skip to main content
10.1145/3583780.3615122acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
short-paper

KID34K: A Dataset for Online Identity Card Fraud Detection

Published: 21 October 2023 Publication History

Abstract

Though digital financial systems have provided users with convenient and accessible services, such as supporting banking or payment services anywhere, it is necessary to have robust security to protect against identity misuse. Thus, online digital identity (ID) verification plays a crucial role in securing financial services on mobile platforms. One of the most widely employed techniques for digital ID verification is that mobile applications request users to take and upload a picture of their own ID cards. However, this approach has vulnerabilities where someone takes pictures of the ID cards belonging to another person displayed on a screen, or printed on paper to be verified as the ID card owner. To mitigate the risks associated with fraudulent ID card verification, we present a novel dataset for classifying cases where the ID card images that users upload to the verification system are genuine or digitally represented. Our dataset is replicas designed to resemble real ID cards, making it available while avoiding privacy issues. Through extensive experiments, we demonstrate that our dataset is effective for detecting digitally represented ID card images, not only in our replica dataset but also in the dataset consisting of real ID cards. Our dataset is available at https://github.com/DASH-Lab/idcard_fraud_detection.

References

[1]
Daniel Benalcazar, Juan E Tapia, Sebastian Gonzalez, and Christoph Busch. 2023. Synthetic ID Card Image Generation for Improving Presentation Attack Detection. IEEE Transactions on Information Forensics and Security 18 (2023), 1814--1824.
[2]
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. ImageNet: A large-scale hierarchical image database. In 2009 IEEE Conference on Computer Vision and Pattern Recognition. 248--255. https://doi.org/10.1109/CVPR.2009.5206848
[3]
Terrance DeVries and Graham W Taylor. 2017. Improved regularization of convolutional neural networks with cutout. arXiv preprint arXiv:1708.04552 (2017).
[4]
European Organization For Nuclear Research and OpenAIRE. 2013. Zenodo. https://doi.org/10.25495/7GXK-RD71
[5]
This Person Does Not Exist. 2021--2023. Random Face Generator(This Person Does Not Exist). https://this-person-does-not-exist.com/en
[6]
Sebastian Gonzalez and Juan Tapia. 2023. Improving Presentation Attack Detection for ID Cards on Remote Verification Systems. arXiv preprint arXiv:2301.09542 (2023).
[7]
Sebastian Gonzalez, Andres Valenzuela, and Juan Tapia. 2020. Hybrid two-stage architecture for tampering detection of chipless id cards. IEEE Transactions on Biometrics, Behavior, and Identity Science 3, 1 (2020), 89--100.
[8]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.
[9]
Gao Huang, Zhuang Liu, Laurens Van Der Maaten, and Kilian Q Weinberger. connected convolutional networks. In Proceedings of the IEEE conference on computer vision and pattern recognition. 4700--4708.
[10]
Naoki Katsura. 2020. pytorch-cosine-annealing-with-warmup. https://github.com/katsura-jp/pytorch-cosine-annealing-with-warmup.
[11]
KoROAD. 2018--2023. Driver's License Acquisition Process in South Korea Governed by the Government of South Korea. https://www.safedriving.or.kr/main.do
[12]
Raghavendra Mudgalgundurao, Patrick Schuch, Kiran Raja, Raghavendra Ramachandra, and Naser Damer. 2022. Pixel-wise supervision for presentation attack detection on identity document cards. IET Biometrics 11, 5 (2022), 383--395.
[13]
Mark Sandler, Andrew Howard, Menglong Zhu, Andrey Zhmoginov, and Liang-Chieh Chen. 2018. Mobilenetv2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE conference on computer vision and pattern recognition. 4510--4520.
[14]
L. Tan and J. Jiang. 2013. Digital Signal Processing: Fundamentals and Applications. Academic, Cambridge, MA, USA. 87--136 pages.
[15]
Mingxing Tan and Quoc Le. 2019. Efficientnet: Rethinking model scaling for convolutional neural networks. In International conference on machine learning. PMLR, 6105--6114.
[16]
The Korean Ministry of the Interior and Safety. 1998--2023. South Korea's ID Card. https://mois.go.kr/frt/sub/a06/b06/IDCard/screen.do
[17]
Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, 11 (2008).
[18]
Sangdoo Yun, Dongyoon Han, Seong Joon Oh, Sanghyuk Chun, Junsuk Choe, and Youngjoon Yoo. 2019. Cutmix: Regularization strategy to train strong classifiers with localizable features. In Proceedings of the IEEE/CVF international conference on computer vision. 6023--6032.

Cited By

View all
  • (2024)First Competition on Presentation Attack Detection on ID Card2024 IEEE International Joint Conference on Biometrics (IJCB)10.1109/IJCB62174.2024.10744475(1-10)Online publication date: 15-Sep-2024
  • (2024)IDNet: A Novel Identity Document Dataset via Few-Shot and Quality-Driven Synthetic Data Generation2024 IEEE International Conference on Big Data (BigData)10.1109/BigData62323.2024.10825017(2244-2253)Online publication date: 15-Dec-2024

Index Terms

  1. KID34K: A Dataset for Online Identity Card Fraud Detection

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CIKM '23: Proceedings of the 32nd ACM International Conference on Information and Knowledge Management
      October 2023
      5508 pages
      ISBN:9798400701245
      DOI:10.1145/3583780
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 October 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. dataset
      2. identity card verification
      3. neural networks

      Qualifiers

      • Short-paper

      Conference

      CIKM '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

      Upcoming Conference

      CIKM '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)177
      • Downloads (Last 6 weeks)23
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)First Competition on Presentation Attack Detection on ID Card2024 IEEE International Joint Conference on Biometrics (IJCB)10.1109/IJCB62174.2024.10744475(1-10)Online publication date: 15-Sep-2024
      • (2024)IDNet: A Novel Identity Document Dataset via Few-Shot and Quality-Driven Synthetic Data Generation2024 IEEE International Conference on Big Data (BigData)10.1109/BigData62323.2024.10825017(2244-2253)Online publication date: 15-Dec-2024

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media