Biometric System for Mobile Validation of ID And Travel Documents

Current trends in security of ID and travel documents require portable and efficient validation applications that rely on biometric recognition. Such tools can allow any authority and citizen to validate documents and authenticate citizens with no need of expensive and sometimes unavailable proprietary devices. In this work, we present a novel, compact and efficient approach of validating ID and travel documents for offline mobile applications. The approach employs the in-house biometric template that is extracted from the original portrait photo (either full frontal or token frontal), and then stored on the ID document with use of a machine readable code (MRC). The ID document can then be validated with a developed application on a mobile device with digital camera. The similarity score is estimated with use of an artificial neural network (ANN). Results show that we achieve validation accuracy up to 99.5% with corresponding false match rate = 0.0047 and false non-match rate = 0.00034.

[1]  Patrick J. Grother,et al.  Face Recognition Vendor Test (FRVT) Performance of Face Identification Algorithms NIST IR 8009 , 2014 .

[2]  Zulaiha Ali Othman,et al.  Face recognition technique based on active appearance model , 2013 .

[3]  Anil K. Jain,et al.  DocFace+: ID Document to Selfie Matching , 2018, IEEE Transactions on Biometrics, Behavior, and Identity Science.

[4]  Christophe Champod,et al.  A dedicated framework for weak biometrics in forensic science for investigation and intelligence purposes: The case of facial information , 2016 .

[5]  Tal Hassner,et al.  Effective face frontalization in unconstrained images , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[6]  Bruno Patrão,et al.  Graphic Code: A New Machine Readable Approach , 2018, 2018 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR).

[7]  J. van Leeuwen,et al.  Neural Networks: Tricks of the Trade , 2002, Lecture Notes in Computer Science.

[8]  Timothy F. Cootes,et al.  Active Appearance Models , 1998, ECCV.

[9]  Sukhwinder Singh,et al.  A comparative study on face spoofing attacks , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[10]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[11]  Dipankar Dasgupta,et al.  Face Authenticity: An Overview of Face Manipulation Generation, Detection and Recognition , 2019, SSRN Electronic Journal.

[12]  Jian Sun,et al.  Face Alignment at 3000 FPS via Regressing Local Binary Features , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[13]  C. Pintavirooj,et al.  Face recognition based on facial landmark detection , 2017, 2017 10th Biomedical Engineering International Conference (BMEiCON).

[14]  Adel M. Alimi,et al.  Face recognition based on geometric features using Support Vector Machines , 2014, 2014 6th International Conference of Soft Computing and Pattern Recognition (SoCPaR).

[15]  Oscar Déniz-Suárez,et al.  Face recognition using Histograms of Oriented Gradients , 2011, Pattern Recognit. Lett..

[16]  Anastasios Tefas,et al.  Face Verification and Recognition for Digital Forensics and Information Security , 2019, 2019 7th International Symposium on Digital Forensics and Security (ISDFS).

[17]  Bence Adam,et al.  Enhanced optical security by using information carrier digital screening , 2004, IS&T/SPIE Electronic Imaging.