Close Menu
  • Home
  • Higher ED
  • News
  • Regulations
    • U.S. State Privacy Legislation
    • General Data Protection Regulation
    • New York Privacy Act
    • California Privacy Rights Act/California Consumer Privacy Act
  • AI
    • AI – Info Tech News
    • Fordham Artificial Intelligence for Faculty and Staff
    • How Emory University Accelerated AI Research in the Cloud
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Facebook X (Twitter) Instagram
Trending
  • NIST Releases Article to Combat Face Morph Detection
  • National Vulnerability Database Discovers Three Vulnerabilities That Leave 10,000 WordPress Websites At Risk of Exploitation
  • Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort
  • U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor
  • Beyond Goodbye: Safeguarding Employee Data Privacy After Death
  • AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk
  • Are You Ready for Web 3?
  • Stay Ahead of Scammers in 2025
Facebook X (Twitter) Instagram
Privacy at Fordham University
  • Home
  • Higher ED

    Strengthening Website Security in Higher Education: Lessons from the FTC’s GoDaddy Settlement

    January 21, 2025

    Merging AI Innovation with IT Expertise in Risk Management

    January 6, 2025

    Staff Highlight – Marc Herzog

    January 3, 2025

    Staff Highlight – Shannon Ortiz

    January 2, 2025

    AI Guidance in Schools

    October 4, 2024
  • News
  • Regulations
    1. U.S. State Privacy Legislation
    2. General Data Protection Regulation
    3. New York Privacy Act
    4. California Privacy Rights Act/California Consumer Privacy Act
    Featured

    Reauthorized Section 702 of the Foreign Intelligence Surveillance Act

    By Josephine Law, FIP, CIPP/US, CIPMApril 22, 20242 Mins Read
    Recent

    U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor

    February 21, 2025

    Beyond Goodbye: Safeguarding Employee Data Privacy After Death

    February 19, 2025

    Opt-In or Opt-Out, Does it Matter?

    January 20, 2025
  • AI
    1. AI – Info Tech News
    2. Fordham Artificial Intelligence for Faculty and Staff
    3. How Emory University Accelerated AI Research in the Cloud
    Featured

    Merging AI Innovation with IT Expertise in Risk Management

    By Josephine Law, FIP, CIPP/US, CIPMJanuary 6, 20251 Min Read
    Recent

    NIST Releases Article to Combat Face Morph Detection

    August 27, 2025

    Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort

    July 22, 2025

    AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk

    February 19, 2025
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Privacy at Fordham University
You are at:Home»AI»NIST Releases Article to Combat Face Morph Detection
AI

NIST Releases Article to Combat Face Morph Detection

Vincent Fermo, GSAS '26By Vincent Fermo, GSAS '26August 27, 2025No Comments3 Mins Read
Example of a Face Morph
Share
Facebook Twitter LinkedIn Pinterest Copy Link

NIST, the National Institute of Standards and Technology, recently published an article that demonstrated how face morphing software is used to commit identity fraud. This software combines two photos of different people into a singular image. If given to the wrong hands, a bad actor could potentially bypass identity verification systems in secure locations such as airports or at country borders. These photos have the ability to deceive face recognition systems, misidentifying the image as both individuals, allowing an individual to pose as both the first and second individual.

Face Analysis Technology Evaluation Morph

NIST released Face Analysis Technology Evaluation (FATE) Morph to help combat this ongoing issue. By building awareness of this issue, NIST can effectively guide organizations to detect morphing where photograph identification is a concern. The article contains guidelines for possible remediation strategies if a morphed photograph is detected. While the single image detection model posts an accuracy of 100% with a false detection rate of 1% on single image detection, detection accuracy can drop to 40% with morphed photos generated by software not recognized by FATE. Differential detectors provide an accuracy ranging between 72% and 90% across morphs that are created with open-source and closed-source morphing software. The difference between the detectors is explained below.

S-MAD (Single Image Morph Attack Detectors)

S-MAD operates on a suspected morphed photograph. This detector applies image processing and pattern classification techniques to detect blemishes and artifacts that are created as a result of morphing images.

D-MAD (Differential Morph Attack Detectors)

D-MAD operates on a suspected morph and a genuine photo for comparison. These detectors are more consistent because they are built using technology that is primarily used for face recognition.

The Potential Future of Morph Detection

As technology becomes more advanced, bad actors could leverage artificial intelligence to develop more realistic face morphs that can continue to deceive detection tools. Although the detection software is continuously improving, so is the sophistication of open and closed source face morphing software. Bad actors could potentially target the detection vulnerabilities of the software. For example, a bad actor could add or remove certain artifacts from a morphed image to bypass software detection standards. It is important to note that the best procedure for investigating a potential morph includes a combination of human review, the use of automated tools, and a specific process to review suspected morphs.

How to Remain Safe From Morphs

  • Require candidates and employees to take identification pictures on-site to prevent any chance for alteration
  • Deploying automated morph detection in secure areas can significantly reduce the risk of unauthorized personnel accessing a secure area
  • Train and educate users to detect certain artifacts or blemishes within a suspected morphed image

Sources:

https://www.nist.gov/news-events/news/2025/08/nist-guidelines-can-help-organizations-detect-face-photo-morphs-deter

https://pages.nist.gov/frvt/reports/morph/fate_morph_4B_NISTIR_8584.pdf

 

AI artificial intelligence nist privacy Security
Vincent Fermo, GSAS '26

I am a Cybersecurity graduate student set to graduate from the Graduate School of Arts and Sciences at Lincoln Center in 2026.

Related Posts

National Vulnerability Database Discovers Three Vulnerabilities That Leave 10,000 WordPress Websites At Risk of Exploitation

August 5, 2025

Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort

July 22, 2025

U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor

February 21, 2025
Privacy
  • Data Privacy FAQs
  • Your Privacy Questions Answered
  • Visions of Privacy
Search
Categories
  • AI (79)
  • CCPA (9)
  • GDPR (20)
  • Higher ED (25)
  • New Jersey Privacy (2)
  • New Jersey Privacy Law (2)
  • New York Privacy Act (7)
  • News (190)
  • Privacy (174)
  • Regulations (65)
Archives

Fordham University - The Jesuit University of New York

Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.
Copyright © Fordham University
Facebook X (Twitter) Instagram YouTube LinkedIn
© 2025 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.