Face morphing attacks: Investigating detection with humans and computers
Abstract Background In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2019-07-01
|
Series: | Cognitive Research |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s41235-019-0181-4 |
id |
doaj-b4fb47d996b548e190c8a467d1869277 |
---|---|
record_format |
Article |
spelling |
doaj-b4fb47d996b548e190c8a467d18692772020-11-25T01:23:37ZengSpringerOpenCognitive Research2365-74642019-07-014111510.1186/s41235-019-0181-4Face morphing attacks: Investigating detection with humans and computersRobin S. S. Kramer0Michael O. Mireku1Tessa R. Flack2Kay L. Ritchie3School of Psychology, University of LincolnSchool of Psychology, University of LincolnSchool of Psychology, University of LincolnSchool of Psychology, University of LincolnAbstract Background In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible that both people sufficiently resemble the morph that they are each able to use the resulting genuine ID document. Limited research with low-quality morphs has shown that human detection rates were poor but that training methods can improve performance. Here, we investigate human and computer performance with high-quality morphs, comparable with those expected to be used by criminals. Results Over four experiments, we found that people were highly error-prone when detecting morphs and that training did not produce improvements. In a live matching task, morphs were accepted at levels suggesting they represent a significant concern for security agencies and detection was again error-prone. Finally, we found that a simple computer model outperformed our human participants. Conclusions Taken together, these results reinforce the idea that advanced computational techniques could prove more reliable than training people when fighting these types of morphing attacks. Our findings have important implications for security authorities worldwide.http://link.springer.com/article/10.1186/s41235-019-0181-4Morphing attackFace morphFraudFace matchingMorph detection |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Robin S. S. Kramer Michael O. Mireku Tessa R. Flack Kay L. Ritchie |
spellingShingle |
Robin S. S. Kramer Michael O. Mireku Tessa R. Flack Kay L. Ritchie Face morphing attacks: Investigating detection with humans and computers Cognitive Research Morphing attack Face morph Fraud Face matching Morph detection |
author_facet |
Robin S. S. Kramer Michael O. Mireku Tessa R. Flack Kay L. Ritchie |
author_sort |
Robin S. S. Kramer |
title |
Face morphing attacks: Investigating detection with humans and computers |
title_short |
Face morphing attacks: Investigating detection with humans and computers |
title_full |
Face morphing attacks: Investigating detection with humans and computers |
title_fullStr |
Face morphing attacks: Investigating detection with humans and computers |
title_full_unstemmed |
Face morphing attacks: Investigating detection with humans and computers |
title_sort |
face morphing attacks: investigating detection with humans and computers |
publisher |
SpringerOpen |
series |
Cognitive Research |
issn |
2365-7464 |
publishDate |
2019-07-01 |
description |
Abstract Background In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible that both people sufficiently resemble the morph that they are each able to use the resulting genuine ID document. Limited research with low-quality morphs has shown that human detection rates were poor but that training methods can improve performance. Here, we investigate human and computer performance with high-quality morphs, comparable with those expected to be used by criminals. Results Over four experiments, we found that people were highly error-prone when detecting morphs and that training did not produce improvements. In a live matching task, morphs were accepted at levels suggesting they represent a significant concern for security agencies and detection was again error-prone. Finally, we found that a simple computer model outperformed our human participants. Conclusions Taken together, these results reinforce the idea that advanced computational techniques could prove more reliable than training people when fighting these types of morphing attacks. Our findings have important implications for security authorities worldwide. |
topic |
Morphing attack Face morph Fraud Face matching Morph detection |
url |
http://link.springer.com/article/10.1186/s41235-019-0181-4 |
work_keys_str_mv |
AT robinsskramer facemorphingattacksinvestigatingdetectionwithhumansandcomputers AT michaelomireku facemorphingattacksinvestigatingdetectionwithhumansandcomputers AT tessarflack facemorphingattacksinvestigatingdetectionwithhumansandcomputers AT kaylritchie facemorphingattacksinvestigatingdetectionwithhumansandcomputers |
_version_ |
1725121088478773248 |