The International Arab Journal of Information Technology (IAJIT)


Dynamic Healing Process Analysis: Image Morphing with Warping Technique for Nose and Esophagus Studies

In this study, image morphing technology is harnessed to investigate the dynamic processes of healing in both the nose and esophagus. The researchers employ a computer-assisted morphing approach to dynamically analyze mucosal processes during the healing study. The focal point of the proposed image morphing method is a specified warping technique that transforms the first image into the second, and vice versa. The metamorphosis unfolds with the first image initially completely deformed toward the second, gradually fading in, while the current image simultaneously becomes progressively distorted and fades out. This results in an initial series of photographs closely resembling the original. The pivotal middle image is crafted through the averaging of the first source image altered halfway toward the second and the second source picture deformed halfway away from the first. The subsequent images in the series resemble the second source picture. The significance of the center picture is underscored, as its visual appeal ensures the overall aesthetic quality of the entire animation sequence. To facilitate seamless transitions between frames, intermediate frames are generated. The proposed technique is substantiated through the use of realistic datasets for testing and validation, demonstrating its superior performance compared to state-of- the-art studies in the field. This comprehensive approach to image morphing not only advances our understanding of healing dynamics in the nose and esophagus but also presents a novel and effective methodology with broad applicability, surpassing the capabilities of current leading-edge studies. The proposed approach showed best performance against state-of-the works.

[1] Alzubaidi L., Zhang J., Humaidi A., Al-Dujaili A., Duan Y., “Review of Deep Learning: Concepts, CNN Architectures, Challenges, Applications, Future Directions,” Journal of Big Data, vol. 8, pp. 1-74, 2021. 021-00444-8

[2] Andrew Onesimu J. and Karthikeyan J., “An Efficient Privacy-Preserving Deep Learning Scheme for Medical Image Analysis,” Journal of Information Technology Management, vol. 12, pp. 50-67, 2020. DOI: 10.22059/jitm.2020.79191

[3] Busch C., Handbook of Biometric Anti-Spoofing, Springer, 2023. 19-5288-3_21 378 The International Arab Journal of Information Technology, Vol. 21, No. 3, May 2024

[4] Cárabe L. and Cermeño E., “Stegano-Morphing: Concealing Attacks on Face Identification Algorithms,” IEEE Access, vol. 9, pp. 100851- 100867, 2021.

[5] Chaudhary B., Aghdaie P., Soleymani S., Dawson J., and Nasrabadi N., “Differential Morph Face Detection Using Discriminative Wavelet Sub- Bands,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, Tennessee, pp. 1425- 1434, 2021.

[6] Ferrara M., Franco A., and Maltoni D., “Face Morphing Detection in the Presence of Printing/Scanning and Heterogeneous Image Sources,” IET Biometrics, vol. 10, no. 3, pp. 290- 303, 2021.

[7] Fish N., Zhang R., Perry L., Cohen‐Or D., Shechtman E., and Barnes C., “Image Morphing with Perceptual Constraints and STN Alignment,” Computer Graphics Forum, vol. 39, no. 6, pp. 303-313, 2020.

[8] Fu B. and Damer N., “Face Morphing Attacks and Face Image Quality: The Effect of Morphing and the Unsupervised Attack Detection by Quality,” arXiv Preprint, vol. arXiv:2208.05864v1, pp. 1- 20, 2022.

[9] Gomez-Barrero M., Rathgeb C., Scherhag U., and Busch C., “Is your Biometric System Robust to Morphing Attacks?,” in Proceedings of the 5th IEEE International Workshop on Biometrics and Forensics, Coventry, pp. 1-6, 2017. DOI:10.1109/IWBF.2017.7935079

[10] Hamza M., Tehsin S., Karamti H., and Alghamdi N., “Generation and Detection of Face Morphing Attacks,” IEEE Access, vol. 10, pp. 72557-72576, 2022. DOI:10.1109/ACCESS.2022.3188668

[11] Huber M., Boutros F., Luu A., Raja K., Ramachandra R., and Damer N., “SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data,” arXiv Preprint, vol. arXiv:2208.07337v1, pp. 1-10, 2022.

