Face morphing attacks: Investigating detection with humans and computers

Abstract Background In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be...

Full description

Bibliographic Details
Main Authors: Robin S. S. Kramer, Michael O. Mireku, Tessa R. Flack, Kay L. Ritchie
Format: Article
Language:English
Published: SpringerOpen 2019-07-01
Series:Cognitive Research
Subjects:
Online Access:http://link.springer.com/article/10.1186/s41235-019-0181-4
id doaj-b4fb47d996b548e190c8a467d1869277
record_format Article
spelling doaj-b4fb47d996b548e190c8a467d18692772020-11-25T01:23:37ZengSpringerOpenCognitive Research2365-74642019-07-014111510.1186/s41235-019-0181-4Face morphing attacks: Investigating detection with humans and computersRobin S. S. Kramer0Michael O. Mireku1Tessa R. Flack2Kay L. Ritchie3School of Psychology, University of LincolnSchool of Psychology, University of LincolnSchool of Psychology, University of LincolnSchool of Psychology, University of LincolnAbstract Background In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible that both people sufficiently resemble the morph that they are each able to use the resulting genuine ID document. Limited research with low-quality morphs has shown that human detection rates were poor but that training methods can improve performance. Here, we investigate human and computer performance with high-quality morphs, comparable with those expected to be used by criminals. Results Over four experiments, we found that people were highly error-prone when detecting morphs and that training did not produce improvements. In a live matching task, morphs were accepted at levels suggesting they represent a significant concern for security agencies and detection was again error-prone. Finally, we found that a simple computer model outperformed our human participants. Conclusions Taken together, these results reinforce the idea that advanced computational techniques could prove more reliable than training people when fighting these types of morphing attacks. Our findings have important implications for security authorities worldwide.http://link.springer.com/article/10.1186/s41235-019-0181-4Morphing attackFace morphFraudFace matchingMorph detection
collection DOAJ
language English
format Article
sources DOAJ
author Robin S. S. Kramer
Michael O. Mireku
Tessa R. Flack
Kay L. Ritchie
spellingShingle Robin S. S. Kramer
Michael O. Mireku
Tessa R. Flack
Kay L. Ritchie
Face morphing attacks: Investigating detection with humans and computers
Cognitive Research
Morphing attack
Face morph
Fraud
Face matching
Morph detection
author_facet Robin S. S. Kramer
Michael O. Mireku
Tessa R. Flack
Kay L. Ritchie
author_sort Robin S. S. Kramer
title Face morphing attacks: Investigating detection with humans and computers
title_short Face morphing attacks: Investigating detection with humans and computers
title_full Face morphing attacks: Investigating detection with humans and computers
title_fullStr Face morphing attacks: Investigating detection with humans and computers
title_full_unstemmed Face morphing attacks: Investigating detection with humans and computers
title_sort face morphing attacks: investigating detection with humans and computers
publisher SpringerOpen
series Cognitive Research
issn 2365-7464
publishDate 2019-07-01
description Abstract Background In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible that both people sufficiently resemble the morph that they are each able to use the resulting genuine ID document. Limited research with low-quality morphs has shown that human detection rates were poor but that training methods can improve performance. Here, we investigate human and computer performance with high-quality morphs, comparable with those expected to be used by criminals. Results Over four experiments, we found that people were highly error-prone when detecting morphs and that training did not produce improvements. In a live matching task, morphs were accepted at levels suggesting they represent a significant concern for security agencies and detection was again error-prone. Finally, we found that a simple computer model outperformed our human participants. Conclusions Taken together, these results reinforce the idea that advanced computational techniques could prove more reliable than training people when fighting these types of morphing attacks. Our findings have important implications for security authorities worldwide.
topic Morphing attack
Face morph
Fraud
Face matching
Morph detection
url http://link.springer.com/article/10.1186/s41235-019-0181-4
work_keys_str_mv AT robinsskramer facemorphingattacksinvestigatingdetectionwithhumansandcomputers
AT michaelomireku facemorphingattacksinvestigatingdetectionwithhumansandcomputers
AT tessarflack facemorphingattacksinvestigatingdetectionwithhumansandcomputers
AT kaylritchie facemorphingattacksinvestigatingdetectionwithhumansandcomputers
_version_ 1725121088478773248