FB pixel

New NIST guidelines look at face morph attacks and how to stop them

Guide to morph detection offers procedural advice for real-world scenarios
New NIST guidelines look at face morph attacks and how to stop them
 

The National Institute of Standards and Technology (NIST) has released guidelines that aim to help in the detection of face morphing attacks and biometric identity fraud.

A post from NIST introduces Face Analysis Technology Evaluation (FATE) MORPH 4B: Considerations for Implementing Morph Detection in Operations (NISTIR 8584), described as “a lay-language introduction” to morphs and how to handle them.

In brief, face morphing software that synthesizes photos of different faces into a single image can make it easier to bypass identity verification systems. “Morphed photos can deceive face recognition systems into falsely identifying the image as belonging to both original individuals, allowing the first individual to assume the second person’s identity and vice versa.” The best defense prevents morphs from getting into operational systems and workflows at all.

Like deepfake tools, face morphing software is easy to find and use. But, also like deepfakes, some morphs are better than others, and they differ across technologies. For detecting morphs, NIST describes two different detection situations: “In one, called single-image morph attack detection, officials possess only the questionable photo, such as processing a new application in a passport office. In the other, differential morph attack detection, they have the questionable photo along with a second image that is known to be genuine, such as a photo taken of the person at a border crossing.”

The guidelines “discuss the capabilities and limitations of detectors in both scenarios.”

NIST’s Mei Ngan, an author of the publication, says that “some modern morph detection algorithms are good enough that they could be useful in detecting morphs in real-world operational situations. Our publication is a set of recommendations that can be tailored to a specific situation.”

As such, it focuses primarily on use cases. “The bulk of the guidelines concern how one might configure morph attack detection software under different scenarios, and they suggest steps and procedures to help investigators when the detection software flags a suspicious photo.”

“What we’re trying to do is guide operational staff in determining whether there is a need for investigation and what steps that might take,” Ngan says.

Related Posts

Article Topics

 |   |   |   |   |   |   | 

Latest Biometrics News

 

Meta plans launch of facial recognition to smart glasses in ‘dynamic political environment’

Meta is reportedly planning to roll out facial recognition capabilities for its smart glasses as early as this year, taking…

 

Mobai joins Norway’s new digital fraud research center

Facial biometrics company Mobai will be the main biometric technology partner in a new research center focused on combating fraud…

 

Australia’s eSafety Commissioner stands firm in face of US demands

For a few weeks, there wasn’t much news about how U.S. Congress has demanded that Australian eSafety Commissioner Julie Inman…

 

UK data watchdog responds to govt consultation on police use of facial recognition

The UK’s Information Commissioner’s Office (ICO) wants clearer rules for law enforcement agencies using facial recognition technology (FRT) and other…

 

FBI leverages NGI biometric database, advanced forensics in high-profile abduction

The Federal Bureau of Investigation (FBI) has turned to a range of advanced forensic tools, including its Next Generation Identification…

 

Mitek enhances unassisted video verification to meet deepfake challenge

Mitek Systems has announced enhancements to its digital onboarding capabilities for the Spanish market, in compliance with Sepblac, Spain’s financial…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events