It is important to combat fraud on travel documents (e.g., passports), identity documents (e.g., ID-card) and breeder documents (e.g., birth certificates) to facilitate the travel of bona-fide travelers and to prevent criminal cross-border activities, such as terrorism, illegal migration, smuggling, and human trafficking. However, it is challenging and time consuming to verify all document security features manually. New technologies can assist in the automated fraud detection in these documents, which may result in faster and more consistent checks. This paper presents and evaluates four new technologies in automated document analysis. The first recognizes printing techniques. The second assists in the recognition of fraud in details. The third extracts information from the document, which can be used to detect anomalies at a tactical level. The fourth category concerns the analysis of travel patterns, using information from the visa pages in passports. The performance is assessed for each element with quantitative performance metrics.
The increasing complexity of security challenges requires Law Enforcement Agencies (LEAs) to have improved analysis capabilities, e.g., with the use of Artificial Intelligence (AI). However, it is challenging to make large enough high-quality training and testing datasets available to the community that is developing AI tools to support LEAs in their daily work. Due to legal and ethical issues, it is often undesirable to share raw data with personal information. These issues can lead to a chicken-egg problem, where annotation/anonymization and development of an AI tool depend on each other. This paper presents a federated tool for semi-automatic anonymization and annotation that facilitates the sharing of AI models and anonymized data without sharing raw data with personal information. The tool uses federated learning to jointly train object detection models to reach higher performance by combining the annotation efforts of multiple organizations. These models are used to assist a person to anonymize or annotate image data more efficiently with human oversight. The results show that our privacy-enhancing federated approach – where only models are shared – is almost as good as a centralized approach with access to all data.
Authentication of travel documents (e.g., passports) and breeder documents (e.g., birth certificates) is important to facilitate legal movement of passengers and to prevent cross-border crime, such as terrorism, smuggling, illegal migration and human trafficking. However, it is time consuming and difficult to verify all security features, the border guards differ in experience and expertise, and it is hard to stay alert every minute of a working day. New (artificial-intelligence based) technologies can assist in the automated fraud detection in travel and breeder documents, which may lead to faster and more consistent checks. This paper presents five categories of new technologies in automated document authentication to overcome the limitations of current document analysis systems in automated and non-automated border control scenarios. The first category consists of techniques related to the verification of visual security features on the holder page of travel documents. This category includes the verification of KINEGRAMs and other Optically Variable features under different light sources and lighting angles, and the analysis of printing techniques. The second category consists of techniques related to the analysis of breeder documents. This analysis can be at detail level (e.g., investigation of stamps) and at tactical level (e.g., verification of a check digit in a document number). The third category concerns the analysis of travel patterns, using information from the visa pages in passports. The stamps on these pages can be used to extract a travel pattern to support risk assessments and to detect anomalies. The fourth category is an analysis of the border-guard inspection history based upon a distributed ledger and blockchain technology that enables secure storage and prevents undesired manipulations. The last category analyzes the electronic chip of a passport. The software analyses document signer and country signer certificates on the chip to detect vulnerable cryptographic keys and tactical anomalies.
The current capabilities and capacities of border guards and immigration services can be enhanced using technologies that automate the analysis of travel, identity and breeder documents in order to detect fraud. These technologies can be relevant for countering emerging threats in document and identity verification (e.g., forged documents, impostor fraud, morphed faces) at both manual and highly automated border control points (both in the first and in the second line) and in the issuance process of genuine documents. The travel documents (e.g., passports) and breeder documents (e.g., birth certificates) contain personal information, such as name, date of birth and national number. The personal information must be well protected and a data breach must be avoided at all times. One of the ways to protect the personal data is to minimize the sharing of personal data. Anonymization removes the personal information (e.g., by replacing the personal information by a black bar) and can therefore be used to minimize the sharing of personal data. This paper describes the tool that assists border guards and immigration services for the anonymization of travel and breeder documents. The tool consists of a graphical user interface, document detection, keyword recognition, face detection, number detection, barcode detection and masking of personal data. The results show that only 10 annotated images are needed to reach a keyword detection accuracy of 96% and anonymization sensitivity of 93% of the related personal data.
Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to alleviate this concern is to anonymize the people in the dataset. Anonymization is important to minimize the storage and processing of personal information, such as facial information in a surveillance video. However, anonymization typically leads to loss of information and could lead to severe deterioration of the Re-ID quality. In this paper, we show that it is possible to store only anonymized person detections while still achieving a high quality person Re-ID. This leads to the conclusion that for the development of re-identification algorithms in situations where privacy is of great importance it is not necessary to store facial information in person re-identification datasets.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.