Analyzing Human Observer Ability in Morphing Attack Detection—Where Do We Stand?

Sankini Rancha Godage;Frøy Løvåsdal;Sushma Venkatesh;Kiran Raja;Raghavendra Ramachandra;Christoph Busch
{"title":"Analyzing Human Observer Ability in Morphing Attack Detection—Where Do We Stand?","authors":"Sankini Rancha Godage;Frøy Løvåsdal;Sushma Venkatesh;Kiran Raja;Raghavendra Ramachandra;Christoph Busch","doi":"10.1109/TTS.2022.3231450","DOIUrl":null,"url":null,"abstract":"Morphing attacks are based on the technique of digitally fusing two (or more) face images into one, with the final visage resembling the contributing faces. Morphed images not only pose a challenge to Face-Recognition Systems (FRS) but also challenge experienced human observers due to high quality, postprocessing eliminating any visible artifacts, and further the printing and scanning process. Few studies have concentrated on examining how human observers can recognize morphing attacks, even as several publications have examined the susceptibility of automated FRS to morphing attacks and offered morphing attack detection (MAD) approaches. MAD approaches base their decisions either on a single image with no reference to compare against (Single-Image MAD (S-MAD)) or using a reference image (Differential MAD (D-MAD)). One prevalent misconception is that an examiner’s or observer’s capacity for facial morph detection depends on their subject expertise, experience, and familiarity with the issue. No works have reported the specific results of observers who regularly verify identity (ID) documents for their jobs. As human observers are involved in checking ID documents having facial images, a lapse in their competence can result in significant societal challenges. To assess the observers’ proficiency, this research first builds a new benchmark database of realistic morphing attacks from 48 different subjects, resulting in 400 morphed images. Unlike the previous works, we also capture images from Automated Border Control (ABC) gates to mimic realistic border-crossing scenarios in the D-MAD setting with 400 probe images, to study the ability of human observers to detect morphed images. A new dataset of 180 morphing images is also produced to research human capacity in the S-MAD environment. In addition to creating a new evaluation platform to conduct S-MAD and D-MAD analysis, the study employs 469 observers for D-MAD and 410 observers for S-MAD who are primarily governmental employees from more than 40 countries, along with 103 control group members who are not examiners. The analysis offers intriguing insights and highlights the lack of expertise and failure to recognize a sizable number of morphing attacks by experienced observers. Human observers tend to detect morphed images to a lower accuracy as compared to the four automated MAD algorithms evaluated in this work. The results of this study are intended to aid in the development of training programs that will prevent security failures while determining whether an image is bona fide or altered.","PeriodicalId":73324,"journal":{"name":"IEEE transactions on technology and society","volume":"4 2","pages":"125-145"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8566059/10153436/09997091.pdf","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE transactions on technology and society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/9997091/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Morphing attacks are based on the technique of digitally fusing two (or more) face images into one, with the final visage resembling the contributing faces. Morphed images not only pose a challenge to Face-Recognition Systems (FRS) but also challenge experienced human observers due to high quality, postprocessing eliminating any visible artifacts, and further the printing and scanning process. Few studies have concentrated on examining how human observers can recognize morphing attacks, even as several publications have examined the susceptibility of automated FRS to morphing attacks and offered morphing attack detection (MAD) approaches. MAD approaches base their decisions either on a single image with no reference to compare against (Single-Image MAD (S-MAD)) or using a reference image (Differential MAD (D-MAD)). One prevalent misconception is that an examiner’s or observer’s capacity for facial morph detection depends on their subject expertise, experience, and familiarity with the issue. No works have reported the specific results of observers who regularly verify identity (ID) documents for their jobs. As human observers are involved in checking ID documents having facial images, a lapse in their competence can result in significant societal challenges. To assess the observers’ proficiency, this research first builds a new benchmark database of realistic morphing attacks from 48 different subjects, resulting in 400 morphed images. Unlike the previous works, we also capture images from Automated Border Control (ABC) gates to mimic realistic border-crossing scenarios in the D-MAD setting with 400 probe images, to study the ability of human observers to detect morphed images. A new dataset of 180 morphing images is also produced to research human capacity in the S-MAD environment. In addition to creating a new evaluation platform to conduct S-MAD and D-MAD analysis, the study employs 469 observers for D-MAD and 410 observers for S-MAD who are primarily governmental employees from more than 40 countries, along with 103 control group members who are not examiners. The analysis offers intriguing insights and highlights the lack of expertise and failure to recognize a sizable number of morphing attacks by experienced observers. Human observers tend to detect morphed images to a lower accuracy as compared to the four automated MAD algorithms evaluated in this work. The results of this study are intended to aid in the development of training programs that will prevent security failures while determining whether an image is bona fide or altered.
变形攻击检测中的人类观察能力分析——我们的立场是什么?
变形攻击是基于将两个(或多个)人脸图像数字融合为一个图像的技术,最终人脸与贡献人脸相似。变形图像不仅对人脸识别系统(FRS)构成了挑战,而且由于高质量、后处理消除了任何可见伪影以及进一步的打印和扫描过程,也对经验丰富的人类观察者构成了挑战。很少有研究集中于研究人类观察者如何识别变形攻击,尽管一些出版物已经研究了自动FRS对变形攻击的易感性,并提供了变形攻击检测(MAD)方法。MAD方法基于没有可比较参考的单个图像(单个图像MAD(S-MAD))或使用参考图像(差分MAD(D-MAD)。一个普遍的误解是,考官或观察者的面部变形检测能力取决于他们的专业知识、经验和对问题的熟悉程度。没有任何工作报告定期核实其工作身份证件的观察员的具体结果。由于人类观察员参与检查有面部图像的身份证件,他们的能力下降可能会带来重大的社会挑战。为了评估观察者的熟练程度,这项研究首先建立了一个新的基准数据库,记录了48个不同受试者的真实变形攻击,产生了400张变形图像。与之前的工作不同,我们还从自动边境控制(ABC)门捕捉图像,以模拟D-MAD环境中的真实越境场景,并使用400个探针图像,研究人类观察者检测变形图像的能力。还生成了一个由180张变形图像组成的新数据集,以研究人类在S-MAD环境中的能力。除了创建一个新的评估平台来进行S-MAD和D-MAD分析外,该研究还雇佣了469名D-MAD观察员和410名S-MAD观察员,他们主要是来自40多个国家的政府雇员,以及103名非审查员的对照组成员。该分析提供了有趣的见解,并强调了经验丰富的观察者缺乏专业知识,未能识别出大量的变形攻击。与本工作中评估的四种自动MAD算法相比,人类观察者倾向于以较低的精度检测变形图像。这项研究的结果旨在帮助制定培训计划,在确定图像是真实的还是被篡改的同时,防止安全故障。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信