Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Face morphing attacks: Investigating detection with humans and computers
by
Flack, Tessa R.
, Kramer, Robin S. S.
, Mireku, Michael O.
, Ritchie, Kay L.
in
Algorithms
/ Behavioral Science and Psychology
/ Cognitive Psychology
/ College Students
/ Computer applications
/ Computers
/ Experimental Psychology
/ Face matching
/ Face morph
/ Fraud
/ Graphs
/ Morph detection
/ Morphing attack
/ Neurosciences
/ Original
/ Original Article
/ Psychology
/ Training Methods
/ Travel
2019
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Face morphing attacks: Investigating detection with humans and computers
by
Flack, Tessa R.
, Kramer, Robin S. S.
, Mireku, Michael O.
, Ritchie, Kay L.
in
Algorithms
/ Behavioral Science and Psychology
/ Cognitive Psychology
/ College Students
/ Computer applications
/ Computers
/ Experimental Psychology
/ Face matching
/ Face morph
/ Fraud
/ Graphs
/ Morph detection
/ Morphing attack
/ Neurosciences
/ Original
/ Original Article
/ Psychology
/ Training Methods
/ Travel
2019
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Face morphing attacks: Investigating detection with humans and computers
by
Flack, Tessa R.
, Kramer, Robin S. S.
, Mireku, Michael O.
, Ritchie, Kay L.
in
Algorithms
/ Behavioral Science and Psychology
/ Cognitive Psychology
/ College Students
/ Computer applications
/ Computers
/ Experimental Psychology
/ Face matching
/ Face morph
/ Fraud
/ Graphs
/ Morph detection
/ Morphing attack
/ Neurosciences
/ Original
/ Original Article
/ Psychology
/ Training Methods
/ Travel
2019
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Face morphing attacks: Investigating detection with humans and computers
Journal Article
Face morphing attacks: Investigating detection with humans and computers
2019
Request Book From Autostore
and Choose the Collection Method
Overview
Background
In recent years, fraudsters have begun to use readily accessible digital manipulation techniques in order to carry out face morphing attacks. By submitting a morph image (a 50/50 average of two people’s faces) for inclusion in an official document such as a passport, it might be possible that both people sufficiently resemble the morph that they are each able to use the resulting genuine ID document. Limited research with low-quality morphs has shown that human detection rates were poor but that training methods can improve performance. Here, we investigate human and computer performance with high-quality morphs, comparable with those expected to be used by criminals.
Results
Over four experiments, we found that people were highly error-prone when detecting morphs and that training did not produce improvements. In a live matching task, morphs were accepted at levels suggesting they represent a significant concern for security agencies and detection was again error-prone. Finally, we found that a simple computer model outperformed our human participants.
Conclusions
Taken together, these results reinforce the idea that advanced computational techniques could prove more reliable than training people when fighting these types of morphing attacks. Our findings have important implications for security authorities worldwide.
Publisher
Springer International Publishing,Springer Nature B.V,SpringerOpen
Subject
This website uses cookies to ensure you get the best experience on our website.