Border Control Morphing Attack Detection with a Convolutional Neural Network De-Morphing Approach

38Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Currently, the use of biometric identification, automated or semiautomated, is a reality. For this reason, the number of attacks has increased in such systems. One of the most common biometric attacks is the presentation attack (PA) because it is relatively easy to perform. Automated border control (ABC) is a clear target for phishers. Concerning biometric attacks, morphing is one of the most threatening attacks because authentication systems are usually unable to correctly detect them. In this attack, a fake face is generated with the morphing and blending of two different subjects (genuine and phisher), and the image result is stored in the passport. These attacks can generate risky situations in cases of border crossings where an ABC system should perform identification tasks. This research work proposes a de-morphing architecture that is founded on a convolutional neural network (CNN) architecture. This technique is based on the use of two images: the potentially morphed image stored in the passport, and the snapshot of the person located in the ABC system. The goal of the de-morphing process is to unravel the chip image. If the chip image is a morphed one, the revealing process between the in vivo image and the morphed chip image will return a different facial identity to the person located in the ABC system, and the impostor will be uncovered in situ. If the chip image is a non-morphing image, the resulting image will be similar to a genuine passenger. Therefore, the information obtained is considered at the border crossing. The equal error rate (EER) achieved is very low compared to the literature values published to date. The accomplished outcomes endorse a robust method that provides high accuracy rates without taking into account the quality of images used. This key point is crucial to plausible deployment plans in areas such as ABC.

Cite

CITATION STYLE

APA

Ortega-Delcampo, D., Conde, C., Palacios-Alonso, D., & Cabello, E. (2020). Border Control Morphing Attack Detection with a Convolutional Neural Network De-Morphing Approach. IEEE Access, 8, 92301–92313. https://doi.org/10.1109/ACCESS.2020.2994112

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free