skip to main content
10.1145/3581783.3612075acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

On Physically Occluded Fake Identity Document Detection

Published:27 October 2023Publication History

ABSTRACT

Many online applications require the users to upload their identity documents for authentication. The fake identity document is one of the main threats which compromises the security and reliability of such online applications. Existing techniques focus on the detection of digitally forged identity documents, which neglect the impact of physical forgeries. In this paper, we look into the problem of detecting physically occluded fake identity documents, which can be easily generated without any image processing knowledge. We observe that the physical occlusions inevitably produce occluded boundaries on the document. To take the advantage, we propose an Occluded Boundary Representation Learning (OBRL) module to progressively learn the occluded boundary features. These are then fed into an Occluded Boundary Message Passing (OBMP) module to effectively diffuse the physical occlusion traces to enhance the backbone features for robust detection. We newly construct a Physically Occluded Fake ID Card image dataset (POID) for evaluation. Various experiments are conducted on the POID, where our scheme is able to achieve 99.6% of accuracy in detecting physically occluded fake ID card images with a mAP of over 85% to localize the occlusion regions.

References

  1. Musab Al-Ghadi, Zuheng Ming, Petra Gomez-Krämer, and Jean-Christophe Burie. 2022. Identity Documents Authentication based on Forgery Detection of Guilloche Pattern. arxiv: 2206.10989 [cs.CV]Google ScholarGoogle Scholar
  2. Diego Benalcazar, Juan E Tapia, Sergio Gonzalez, et al. 2023. Synthetic ID Card Image Generation for Improving Presentation Attack Detection. IEEE Transactions on Information Forensics and Security (2023).Google ScholarGoogle Scholar
  3. Romain Bertrand, Oriol Ramos Terrades, Petra Gomez-Krämer, Patrick Franco, and Jean-Marc Ogier. 2015. A conditional random field model for font forgery detection. In 2015 13th International Conference on Document Analysis and Recognition (ICDAR). IEEE, 576--580.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Nabil Ghanmi, Cyrine Nabli, and Ahmad-Montaser Awal. 2021. CheckSim: A reference-based identity document verification by image similarity measure. In Document Analysis and Recognition-ICDAR 2021 Workshops: Lausanne, Switzerland, September 5-10, 2021, Proceedings, Part I 16. Springer, 422--436.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Sebastian Gonzalez and Juan Tapia. 2023. Improving Presentation Attack Detection for ID Cards on Remote Verification Systems. arxiv: 2301.09542 [cs.CV]Google ScholarGoogle Scholar
  6. Sebastian Gonzalez, Andres Valenzuela, and Juan Tapia. 2021. Hybrid two-stage architecture for tampering detection of chipless id cards. IEEE Transactions on Biometrics, Behavior, and Identity Science, Vol. 3, 1 (2021), 89--100.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kaiming He, Georgia Gkioxari, Piotr Dollár, and Ross Girshick. 2017. Mask r-cnn. In Proceedings of the IEEE international conference on computer vision. 2961--2969.Google ScholarGoogle ScholarCross RefCross Ref
  8. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.Google ScholarGoogle ScholarCross RefCross Ref
  9. Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, and Geguang Pu. 2020. Fakepolisher: Making deepfakes more detection-evasive by shallow reconstruction. In Proceedings of the 28th ACM international conference on multimedia. 1217--1226.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ramesh Jain, Rangachar Kasturi, Brian G Schunck, et al. 1995. Machine vision. Vol. 5. McGraw-hill New York.Google ScholarGoogle Scholar
  11. Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In International Conference on Learning Representations. https://openreview.net/forum?id=SJU4ayYglGoogle ScholarGoogle Scholar
  12. Lingzhi Li, Jianmin Bao, Hao Yang, Dong Chen, and Fang Wen. 2020a. Advancing High Fidelity Identity Swapping for Forgery Detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarGoogle ScholarCross RefCross Ref
  13. Lingzhi Li, Jianmin Bao, Ting Zhang, Hao Yang, Dong Chen, Fang Wen, and Baining Guo. 2020b. Face x-ray for more general face forgery detection. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 5001--5010.Google ScholarGoogle ScholarCross RefCross Ref
