Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans

9Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

A morphed face image injected into an identity document destroys the unique link between a person and a document meaning that such a multi-identity document may be successfully used by several persons for face-recognition-based identity verification. A morphed face in an electronic machine readable travel document may allow a wanted criminal to illicitly cross a border. This paper describes an improvement of our ongoing web-based experiment for a border control simulation in which human examiners should first detect high-resolution morphed face images and second match potentially morphed document images against "live" faces of travelers. The error rates of humans in both parts of the experiment are compared with those of automated morphing detectors and face recognition systems. This experiment improves understanding the capabilities and limits of humans in withstanding the face morphing attack as well as the factors influencing their performance.

Cite

CITATION STYLE

APA

Makrushin, A., Siegel, D., & DIttmann, J. (2020). Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans. In IH and MMSec 2020 - Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security (pp. 91–96). Association for Computing Machinery, Inc. https://doi.org/10.1145/3369412.3395073

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free