DepthFake: Spoofing 3D Face Authentication with a 2D Photo

被引:2
|
作者
Wu, Zhihao [1 ]
Cheng, Yushi [2 ]
Yang, Jiahui [1 ]
Ji, Xiaoyu [1 ]
Xu, Wenyuan [1 ]
机构
[1] Zhejiang Univ, Ubiquitous Syst Secur Lab USSLAB, Hangzhou, Peoples R China
[2] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol BNRis, Beijing, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
ADVERSARIAL ATTACK; RECOGNITION;
D O I
10.1109/SP46215.2023.10179429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face authentication has been widely used in access control, and the latest 3D face authentication systems employ 3D liveness detection techniques to cope with the photo replay attacks, whereby an attacker uses a 2D photo to bypass the authentication. In this paper, we analyze the security of 3D liveness detection systems that utilize structured light depth cameras and discover a new attack surface against 3D face authentication systems. We propose DepthFake attacks that can spoof a 3D face authentication using only one single 2D photo. To achieve this goal, DepthFake first estimates the 3D depth information of a target victim's face from his 2D photo. Then, DepthFake projects the carefully-crafted scatter patterns embedded with the face depth information, in order to empower the 2D photo with 3D authentication properties. We overcome a collection of practical challenges, e.g., depth estimation errors from 2D photos, depth images forgery based on structured light, the alignment of the RGB image and depth images for a face, and implemented DepthFake in laboratory setups. We validated DepthFake on 3 commercial face authentication systems (i.e., Tencent Cloud, Baidu Cloud, and 3DiVi) and one commercial access control device. The results over 50 users demonstrate that DepthFake achieves an overall Depth attack success rate of 79:4% and RGB-D attack success rate of 59:4% in the real world.
引用
收藏
页码:917 / 933
页数:17
相关论文
共 50 条
  • [1] Spoofing 2D Face Recognition Systems with 3D Masks
    Erdogmus, Nesli
    Marcel, Sebastien
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG 2013), 2013,
  • [2] Spoofing in 2D Face Recognition with 3D Masks and Anti-spoofing with Kinect
    Erdogmus, Nesli
    Marcel, Sebastien
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2013,
  • [3] Integration of 2D and 3D images for enhanced face authentication
    Tsalakanidou, F
    Malassiotis, S
    Strintzis, MG
    SIXTH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION, PROCEEDINGS, 2004, : 266 - 271
  • [4] Multi-Modal Spoofing Attacks on 3D Face Liveness Detection via a Single 2D Photo
    Wu, Zhihao
    Cheng, Yushi
    Ji, Xiaoyu
    Xu, Wenyuan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1551 - 1566
  • [5] A Novel Approach for Biometric Authentication System Using Ear, 2D Face and 3D Face Modalities
    Boggaram, Achyut Sarma
    Mallampalli, Pujitha Raj
    Muthyala, Chandrasekhar Reddy
    Manjusha, R.
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 1, CIDM 2015, 2016, 410 : 1 - 11
  • [6] Robust multimodal 2D and 3D face authentication using local feature fusion
    A. Ouamane
    M. Belahcene
    A. Benakcha
    S. Bourennane
    A. Taleb-Ahmed
    Signal, Image and Video Processing, 2016, 10 : 129 - 137
  • [7] Robust multimodal 2D and 3D face authentication using local feature fusion
    Ouamane, A.
    Belahcene, M.
    Benakcha, A.
    Bourennane, S.
    Taleb-Ahmed, A.
    SIGNAL IMAGE AND VIDEO PROCESSING, 2016, 10 (01) : 129 - 137
  • [8] Spoofing Face Recognition With 3D Masks
    Erdogmus, Nesli
    Marcel, Sebastien
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1084 - 1097
  • [9] 2D and 3D face recognition: A survey
    Abate, Andrea F.
    Nappi, Michele
    Riccio, Daniel
    Sabatino, Gabriele
    PATTERN RECOGNITION LETTERS, 2007, 28 (14) : 1885 - 1906
  • [10] 2D/3D VIRTUAL FACE MODELING
    Chung, SoonKee
    Bazin, Jean-Charles
    Kweon, Inso
    2011 18TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2011, : 1097 - 1100