DepthFake: Spoofing 3D Face Authentication with a 2D Photo

被引:2
|
作者
Wu, Zhihao [1 ]
Cheng, Yushi [2 ]
Yang, Jiahui [1 ]
Ji, Xiaoyu [1 ]
Xu, Wenyuan [1 ]
机构
[1] Zhejiang Univ, Ubiquitous Syst Secur Lab USSLAB, Hangzhou, Peoples R China
[2] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol BNRis, Beijing, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
ADVERSARIAL ATTACK; RECOGNITION;
D O I
10.1109/SP46215.2023.10179429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face authentication has been widely used in access control, and the latest 3D face authentication systems employ 3D liveness detection techniques to cope with the photo replay attacks, whereby an attacker uses a 2D photo to bypass the authentication. In this paper, we analyze the security of 3D liveness detection systems that utilize structured light depth cameras and discover a new attack surface against 3D face authentication systems. We propose DepthFake attacks that can spoof a 3D face authentication using only one single 2D photo. To achieve this goal, DepthFake first estimates the 3D depth information of a target victim's face from his 2D photo. Then, DepthFake projects the carefully-crafted scatter patterns embedded with the face depth information, in order to empower the 2D photo with 3D authentication properties. We overcome a collection of practical challenges, e.g., depth estimation errors from 2D photos, depth images forgery based on structured light, the alignment of the RGB image and depth images for a face, and implemented DepthFake in laboratory setups. We validated DepthFake on 3 commercial face authentication systems (i.e., Tencent Cloud, Baidu Cloud, and 3DiVi) and one commercial access control device. The results over 50 users demonstrate that DepthFake achieves an overall Depth attack success rate of 79:4% and RGB-D attack success rate of 59:4% in the real world.
引用
收藏
页码:917 / 933
页数:17
相关论文
共 50 条
  • [31] A Case for the Average-Half-Face in 2D and 3D for Face Recognition
    Harguess, Josh
    Aggarwal, J. K.
    2009 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPR WORKSHOPS 2009), VOLS 1 AND 2, 2009, : 624 - 629
  • [32] Automatic and robust 2D/3D human face landmarking
    Akakin, Hatice Cinar
    Sankur, Buelent
    2007 IEEE 15TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS, VOLS 1-3, 2007, : 527 - 530
  • [33] Towards 3D face model from 2D view
    Skarbek, W
    Ignasiak, K
    Morgos, M
    Tomaszewski, M
    INTELLIGENT MEDIA TECHNOLOGY FOR COMMUNICATIVE INTELLIGENCE, 2005, 3490 : 158 - 162
  • [34] Face recognition by matching 2D and 3D geodesic distances
    Berretti, S.
    Del Bimbo, A.
    Pala, P.
    Mata, F. J. Silva
    MULTIMEDIA CONTENT ANALYSIS AND MINING, PROCEEDINGS, 2007, 4577 : 444 - +
  • [35] 3D AND 2D FACE RECOGNITION BASED ON IMAGE SEGMENTATION
    Belahcene, M.
    Chouchane, A.
    Benatia, M. Amin
    Halitim, M.
    2014 INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE FOR MULTIMEDIA UNDERSTANDING (IWCIM), 2014,
  • [36] Face recognition based on 2D and 3D data fusion
    Krotewicz, Pawel
    Sankowski, Wojciech
    Nowak, Piotr Stefan
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2015, 7 (01) : 69 - 81
  • [37] A critical assessment of 2D and 3D face recognition algorithms
    Giorgi, D.
    Attene, M.
    Patane, G.
    Marini, S.
    Pizzi, C.
    Biasotti, S.
    Spagnuolo, M.
    Falcidieno, B.
    Corvi, M.
    Usai, L.
    Roncarolo, L.
    Garibotto, G.
    AVSS: 2009 6TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE, 2009, : 79 - +
  • [38] 2D versus 3D colour space face detection
    Kovac, J
    Peer, P
    Solina, F
    PROCEEDINGS EC-VIP-MC 2003, VOLS 1 AND 2, 2003, : 449 - 454
  • [39] 2D and 3D face recognition using multiple transformation
    Department of Electronics and Communication, College of Engineering Kidangoor, Kottayam-686583, Kerala, India
    不详
    Adv Model Anal B, 2009, 1-2 (25-41):
  • [40] Face recognition from 2D and 3D images using 3D Gabor filters
    Wang, YJ
    Chua, CS
    IMAGE AND VISION COMPUTING, 2005, 23 (11) : 1018 - 1028