Cargando…

Face morphing attacks: Investigating detection with humans and computers

BACKGROUND: In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible...

Descripción completa

Detalles Bibliográficos
Autores principales: Kramer, Robin S. S., Mireku, Michael O., Flack, Tessa R., Ritchie, Kay L.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6663958/
https://www.ncbi.nlm.nih.gov/pubmed/31359213
http://dx.doi.org/10.1186/s41235-019-0181-4
_version_ 1783439805117366272
author Kramer, Robin S. S.
Mireku, Michael O.
Flack, Tessa R.
Ritchie, Kay L.
author_facet Kramer, Robin S. S.
Mireku, Michael O.
Flack, Tessa R.
Ritchie, Kay L.
author_sort Kramer, Robin S. S.
collection PubMed
description BACKGROUND: In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible that both people sufficiently resemble the morph that they are each able to use the resulting genuine ID document. Limited research with low-quality morphs has shown that human detection rates were poor but that training methods can improve performance. Here, we investigate human and computer performance with high-quality morphs, comparable with those expected to be used by criminals. RESULTS: Over four experiments, we found that people were highly error-prone when detecting morphs and that training did not produce improvements. In a live matching task, morphs were accepted at levels suggesting they represent a significant concern for security agencies and detection was again error-prone. Finally, we found that a simple computer model outperformed our human participants. CONCLUSIONS: Taken together, these results reinforce the idea that advanced computational techniques could prove more reliable than training people when fighting these types of morphing attacks. Our findings have important implications for security authorities worldwide. ELECTRONIC SUPPLEMENTARY MATERIAL: The online version of this article (10.1186/s41235-019-0181-4) contains supplementary material, which is available to authorized users.
format Online
Article
Text
id pubmed-6663958
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-66639582019-08-12 Face morphing attacks: Investigating detection with humans and computers Kramer, Robin S. S. Mireku, Michael O. Flack, Tessa R. Ritchie, Kay L. Cogn Res Princ Implic Original Article BACKGROUND: In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible that both people sufficiently resemble the morph that they are each able to use the resulting genuine ID document. Limited research with low-quality morphs has shown that human detection rates were poor but that training methods can improve performance. Here, we investigate human and computer performance with high-quality morphs, comparable with those expected to be used by criminals. RESULTS: Over four experiments, we found that people were highly error-prone when detecting morphs and that training did not produce improvements. In a live matching task, morphs were accepted at levels suggesting they represent a significant concern for security agencies and detection was again error-prone. Finally, we found that a simple computer model outperformed our human participants. CONCLUSIONS: Taken together, these results reinforce the idea that advanced computational techniques could prove more reliable than training people when fighting these types of morphing attacks. Our findings have important implications for security authorities worldwide. ELECTRONIC SUPPLEMENTARY MATERIAL: The online version of this article (10.1186/s41235-019-0181-4) contains supplementary material, which is available to authorized users. Springer International Publishing 2019-07-29 /pmc/articles/PMC6663958/ /pubmed/31359213 http://dx.doi.org/10.1186/s41235-019-0181-4 Text en © The Author(s) 2019 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Original Article
Kramer, Robin S. S.
Mireku, Michael O.
Flack, Tessa R.
Ritchie, Kay L.
Face morphing attacks: Investigating detection with humans and computers
title Face morphing attacks: Investigating detection with humans and computers
title_full Face morphing attacks: Investigating detection with humans and computers
title_fullStr Face morphing attacks: Investigating detection with humans and computers
title_full_unstemmed Face morphing attacks: Investigating detection with humans and computers
title_short Face morphing attacks: Investigating detection with humans and computers
title_sort face morphing attacks: investigating detection with humans and computers
topic Original Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6663958/
https://www.ncbi.nlm.nih.gov/pubmed/31359213
http://dx.doi.org/10.1186/s41235-019-0181-4
work_keys_str_mv AT kramerrobinss facemorphingattacksinvestigatingdetectionwithhumansandcomputers
AT mirekumichaelo facemorphingattacksinvestigatingdetectionwithhumansandcomputers
AT flacktessar facemorphingattacksinvestigatingdetectionwithhumansandcomputers
AT ritchiekayl facemorphingattacksinvestigatingdetectionwithhumansandcomputers