[12] Ivanovska M., Kronovšek A., Peer P., Štruc V., and Batagelj B., “Face Morphing Attack Detection Using Privacy-Aware Training Data,” arXiv Preprint, vol. arXiv:2207.00899v1, pp. 1-4, 2022.

[13] Ji D., Kwon J., McFarland M., and Savarese S., “Deep View Morphing,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Hawai, pp. 2155-2163, 2017. pers/Ji_Deep_View_Morphing_CVPR_2017_paper.p df

[14] Jia C., Liu Y., and Chen Y., “Face Morphing Attack Detection Based on High-Frequency Features and Progressive Enhancement Learning,” Frontiers in Neurorobotics, vol. 17, pp. 1-11, 2023.

[15] Jia C., Long M., and Liu Y., “Enhanced Face Morphing Attack Detection Using Error-Level Analysis and Efficient Selective Kernel Network,” Computers and Security, vol. 137, pp. 103640, 2024.

[16] Kelly U., Veldhuis R., and Spreeuwers L., “A Face Recognition System’s Worst Morph Nightmare, Theoretically,” arXiv Preprint, vol. arXiv:2111.15416v1, pp. 1-8, 2021. file:///C:/Users/user/Downloads/A_Face_Recogni tion_Systems_Worst_Morph_Nightmare_.pdf

[17] Korshunov P. and Marcel S., “Vulnerability of Face Recognition to Deep Morphing,” arXiv Preprint, vol. arXiv:1910.01933v1, pp. 1-5, 2019.

[18] Li S. and Jain A., Handbook of Face Recognition, Springer, 2011. 85729-932-1

[19] Li Y., Chang C., Su G., Yang K., Aslam M., “Coverless Image Steganography Using Morphed Face Recognition Based on Convolutional Neural Network,” EURASIP Journal on Wireless Communications and Networking, vol. 2022, pp. 1-21, 2022. 02107-5

[20] Long M., Zhao X., Zhang L., and Peng F., “Detection of Face Morphing Attacks Based on Patch-Level Features and Lightweight Networks,” Security and Communication Networks, vol. 2022, pp. 1-12, 2022.

[21] Lu Y., Xu K., Sun T., Qi K., and Yao L., “Face Morphing Detection with Convolutional Neural Network Based on Multi-Features,” in Proceedings of the International Conference on Aviation Safety and Information Technology, Weihai, pp. 611-616, 2020.

[22] Marcel S., Nixon M., Fierrez J., and Evans N., Handbook of Biometric Anti-Spoofing: Presentation Attack Detection, Springer, 2019. 319-92627-8#book-header

[23] Medvedev I., Shadmand F., and Gonçalves N., “MorDeephy: Face Morphing Detection Via Fused Classification,” arXiv Preprint, vol. arXiv:2208.03110v1, pp. 1-11, 2022.

[24] Morphings, Dynamic Healing Process Analysis: Image Morphing with Warping Technique for Nose ... 379 g.htm, Last Visited, 2023.

[25] Nickabadi A., Fard M., Farid N., and Mohammadbagheri N., “A Comprehensive Survey on Semantic Facial Attribute Editing Using Generative Adversarial Networks,” arXiv Preprint, vol. arXiv:2205.10587v1, pp. 1-45, 2022.

[26] Penska K., Folio L., and Bunger R., “Medical Applications of Digital Image Morphing,” Journal of Digital Imaging, vol. 20, no. 3, pp. 279- 283, 2007. DOI:10.1007/s10278-006-1050-5

[27] Prince T., Fragoso Y., and Gaye O., “Applications of Image Morphing Techniques to Analyze Changes in our Environment,” Open Access Library Journal, vol. 3, no. 9, pp. 1-13, 2016. DOI:10.4236/oalib.1103023

[28] Ramachandra R. and Busch C., “Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey,” ACM Computing Surveys, vol. 50, no. 1, pp.1-37, 2017.

[29] Ramachandra R., Raja K., and Busch C., “Algorithmic Fairness in Face Morphing Attack Detection,” in Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, Waikoloa, pp. 410-418, 2022. DOI:10.1109/WACVW54805.2022.00047

[30] Rathgeb C., Tolosana R., Vera-Rodriguez R., and Busch C., Handbook of Digital Face Manipulation and Detection, from DeepFakes to Morphing Attacks, Springer, 2022. 030-87664-7

[31] Sarkar E., Korshunov P., Colbois L., and Marcel S., “Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks,” arXiv Preprint, vol. arXiv:2012.05344v1, pp. 1-5, 2020.

