and minimal trainable parameters, the model achieves real-time efficiency and interpretability, making it suitable for real-life scenarios in biometric verification systems.


Key Contributions

  • Residual-statistic-gated low-rank adapters (R-FLoRA) that integrate high-frequency Laplacian residual statistics with frozen vision transformer representations
  • Feature-wise residual fusion (Res-FiLM) and residual-contrastive alignment loss for enhanced morphing artifact detection
  • Cross-dataset generalization across four ICAO-compliant datasets with seven morph generation techniques, outperforming nine state-of-the-art S-MAD methods

🛡️ Threat Analysis

Input Manipulation Attack

Face morphing attacks are adversarial manipulations of input images designed to evade face recognition systems at inference time. The paper proposes a defense (detection method) against these input manipulation attacks on biometric verification systems.


Details

Domains
vision
Model Types
transformercnn
Threat Tags
inference_timedigital
Datasets
ICAO-compliant datasets (4 datasets mentioned, specific names not provided in excerpt)
Applications
face recognitionbiometric verificationborder controlpassport issuance