6 CONCLUSION
Our study has once again confirmed the limited
capability of human examiners to match unfamiliar
faces as well as differentiate between morphed and
genuine face photographs. We deliberately used
automatically generated morphs with evident visual
artifacts to demonstrate that human examiners can
be deceived not only by professionally created
manual morphs. Our experiment simulating a border
control reveals the average MAR of 34.65% in the
face matching scenario and the average FNR (miss
rate) of 15.41% in the morphing detection scenario.
In contrast, at least one of the algorithms used in our
experiment is able to perfectly distinguish genuine
and morphing trials in the matching experiment, or
genuine and morphed images in the detection
experiment, provided that a proper decision
threshold has been selected. We understand that, due
to the low number of samples, the error rates of
algorithms resulting from our evaluation cannot be
seen as reliable performance indicators and,
therefore, cannot be generalized in any sense. We
also understand that the error rates of our test
participants might deviate from those of experienced
border guards. Nonetheless, the experiment has
shown clear trends and revealed general deficiencies
of manual identity verification. Hence, we conclude
that the manual processing of a document photo-
graph constitutes the bottle neck of the concept of
identity verification with a photo-ID, indicating the
necessity for computer-aided support of photo-ID
checking staff (e.g. border guards) in the field and at
document issuing offices.
ACKNOWLEDGEMENTS
This work has been funded in part by the German
Federal Ministry of Education and Research
(BMBF) through the research programme ANANAS
under the contract no. FKZ: 16KIS0509K. We thank
Alexandra Koch, Dennis Siegel, Janine Zoellner,
Kevin Michael Schott and Gina Marisa Seckendorf
for the implementation of the experiment.
REFERENCES
Ferrara, M., Franco, A., Maltoni, D., 2016. On the Effects
of Image Alterations on Face Recognition Accuracy.
In Bourlai, T. (ed.) Face Recognition Across the
Electromagnetic Spectrum, Springer, pp. 195-222.
FRONTEX, 2015. Best Practice Technical Guidelines for
Automated Border Control (ABC) Systems.
Hancock, P., Bruce, V., Burton, A.M., 2000. Recognition
of unfamiliar faces. Trends in Cog. Sci. 4(9): 330-337.
ICAO, 2004. Biometric Deployment of Machine Readable
Travel Documents, TAG MRTDINTWG, May 2004.
ISO/IEC JTC1 SC17 WG3, 2018. Portrait Quality
(Reference Facial Images for MRTD), Tech.Rep.2018.
King, D., Dlib C++ Library, Release notes,
http://dlib.net/release_notes.html, accessed 5.10.2018
Kraetzer, C. et al., 2017. Modeling Attacks on Photo-ID
Documents and Applying Media Forensics for the
Detection of Facial Morphing, In Proc. IH&MMSec
'17, pp. 21-32.
Luxand Inc., 2018. FaceSDK 6.5.1 Release Notes,
https://www.luxand.com/facesdk/whatsnew/, accessed
5.10.2018
Makrushin, A., Neubert, T., Dittmann, J., 2017. Automatic
generation and detection of visually faultless facial
morphs, In Proc. VISAPP'18, pp. 39-50.
Makrushin, A., Wolf, A., 2018. An Overview of Recent
Advances in Assessing and Mitigating the Face
Morphing Attack. In Proc.EUSIPCO'18, pp1022-1026
Neubert, T., Makrushin, A., Hildebrandt, M., Kraetzer, C.,
Dittmann, J., 2018. Extended StirTrace Benchmarking
of Biometric and Forensic Qualities of Morphed Face
Images, IET Biometrics 7(4):325-332.
Phillips, P.J., O’Toole, A.J., 2014. Comparison of human
and computer performance across face recognition
experiments. Image & Vis.Comp. 32:74-85.
Raghavendra, R., Busch, C., 2017. Presentation Attack
Detection Methods for Face Recognition Systems: A
Comprehensive Survey, ACM Comp. Surv. 50(1):8.
Raghavendra, R. et al., 2017. Transferable Deep-CNN
features for detecting digital and print-scanned
morphed face images, Proc.CVPRW'17, pp.1822-1830
del Rio, J.S, Moctezuma, D., Conde, C., de Diego, I.M.,
Cabello, E., 2016. Automated border control e-gates
and facial recognition systems, Comp.& Sec.62:49-72.
Robertson, D.J., Kramer, R.S.S., Burton, A.M., 2017.
Fraudulent ID using face morphs: Experiments on
human and automatic recognition, PLoS ONE 12(3):
e0173319.
Robertson, D.J., et al., 2018. Detecting morphed passport
photos: a training and individual differences approach.
Cognitive Research: Principles and Implications 3:27.
Scherhag, U., Raghavendra, R., Raja, K.B., Gomez-
Barrero, M., Rathgeb, C., Busch, C., 2017. On the
Vulnerability of Face Recognition Systems: Towards
Morphed Face Attacks, In Proc IWBF'17
, pp. 1-6.
Seibold, C., Samek, W., Hilsmann, A., Eisert, P., 2017.
Detection of Face Morphing Attacks by Deep
Learning, In Proc. IWDW'17, pp. 107-120.
Seibold, C., Samek, W., Hilsmann, A., Eisert, P., 2018.
Accurate and Robust Neural Networks for Security
Related Applications Exampled by Face Morphing
Attacks. CoRR abs/1806.04265.
White, D., Kemp, R.I., Jenkins, R., Matheson, M., Burton,
A.M., 2014. Passport Officers’ Errors in Face
Matching. PLoS ONE 9(8): e103510.