Live
Black Hat USADark ReadingBlack Hat AsiaAI BusinessDutchess to host artificial intelligence summit at Marist in Poughkeepsie - Daily FreemanGoogle News: AIAnthropic’s Catastrophic Leak May Have Just Handed China the Blueprints to Claude Al - TipRanksGoogle News: ClaudeMeta's AI push is reshaping how work gets done inside the companyBusiness InsiderOpenAI's Fidji Simo Is Taking Medical Leave Amid an Executive Shake-Up - WIREDGoogle News: OpenAIAI & Tech brief: Ireland ascendant - The Washington PostGNews AI EUPeople would rather have an Amazon warehouse in their backyard than a data centerTechCrunch AITake-Two lays off its head of AI and several team members just two months after the CEO said it was embracing Gen AI - TweakTownGoogle News: Generative AIOpenAI Buys TBPN Tech Talk Show for Enterprise Client Outreach - News and Statistics - IndexBoxGoogle News: OpenAILenovo Legion Go 2 suddenly costs $650 more as RAMageddon lays waste to gaming hardwareThe VergeResearchers Discover How to Add Psilocybin, DMT, and Other Psychedelics to TobaccoGizmodoOpenAI’s Top Executive Fidji Simo To Take Medical Leave from Company - WSJGoogle News: OpenAIBlack Hat USADark ReadingBlack Hat AsiaAI BusinessDutchess to host artificial intelligence summit at Marist in Poughkeepsie - Daily FreemanGoogle News: AIAnthropic’s Catastrophic Leak May Have Just Handed China the Blueprints to Claude Al - TipRanksGoogle News: ClaudeMeta's AI push is reshaping how work gets done inside the companyBusiness InsiderOpenAI's Fidji Simo Is Taking Medical Leave Amid an Executive Shake-Up - WIREDGoogle News: OpenAIAI & Tech brief: Ireland ascendant - The Washington PostGNews AI EUPeople would rather have an Amazon warehouse in their backyard than a data centerTechCrunch AITake-Two lays off its head of AI and several team members just two months after the CEO said it was embracing Gen AI - TweakTownGoogle News: Generative AIOpenAI Buys TBPN Tech Talk Show for Enterprise Client Outreach - News and Statistics - IndexBoxGoogle News: OpenAILenovo Legion Go 2 suddenly costs $650 more as RAMageddon lays waste to gaming hardwareThe VergeResearchers Discover How to Add Psilocybin, DMT, and Other Psychedelics to TobaccoGizmodoOpenAI’s Top Executive Fidji Simo To Take Medical Leave from Company - WSJGoogle News: OpenAI
AI NEWS HUBbyEIGENVECTOREigenvector

NIST Guidelines Can Help Organizations Detect Face Photo Morphs, Deter Identity Fraud

nist.govby Chad BoutinAugust 18, 20255 min read1 views
Source Quiz

Face morphing software, which combines photos of different people into a single image, is being used to commit identity fraud.

Face morphing software can blend photos of different people’s faces into a single synthesized image.

Credit:

NIST

Face morphing software, which can blend photos of different people’s faces into a single synthesized image, can make it easier for bad actors to bypass identity verification systems in buildings, at borders, in airports and in other settings. Morphed photos can deceive face recognition systems into falsely identifying the image as belonging to both original individuals, allowing the first individual to assume the second person’s identity and vice versa.

To address this issue, the National Institute of Standards and Technology (NIST) has released guidelines that can help organizations deploy and use modern detection methods designed to catch morph attacks before they succeed.

The new publication, Face Analysis Technology Evaluation (FATE) MORPH 4B: Considerations for Implementing Morph Detection in Operations (NISTIR 8584), is a lay-language introduction to morphs and discusses ways to deal with them. The document is intended to guide organizations toward effective deployment of tools and practices in situations where morphed photographs might appear, such as in passport application offices or at border crossings. It also covers what organizations could consider doing after a morph detector flags a potentially fake photo.

Morph detection software has improved dramatically in recent years, according to NIST’s Mei Ngan, an author of the publication.

“Some modern morph detection algorithms are good enough that they could be useful in detecting morphs in real-world operational situations,” Ngan said. “Our publication is a set of recommendations that can be tailored to a specific situation.”

Nowadays, software that creates morphed face photos is readily available. Producing a morph is possible using smartphone apps, desktop graphics packages or AI-based tools. Some of these tools are more effective than others. Some morph creation software can leave artifacts in the morphed photo, such as inconsistent skin texture and color, as well as unnatural-looking areas around the iris, nostrils, lips and eyebrows.

Since 2018, NIST has been evaluating the performance of software designed to detect morphed photos.  While the new guidelines touch briefly upon the current state of the art in detection algorithms, they focus mainly on use cases.

“Some modern morph detection algorithms are good enough that they could be useful in detecting morphs in real-world operational situations. Our publication is a set of recommendations that can be tailored to a specific situation.” —Mei Ngan, NIST computer scientist

A key distinction the guidelines draw is between two different detection situations: In one, called single-image morph attack detection, officials possess only the questionable photo, such as processing a new application in a passport office. In the other, differential morph attack detection, they have the questionable photo along with a second image that is known to be genuine, such as a photo taken of the person at a border crossing.

The guidelines discuss the capabilities and limitations of detectors in both scenarios. Single-image detection, in the best cases, can detect morphs as often as 100% of the time (at a false detection rate of 1%) if the detector has been trained on examples from the software that generated the morph.  However, accuracy can degrade to well below 40% on morphs generated with software unfamiliar to the detector. Differential detectors are more consistent in their abilities, in the best cases with accuracy ranging from 72% to 90%, across morphs created using both open-source and closed-source morphing software, but they require an additional genuine photo for comparison.

The bulk of the guidelines concern how one might configure morph attack detection software under different scenarios, and they suggest steps and procedures to help investigators when the detection software flags a suspicious photo. The best procedures for investigating a candidate morph involve a combination of human review, the use of automated tools, and implementation of a process to handle review of suspected morphs.

The most effective defense against the use of morphs in identity fraud is to prevent morphs from getting into operational systems and workflows in the first place, Ngan said. The guidelines discuss methods to achieve this during document application and issuance.

Ngan said the authors considered the likely pressures that reviewing officers might deal with, such as the volume of photos they would regularly encounter and the number of adjudicators available to inspect a candidate morph.

“What we’re trying to do is guide operational staff in determining whether there is a need for investigation and what steps that might take,” Ngan said.

In addition to developing methods for testing morph detection software, the team’s focus is to increase awareness of the existence of morphing attacks.

“It’s important to know that morphing attacks are happening, and there are ways to mitigate them,” she said. “The most effective way is to not allow users the opportunity to submit a manipulated photo for an ID credential in the first place.”

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by Eigenvector · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

Knowledge Map

Knowledge Map
TopicsEntitiesSource
NIST Guidel…nist.gov

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 156 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!