Background top
morphing

Everything you want to know about morphing

Surely you have heard of morphing, a concept that is on the rise and is very popular on internet forums.

Although the vast majority of its applications are aimed at leisure, it is a technique that also involves dangers. Specifically, because more and more criminals use it to impersonate the identity of new victims. But what exactly is it?

What is morphing?

Morphing is a digital transformation or editing technique. It consists of a special effect that transforms the photograph of a real object or a person into the image of another real object or person.

The procedure consists of collecting two images or photos of the users that are going to be transformed; the source element and the end. Both images are then digitized on a computer. After digitizing the images, image processing software is used to carry out said transformation.

Morphing is an image manipulation technique that transforms one image into another, in the form of an animation-transition.

If you google “morphing”, you can get an idea.

Morphing vs. deepfake

We can differentiate morphing and deepfakes for its purpose, since both are digital editing and transformation techniques (more or less complex).

Morphing, meanwhile, is meant to defeat facial recognition, while deepfakes are generated to deceive and/or spread information.

Risks of morphing

As an editing and production technique, morphing can be very interesting. One more feat of technology, but we must not forget the risks involved.

If used for illegitimate purposes, this computer technique that copies and transforms people’s photos can become a tool for identity theft or other cybercrimes.

Why is morphing a risk for facial biometrics?

Morphing involves risks for facial biometrics, mainly because there are numerous affordable tools to do it. Therefore, it constitutes a threat to entities and companies that accept photographs as identity credentials.

In fact, it is a crime on the order of the day in border controls, given that more and more cases of this threat are being detected in which passport photographs and identity documents of random people are manipulated by computer in order to falsify them and circumvent facial biometric security systems.

The reality is that this technique can be useful for criminals who want to be free, because if they succeed in making people believe that they are someone else, they will be able to travel freely through customs borders. In addition, they can do evil not only physically, but also online.

Due to how easy it is to use this mechanism, attempts to enter European borders with passports manipulated via morphing are the order of the day. However, while it is true that there is more and more control over it. For example, in Germany a couple of years ago there was a legislation to deny the use of analog images (in which the transformation is not detected) for the passport.

Noticias relacionadas

29 de March de 2023

Facial presentation attacks detection, an overview.

Facial recognition technology has revolutionized the way we identify people in a variety of environments, from unlocking our phones to accessing high-security areas. However, as with any technology, it is not immune to malicious attacks. Presentation Attack Detection (PAD) is a critical aspect of facial recognition technology that aims to identify and mitigate attempts to forge or spoof the system….

Read More…

Alice & Councilbox alliance
27 de March de 2023

Alice Biometrics and Councilbox sign an agreement to facilitate comprehensive management of citizen and corporate services remotely.

Alice Biometrics and Councilbox have signed an agreement to facilitate comprehensive remote management of citizen and business paperwork in a secure, certified…

Read More…

sim swapping
22 de March de 2023

What is SIM Swapping and how to prevent it?

SIM swapping is a common form of identity theft in which the attacker takes control of the victim’s phone number and SIM…

Read More…