Affiliation:
1. Vels Institute of Science, Technology & Advanced Studies (VISTAS), Chennai, Tamil Nadu
Abstract
ID cards are official documents issued by government authorities or institutions to verify a person's identity. Educational certificates are official documents awarded by educational institutions, such as schools, colleges, and universities, to individuals who have successfully completed a specific program of study. They typically include the individual's name, photograph, date of birth, a unique identification number, the name of the institution, the degree or qualification earned, the date of completion, and sometimes additional details like the program of study or academic honours Both documents play important roles in various aspects of an individual's life, including employment, education, and official identification. Presentation attacks on ID cards and educational certificates encompass a range of deceptive tactics employed by individuals with malicious intent to undermine the authentication and validation processes associated with these documents. These attacks can have diverse objectives, from gaining unauthorized access to secured areas to securing employment or admissions under false pretences. In the case of ID cards, common presentation attacks involve forgery, counterfeiting techniques, photo substitution, tampering, and even the pretext of having lost one's ID card. On the other hand, educational certificate presentation attacks include utilizing diplomas from diploma mills, falsifying academic transcripts, resume fraud, and even compromising credential verification systems
Reference5 articles.
1. [1]. R. Lara, A. Valenzuela, D. Schulz, J. Tapia, and C. Busch, “Towards an efficient semantic segmentation method of ID cards for verification systems,” 2021, arXiv:2111.12764.
2. [2]. X. Zhu et al., “Large-scale bisample learning on ID versus spot face recognition,” Int. J. Comput. Vis., vol. 127, nos. 6–7, pp. 684–700, Jun. 2019.
3. [3]. T. Karras, M. Aittala, J. Hellsten, S. Laine, J. Lehtinen, and T. Aila, “Training generative adversarial networks with limited data,” in Proc. Adv. Neural Inf. Process. Syst., vol. 33, 2020, pp. 12104–12114.
4. [4]. Y. Shi and A. K. Jain, “DocFace: Matching ID document photos to selfies,” in Proc. IEEE 9th Int. Conf. Biometrics Theory, Appl. Syst. (BTAS), Oct. 2018, pp. 1–8.
5. [5]. S. Gonzalez, A. Valenzuela, and J. Tapia, “Hybrid two-stage architecture for tampering detection of chipless ID cards,” IEEE Trans. Biometrics, Behav., Identity Sci., vol. 3, no. 1, pp. 89–100, Jan. 2021.