Skip to main content
Log in

Johannes Merkle, Christian Rathgeb, Ulrich Scherhag, Christoph Busch

Morphing-Angriffe

Ein Sicherheitsrisiko für Gesichtserkennungssysteme

  • Schwerpunkt
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Zusammenfassung

Biometrische Gesichtserkennung ist zur Identifizierung oder Authentifizierung von Personen weit verbreitet. Kürzlich fanden Forscher jedoch heraus, dass Gesichtserkennungssysteme verwundbar gegenüber sogenannten ,,Morphing-Angriffen‘‘ sind. Dieser Beitrag gibt einen Einblick in Morphing Angriffe, schafft einen groben Überblick über den derzeitigen Stand der Technik bzgl. Methoden zur Detektion von gemorphten Gesichtsbildern, und diskutiert offene Fragen und Herausforderungen hinsichtlich Morphing-Angriffs-Detektion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. M. Ferrara, A. Franco und D. Maltoni, „On the Effects of Image Alterations on Face Recognition Accuracy,“ in Face Recognition Across the Imaging Spectrum, Springer International Publishing, 2016.

  2. J. D. Robertson, A. G. Mungall, D. Watson, A. K. Wade, J. S. Nightingale und S. Butler, „Detecting morphed passport photos: a training and individual differences approach,“ Cognitive Research: Principles and Implications, 2018.

  3. U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt, and C. Busch. Face recognition systems under morphing attacks: A survey. IEEE Access, 7:23012–23026, 2019.

    Article  Google Scholar 

  4. ISO/IEC JTC1 SC37 Biometrics, ISO/IEC IS 30107-3:2017, IT – Biometric presentation attack detection – Part 3: Testing and Reporting, 2017.

  5. U. Scherhag, A. Nautsch, C. Rathgeb, M. Gomez-Barrero, R. N. J. Veldhuis, L. Spreeuwers, M. Schils, D. Maltoni, P. Grother, S. Marcel, R. Breithaupt und R. Ramachandra, „Biometric Systems under Morphing Attacks: Assessment of Morphing Techniques and Vulnerability Reporting,“ in Proceedings of the 2017 International Conference of the Biometrics Special Interest Group (BIOSIG), 2017.

  6. R. Ramachandra, K. B. Raja und C. Busch, „Detecting morphed face images,“ in Proceedings of the 8th International Conference on Biometrics Theory, Applications and Systems (BTAS), 2016.

  7. C. Kraetzer, A. Makrushin, T. Neubert, M. Hildebrandt und J. Dittmann, „Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing,“ in Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security – IHMMSec ‘17, 2017.

  8. C. Seibold, W. Samek, A. Hilsmann und P. Eisert, „Detection of Face Morphing Attacks by Deep Learning,“ in Digital Forensics and Watermarking, 2017.

    Chapter  Google Scholar 

  9. U. Scherhag, C. Rathgeb und C. Busch, „Towards detection of morphed face images in electronic travel documents,“ in Proceedings of the 13th IAPR Workshop on Document Analysis Systems (DAS), 2018.

  10. M. Ferrara, A. Franco und D. Maltoni, „Face Demorphing,“ IEEE Transactions on Information Forensics and Security, 2018.

  11. M. Ngan, P. Grother und K. Hanaoka, „Performance of Automated Facial Morph Detection and Morph Resistant Face Recognition Algorithms,“ National Institute of Standards and Technology (NIST), 2018.

  12. International Civil Aviation Organization, ICAO Doc 9303, Machine Readable Travel Documents – Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs (7th edition), 2015.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Johannes Merkle.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Merkle, J., Rathgeb, C., Scherhag, U. et al. Morphing-Angriffe . Datenschutz Datensich 44, 38–42 (2020). https://doi.org/10.1007/s11623-019-1219-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-019-1219-y

Navigation