Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans

A morphed face image injected into an identity document destroys the unique link between a person and a document meaning that such a multi-identity document may be successfully used by several persons for face-recognition-based identity verification. A morphed face in an electronic machine readable travel document may allow a wanted criminal to illicitly cross a border. This paper describes an improvement of our ongoing web-based experiment for a border control simulation in which human examiners should first detect high-resolution morphed face images and second match potentially morphed document images against "live" faces of travelers. The error rates of humans in both parts of the experiment are compared with those of automated morphing detectors and face recognition systems. This experiment improves understanding the capabilities and limits of humans in withstanding the face morphing attack as well as the factors influencing their performance.

[1]  Alice J. O'Toole,et al.  Comparison of human and computer performance across face recognition experiments , 2014, Image and Vision Computing.

[2]  BuschChristoph,et al.  Presentation Attack Detection Methods for Face Recognition Systems , 2017 .

[3]  Jana Dittmann,et al.  Automatic Generation and Detection of Visually Faultless Facial Morphs , 2017, VISIGRAPP.

[4]  Davide Maltoni,et al.  The magic passport , 2014, IEEE International Joint Conference on Biometrics.

[5]  A. Burton,et al.  Passport Officers’ Errors in Face Matching , 2014, PloS one.

[6]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[7]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[8]  Sébastien Marcel,et al.  Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting , 2017, 2017 International Conference of the Biometrics Special Interest Group (BIOSIG).

[9]  Jana Dittmann,et al.  Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control , 2019, VISIGRAPP.

[10]  V. Bruce,et al.  Recognition of unfamiliar faces , 2000, Trends in Cognitive Sciences.

[11]  David J Robertson,et al.  Detecting morphed passport photos: a training and individual differences approach , 2018, Cognitive research: principles and implications.

[12]  Robin S. S. Kramer,et al.  Face morphing attacks: Investigating detection with humans and computers , 2019, Cognitive Research: Principles and Implications.

[13]  Kiran B. Raja,et al.  On the vulnerability of face recognition systems towards morphed face attacks , 2017, 2017 5th International Workshop on Biometrics and Forensics (IWBF).

[14]  Davis E. King,et al.  Dlib-ml: A Machine Learning Toolkit , 2009, J. Mach. Learn. Res..

[15]  Davide Maltoni,et al.  On the Effects of Image Alterations on Face Recognition Accuracy , 2016, Face Recognition Across the Imaging Spectrum.

[16]  Jana Dittmann,et al.  Extended StirTrace benchmarking of biometric and forensic qualities of morphed face images , 2018, IET Biom..

[17]  PhillipsP. Jonathon,et al.  Review ArticleEditor's Choice Article , 2014 .

[18]  Anna Hilsmann,et al.  Detection of Face Morphing Attacks by Deep Learning , 2017, IWDW.

[19]  Danna Zhou,et al.  d. , 1934, Microbial pathogenesis.

[20]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[21]  Anna Hilsmann,et al.  Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks , 2018, ArXiv.

[22]  Robin S S Kramer,et al.  Fraudulent ID using face morphs: Experiments on human and automatic recognition , 2017, PloS one.

[23]  Jana Dittmann,et al.  Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing , 2017, IH&MMSec.