FB pixel

New NIST guidelines look at face morph attacks and how to stop them

Guide to morph detection offers procedural advice for real-world scenarios
New NIST guidelines look at face morph attacks and how to stop them
 

The National Institute of Standards and Technology (NIST) has released guidelines that aim to help in the detection of face morphing attacks and biometric identity fraud.

A post from NIST introduces Face Analysis Technology Evaluation (FATE) MORPH 4B: Considerations for Implementing Morph Detection in Operations (NISTIR 8584), described as “a lay-language introduction” to morphs and how to handle them.

In brief, face morphing software that synthesizes photos of different faces into a single image can make it easier to bypass identity verification systems. “Morphed photos can deceive face recognition systems into falsely identifying the image as belonging to both original individuals, allowing the first individual to assume the second person’s identity and vice versa.” The best defense prevents morphs from getting into operational systems and workflows at all.

Like deepfake tools, face morphing software is easy to find and use. But, also like deepfakes, some morphs are better than others, and they differ across technologies. For detecting morphs, NIST describes two different detection situations: “In one, called single-image morph attack detection, officials possess only the questionable photo, such as processing a new application in a passport office. In the other, differential morph attack detection, they have the questionable photo along with a second image that is known to be genuine, such as a photo taken of the person at a border crossing.”

The guidelines “discuss the capabilities and limitations of detectors in both scenarios.”

NIST’s Mei Ngan, an author of the publication, says that “some modern morph detection algorithms are good enough that they could be useful in detecting morphs in real-world operational situations. Our publication is a set of recommendations that can be tailored to a specific situation.”

As such, it focuses primarily on use cases. “The bulk of the guidelines concern how one might configure morph attack detection software under different scenarios, and they suggest steps and procedures to help investigators when the detection software flags a suspicious photo.”

“What we’re trying to do is guide operational staff in determining whether there is a need for investigation and what steps that might take,” Ngan says.

Related Posts

Article Topics

 |   |   |   |   |   |   | 

Latest Biometrics News

 

India scales farmer ID system for payments with KPMG support

The India office of influential accounting firm KPMG has explained how it supported the advancement of the country’s Digital Agriculture…

 

Digital ID systems fail migrants due to policy gaps, Caribou finds

A new report by research organization Caribou has warned that digital ID systems around the world have continued to deepen…

 

Certainty vs flexibility – does the UK need a Biometric Surveillance Act?

By Professor Fraser Sampson, former UK Biometrics & Surveillance Camera Commissioner Last week London became a city of two tales. Two…

 

TestMu AI releases testing tool for agent-produced code

TestMu AI (formerly LambdaTest) has launched Kane CLI, “a new browser automation tool that runs directly from the terminal,” and…

 

Travel biometrics making new connections

Airport biometrics projects and companies are breaking new ground and intersecting with other industry trends, from digital wallets to biometric…

 

Biometric Update Podcast: Teresa Wu on SIA’s Corporate Credential Design Guide

The Security Industry Association (SIA) has published its Corporate Credential Design Guide, and Idema Public Security’s Teresa Wu, who has…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events