KYC

KYC AML Guide: the Clock shows the average reeding time of the blog12 min Read

-

KYC AML Guide: the Clock shows the average reeding time of the blogJanuary 11, 2024

What is Facial Morphing and How can KYC Solutions Prevent Morphing Attacks?

Identity Theft and ATO Fraud over the internet have taken many shapes in recent years. This has raised serious questions about KYC Identity Verification Solutions' efficiency and ability to detect different types of Identity Fraud techniques. Morphing or Facial Morphing is one of identity infringement techniques that is commonly used by a Cyberbully, or a defamer. Usually, celebrities are the prime targets of Morphing attacks that are used to defame them or to gain media hype. Today we will address the important issues related to morphing attacks and how KYC Identity Verification Solutions can prevent facial morphing attacks.

Belal Mahmoud

KYC Product Consultant

What is Morphing?

Morphing is a sophisticated graphical technique that involves seamlessly blending or transforming two or more images to create a fluid transition between them. This process utilizes animation and image manipulation to merge the characteristics of the input images to generate entirely new images. Morphing Images allow for the creation of visually dynamic sequences where the boundaries between the original images become imperceptible. This makes morphed images look realistic and deceives ordinary people.

Uses of Morphing

Morphing has both positive and negative uses. Morphing is used in both positive and negative terms here is a brief chart of its different applications:

Positive Uses Negative Uses
Entertainment and Media

  • Film and Animation use morphed scenes to beautify animated content and make the film’s storyline through special effects using morphing techniques.
Impersonation / Identity Theft

  • Morphing is extensively used for creating Fake Identities and impersonating genuine users to commit fraud and other criminal activities.
Biomedical Imaging

  • Morphing is a useful technique in biomedical imaging that helps in viewing, understanding, and studying biological changes such as anatomical changes over time.
False Evidence

  • A serious threat in which anybody can be pinned for a crime they have not committed. Morphing can create their transform criminal record and replace it with an innocent individual
Face Aging

  • Facial Morphing helps detect aging and creates possible outcomes to predict possible outcomes in the future.
  • Face Aging detection property in Facial morphing allows Identity Solutions to detect morphing attacks using aging images
  • It is also used for research purposes used to enhance and improve KYC Solutions.
Cyberbullying

  • Perpetrators can defame a person by creating humiliating content.
  • This is mostly done for illicit gains, damaging a person’s credibility and trust.
  • Cyberbullying is a criminal activity that causes serious damage to someone’s online assets, identity, and online presence.
Forensic Reconstruction

  • Morphing is also used in facial reconstruction to identify missing or dead individuals whose faces are destroyed.
  • It is also used by Anti-Fraud and Anti-Money Laundering agencies to combat financial crimes.
Deep Fakes

  • Deepfakes often use morphing face techniques to authenticate identities falsely and illegally use different services.
  • It can superimpose a real face image on another person’s body to create highly convincing deepfakes.
Virtual Try-on

  • Clothing and other wearables can now be tried virtually on websites using Morphing techniques.
Fraud

Types of Morphing

Facial Morphing is the most common technique of a morphing attack which is used to hurt a person’s reputation online. Here are the 3 main types of Morphing:

Type of Face Morphing

1) Linear Morphing

It refers to the linear transition between the source and target images. Two completely distinct images are merged in animation style. It is comparatively easier to detect linear morphing.

2) Cross-Dissolve Morphing

It involves a gradual and high-definition fading technique of the pixels of two images that results in a much smoother transition as compared to linear morphing. It is quite difficult for the human eye to detect Cross-Dissolve Morphing.

3) Feature-Based Morphing

In this type of morphing, the facial landmarks (eyes, nose, and lips) are used for image transition with subtlety and higher accuracy. It is by far the most sophisticated morphing technique.

How Does Facial Morphing Work?

Morphing faces requires the blending of two images in a sophisticated and undetectable way. Usually, a face blender application software is used to blend the two distinct images and create an entirely new and realistic image.

There are 5 main steps to create a morphed image through a face blender.

1) Adding a Morph Node

In the first step, two source images or clips and the output node are decided in a morphing application software.

2) Creating the Source Shape

Usually, masking techniques and tools like the ‘spline tool’ are used to create the source shape. Since it is a highly sophisticated and intelligent tool, it does not require the user to select and draw the exact source shape. Minor inaccuracies are automatically corrected by the software through AI (Artificial Intelligence).

3) Creating the Target Shape

The same process is repeated at the target node but with predictions and accurate results. Users can graphically guide the system to create the target shape during morphing.

4) Adding a Correspondence

The system adds a correspondence between the source images and uses advanced image-blending techniques to mix and match the images. It is done by selecting the source images and matching them with the landmarks (eyes, nose, and lips) of the target image.

5) Blending and Animating the Final Output

Finally, the output image is created with adjustments and intelligently removing any inconsistencies.

Face Morphing Detection Techniques

To detect a face morphing attempt, KYC Identity Verification Solution Providers employ the following methods:

Face Morphing Detection Techniques

Texture Analysis KYC Identification Tools analyze the texture and pixel-level details of the identity images to detect inconsistencies and anomalies occurring during morphing.
Facial Landmark Analysis A deep analysis of Facial Landmarks can also help in detecting morphed images. Facial Biometric identity verification tools can analyze different facial features and landmarks for the detection of morphing.
3D Facial Analysis Three-dimensional analysis of facial features with 3D modeling helps in detecting various morphing techniques.
Motion Analysis Some cutting-edge KYC Identity Tools also detect facial movements and behavior including gestures that detect unnatural movements and morphed content.
Digital Forensic Method Utilizing digital devices to detect the traces of manipulation in an image or a video.
Machine Learning Algorithms Machine Learning models are trained on the given datasets or genuine and morphed images to differentiate between the two accurately. It enhances the ability of a biometric identification variable, especially in facial biometrics.

How to Prevent Facial Morphing Attacks?

Differentiating between Real vs Fake Images over the internet is becoming increasingly difficult. This is due to the alarming number of facial morphing attacks, deepfake attacks, and other artificial identity attacks. Preventing Facial Morphing is one of the critical aspects of securing online identities and preventing other crimes. Here are a few ways in which Morphing attacks can be prevented and user identities can be secured.

  • Biometric Liveness Detection is also a handy feature in KYC Tools that detects morphing, deepfakes, and other kind of forgery in identity documents.
  • Hire anti-fraud personnel who are experts in using different techniques and tools to identify morphing.
  • Use stricter security protocols for facial recognition and authentication in which the rules of authentication should only allow the live person to enter in front of the camera.

Furthermore, there are benchmarks set by NIST for KYC Solutions to scale their Differential Morphing Detection parameters. After implementing these benchmarks KYC Identity Solution Providers can play a vital role in mitigating the threat of morph attacks. Since morphing is used to create deepfakes which are used for fraud and other illicit criminal activities, they pose a serious threat to the financial integrity and customer’s security. Therefore, preventing morphing is crucially important where KYC Tool providers through their vigilance can help in the detection and prevention of morph attacks.

Also Read: Everything you need to know about Face Identity Verification

Share

KYC AML Guide: the Facebook share KYC AML Guide: the Linkedin share KYC AML Guide: the Twitter share
Belal Mahmoud
KYC AML Guide: the Linkedin share

Belal possess over 8 years experience in the KYC Identity Verification industry. He has consulted KYC solutions for over 20 new economy companies at DIFC and ADGM while ensuring a seamless technical integration and helped in jurisdictional compliance audits.