  14. Ze Liu, Yutong Lin, Yue Cao, Han Hu, Yixuan Wei, Zheng Zhang, Stephen Lin, and Baining Guo. 2021. Swin transformer: Hierarchical vision transformer using shifted windows. In Proceedings of the IEEE/CVF international conference on computer vision. 10012--10022.Google ScholarGoogle ScholarCross RefCross Ref
  15. Ilya Loshchilov and Frank Hutter. 2019. Decoupled weight decay regularization. In International Conference on Learning Representations.Google ScholarGoogle Scholar
  16. Ivan Perov, Daiheng Gao, Nikolay Chervoniy, Kunlin Liu, Sugasa Marangonda, Chris Umé, Mr Dpfks, Carl Shift Facenheim, Luis RP, Jian Jiang, et al. 2020. DeepFaceLab: Integrated, flexible and extensible face-swapping framework. arXiv preprint arXiv:2005.05535 (2020).Google ScholarGoogle Scholar
  17. Andreas Rossler, Davide Cozzolino, Luisa Verdoliva, Christian Riess, Justus Thies, and Matthias Nießner. 2019. Faceforensics: Learning to detect manipulated facial images. In Proceedings of the IEEE/CVF international conference on computer vision. 1--11.Google ScholarGoogle ScholarCross RefCross Ref
  18. Aziza Satkhozhina, Ildus Ahmadullin, and Jan P Allebach. 2013. Optical font recognition using conditional random field. In Proceedings of the 2013 ACM symposium on Document engineering. 119--122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Steven Schwarcz and Rama Chellappa. 2021. Finding facial forgery artifacts with parts-based detectors. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 933--942.Google ScholarGoogle ScholarCross RefCross Ref
  20. Shize Shang, Xiangwei Kong, and Xingang You. 2015. Document forgery detection using distortion mutation of geometric parameters in characters. Journal of Electronic Imaging, Vol. 24, 2 (2015), 023008--023008.Google ScholarGoogle ScholarCross RefCross Ref
  21. Ronan Sicre, Ahmad Montaser Awal, and Teddy Furon. 2017. Identity documents classification as an image classification problem. In Image Analysis and Processing-ICIAP 2017: 19th International Conference, Catania, Italy, September 11-15, 2017, Proceedings, Part II 19. Springer, 602--613.Google ScholarGoogle Scholar
  22. Mingxing Tan and Quoc Le. 2019. Efficientnet: Rethinking model scaling for convolutional neural networks. In International conference on machine learning. PMLR, 6105--6114.Google ScholarGoogle Scholar
  23. Justus Thies, Michael Zollhofer, Marc Stamminger, Christian Theobalt, and Matthias Nießner. 2016. Face2face: Real-time face capture and reenactment of rgb videos. In Proceedings of the IEEE conference on computer vision and pattern recognition. 2387--2395.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Liang Wu, Chengquan Zhang, Jiaming Liu, Junyu Han, Jingtuo Liu, Errui Ding, and Xiang Bai. 2019. Editing text in the wild. In Proceedings of the 27th ACM international conference on multimedia. 1500--1508.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Qian Yang, Jing Huang, and Weisi Lin. 2020. Swaptext: Image Based Texts Transfer in Scenes. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 14700--14709.Google ScholarGoogle ScholarCross RefCross Ref
  26. Baogen Zhang, Sheng Li, Guorui Feng, Zhenxing Qian, and Xinpeng Zhang. 2022. Patch Diffusion: a general module for face manipulation detection. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 36. 3243--3251.Google ScholarGoogle ScholarCross RefCross Ref
  27. Hanqing Zhao, Wenbo Zhou, Dongdong Chen, Tianyi Wei, Weiming Zhang, and Nenghai Yu. 2021b. Multi-attentional deepfake detection. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2185--2194.Google ScholarGoogle ScholarCross RefCross Ref
  28. Lin Zhao, Chen Chen, and Jiwu Huang. 2021a. Deep learning-based forgery attack on document images. IEEE Transactions on Image Processing, Vol. 30 (2021), 7964--7979.Google ScholarGoogle ScholarCross RefCross Ref
  29. Xiangyu Zhu, Hao Wang, Hongyan Fei, Zhen Lei, and Stan Z Li. 2021. Face forgery detection by 3d decomposition. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2929--2939.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. On Physically Occluded Fake Identity Document Detection

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MM '23: Proceedings of the 31st ACM International Conference on Multimedia
        October 2023
        9913 pages
        ISBN:9798400701085
        DOI:10.1145/3581783

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate995of4,171submissions,24%

        Upcoming Conference

        MM '24
        MM '24: The 32nd ACM International Conference on Multimedia
        October 28 - November 1, 2024
        Melbourne , VIC , Australia
      • Article Metrics

        • Downloads (Last 12 months)119
        • Downloads (Last 6 weeks)14

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader