🤖 AI Summary
ICAO-compliant facial images—widely deployed in e-passports and digital identity systems—are highly standardized, rendering them vulnerable to face-swapping and deepfake attacks. Conventional presentation attack detection (PAD) offers only real-time protection and lacks post-capture integrity verification capabilities.
Method: This paper presents the first systematic evaluation of steganographic techniques for ICAO images and proposes a novel deep data-hiding framework that jointly embeds robust anti-tampering signals via digital watermarking and biometric-based security mechanisms—fully preserving ICAO compliance, security, and interoperability without altering standard image structure.
Contribution/Results: The method enables forensic, post-capture authenticity verification—addressing the traceability gap left by liveness detection alone. Comprehensive experiments quantify trade-offs among robustness, imperceptibility, capacity, and standard compliance, establishing a deployable technical pathway and practical paradigm for high-assurance identity verification systems.
📝 Abstract
ICAO-compliant facial images, initially designed for secure biometric passports, are increasingly becoming central to identity verification in a wide range of application contexts, including border control, digital travel credentials, and financial services. While their standardization enables global interoperability, it also facilitates practices such as morphing and deepfakes, which can be exploited for harmful purposes like identity theft and illegal sharing of identity documents. Traditional countermeasures like Presentation Attack Detection (PAD) are limited to real-time capture and offer no post-capture protection. This survey paper investigates digital watermarking and steganography as complementary solutions that embed tamper-evident signals directly into the image, enabling persistent verification without compromising ICAO compliance. We provide the first comprehensive analysis of state-of-the-art techniques to evaluate the potential and drawbacks of the underlying approaches concerning the applications involving ICAO-compliant images and their suitability under standard constraints. We highlight key trade-offs, offering guidance for secure deployment in real-world identity systems.