Abstract

Currently, the use of biometric identification, automated or semiautomated, is a reality. For this reason, the number of attacks has increased in such systems. One of the most common biometric attacks is the presentation attack (PA) because it is relatively easy to perform. Automated border control (ABC) is a clear target for phishers. Concerning biometric attacks, morphing is one of the most threatening attacks because authentication systems are usually unable to correctly detect them. In this attack, a fake face is generated with the morphing and blending of two different subjects (genuine and phisher), and the image result is stored in the passport. These attacks can generate risky situations in cases of border crossings where an ABC system should perform identification tasks. This research work proposes a de-morphing architecture that is founded on a convolutional neural network (CNN) architecture. This technique is based on the use of two images: the potentially morphed image stored in the passport, and the snapshot of the person located in the ABC system. The goal of the de-morphing process is to unravel the chip image. If the chip image is a morphed one, the revealing process between the in vivo image and the morphed chip image will return a different facial identity to the person located in the ABC system, and the impostor will be uncovered in situ . If the chip image is a non-morphing image, the resulting image will be similar to a genuine passenger. Therefore, the information obtained is considered at the border crossing. The equal error rate (EER) achieved is very low compared to the literature values published to date. The accomplished outcomes endorse a robust method that provides high accuracy rates without taking into account the quality of images used. This key point is crucial to plausible deployment plans in areas such as ABC.

Highlights

  • T HE face recognition process is a well-known biometric identification challenge due to the high accuracy rates achieved and low intrusion to the subjects under identification

  • The capability of the attack detection is measured with the following errors: attack presentation classification error rate (APCER) and bona fide presentation classification error rate (BPCER)

  • Bona fide presentation classification error rate (BPCER) is defined as the proportion of bona fide presentation incorrectly classified as presentation attacks [84] (Equation 3)

Read more

Summary

Introduction

T HE face recognition process is a well-known biometric identification challenge due to the high accuracy rates achieved and low intrusion to the subjects under identification. To approach the facial authentication process, there are several methods. Some of these approaches have high security requirements. An example is the automatic border control (ABC) system, in which the biometric trait is used to control and assure the border crossing process. Three biometric elements (iris, fingerprint and face) could be considered in ABC systems, but as a matter of fact, only the face is widely considered at airports. The authentication process of the ABC has to determine whether or not there is a coincidental match between the facial image stored in the Electronic Machine Readable Travel Document (eMRTD) and a snapshot taken in situ (see Fig. 1)

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call