[32] Scherhag U., Kunze J., Rathgeb C., and Busch C., “Face Morph Detection for Unknown Morphing Algorithms and Image Sources: A Multi-Scale Block Local Binary Pattern Fusion Approach,” IET Biometrics, vol. 9, no. 6, pp. 278-289, 2020.

[33] Scherhag U., Rathgeb C., and Busch C., Handbook of Digital Face Manipulation and Detection, Springer, 2022.

[34] Scherhag U., Rathgeb C., Merkle J., Breithaupt R., and Busch C., “Face Recognition Systems under Morphing Attacks: A Survey,” IEEE Access, vol. 7, pp. 23012-23026, 2019. DOI:10.1109/ACCESS.2019.2899367

[35] Shirore D. and Baji S., “Facial Image Morphing for Animation Using Mesh Warping Method,” International Journal of Computer Applications, vol. 109, no. 6, pp. 18-22, 2015. r6/pxc3900806.pdf

[36] Shorten C. and Khoshgoftaar T., “A Survey on Image Data Augmentation for Deep Learning,” Journal of Big Data, vol. 6, pp. 1-48, 2019.

[37] Spreeuwers L., Schils M., Veldhuis R., and Kelly U., Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks, Springer, 2022. 030-87664-7_16

[38] Taha M., “Improved Mesh_Based Image Morphing,” Journal of University of Babylon for Pure and Applied Sciences, vol. 25, no. 5, pp. 1608-1617, 2017. file:///C:/Users/user/Downloads/imagemorphing.pdf

[39] Tolosana R., Vera-Rodriguez R., Fierrez J., Morales A., and Ortega-Garcia J., “DeepFakes and beyond: A Survey of Face Manipulation and Fake Detection,” Information Fusion, vol. 64, pp. 131-148, 2020.

[40] Vatamanu O., Frandes M., Ionescu M., and Apostol S., “Content-Based Image Retrieval Using Local Binary Pattern, Intensity Histogram and Color Coherence Vector,” in Proceedings of the IEEE e-Health and Bioengineering Conference, Lasi, pp. 1-6, 2013. DOI:10.1109/EHB.2013.6707396

[41] Wang M. and Deng W., “Deep Face Recognition: A Survey,” Neurocomputing, vol. 429, pp. 215- 244, 2021.

[42] Weng Y., Wang L., Li X., Chai M., and Zhou K., “Hair Interpolation for Portrait Morphing,” Computer Graphics Forum, vol. 32, no. 7, pp. 79- 84, 2013.

[43] Wolberg G., “Image Morphing: A Survey,” The Visual Computer, vol. 14, no. 8-9, pp. 360-372, 1998. DOI:10.1007/s003710050148

[44] Yılmaz A. and Nabiyev V., “A Novel Age Classification Method Using Morph-Based Models,” The International Arab Journal of Information Technology, vol. 16, no. 4, pp. 677- 685, 2019.,% 20No.%204/11981.pdf

[45] You J. and Korhonen J., “Attention Integrated Hierarchical Networks for No-Reference Image Quality Assessment,” Journal of Visual Communication and Image Representation, vol. 82, pp. 103399, 2022.

[46] Zhang H., Venkatesh S., Ramachandra R., Raja K., Damer N., and Busch C., “MIPGAN- Generating Strong and High-Quality Morphing Attacks Using Identity Prior Driven GAN,” IEEE 380 The International Arab Journal of Information Technology, Vol. 21, No. 3, May 2024 Transactions on Biometrics, Behavior, and Identity Science, vol. 3, no. 3, pp. 365-383, 2021. DOI:10.1109/TBIOM.2021.3072349

[47] Zhang N., Liu X., Li X., and Qi G., “MorphGANFormer: Transformer-based Face Morphing and De-Morphing” arXiv Preprint, vol. arXiv:2302.09404v1, pp. 1-13, 2023.