Universal Adversarial Spoofing Attacks against Face Recognition

被引:3
|
作者
Amada, Takuma [1 ]
Liew, Seng Pei [1 ,2 ]
Kakizaki, Kazuya [1 ]
Araki, Toshinori [1 ]
机构
[1] NEC Corp Ltd, Minato Ku, 7-1 Shiba,5 Chome, Tokyo 1088001, Japan
[2] LINE Corp, Tokyo, Japan
关键词
D O I
10.1109/IJCB52358.2021.9484380
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We assess the vulnerabilities of deep face recognition systems for images that falsify/spoof multiple identities simultaneously. We demonstrate that, by manipulating the deep feature representation extracted from a face image via imperceptibly small perturbations added at the pixel level using our proposed method, one can fool a face verification system into recognizing that the face image belongs to multiple different identities with a high success rate. One characteristic of the UAXs crafted with our method is that they are universal (identity-agnostic); they are successful even against identities not known in advance. For a certain deep neural network, we show that we are able to spoof almost all tested identities (99%), including those not known beforehand (not included in training). Our results indicate that a multiple-identity attack is a real threat and should be taken into account when deploying face recognition systems.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Adversarial Attacks Against Face Recognition: A Comprehensive Study
    Vakhshiteh, Fatemeh
    Nickabadi, Ahmad
    Ramachandra, Raghavendra
    [J]. IEEE ACCESS, 2021, 9 : 92735 - 92756
  • [2] Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability
    Zhang, Bowen
    Tondi, Benedetta
    Barni, Mauro
    [J]. COMPUTER VISION AND IMAGE UNDERSTANDING, 2020, 197
  • [3] On the Defense of Spoofing Countermeasures Against Adversarial Attacks
    Nguyen-Vu, Long
    Doan, Thien-Phuc
    Bui, Mai
    Hong, Kihun
    Jung, Souhwan
    [J]. IEEE ACCESS, 2023, 11 : 94563 - 94574
  • [4] Adversarial attacks by attaching noise markers on the face against deep face recognition
    Ryu, Gwonsang
    Park, Hosung
    Choi, Daeseon
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [5] Guest Editorial: Face Recognition and Spoofing Attacks
    Correia, Paulo Lobato
    Hadid, Abdenour
    [J]. IET BIOMETRICS, 2018, 7 (01) : 1 - 2
  • [6] DEFENSE AGAINST ADVERSARIAL ATTACKS ON SPOOFING COUNTERMEASURES OF ASV
    Wu, Haibin
    Liu, Songxiang
    Meng, Helen
    Lee, Hung-yi
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 6564 - 6568
  • [7] Detection of Face Recognition Adversarial Attacks
    Massoli, Fabio Valerio
    Carrara, Fabio
    Amato, Giuseppe
    Falchi, Fabrizio
    [J]. COMPUTER VISION AND IMAGE UNDERSTANDING, 2021, 202
  • [8] Artificial Immune System of Secure Face Recognition Against Adversarial Attacks
    Ren, Min
    Wang, Yunlong
    Zhu, Yuhao
    Huang, Yongzhen
    Sun, Zhenan
    Li, Qi
    Tan, Tieniu
    [J]. INTERNATIONAL JOURNAL OF COMPUTER VISION, 2024,
  • [9] Motion-based countermeasure against photo and video spoofing attacks in face recognition
    Edmunds, Taiamiti
    Caplier, Alice
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 50 : 314 - 332
  • [10] ON THE VULNERABILITY OF FACE RECOGNITION SYSTEMS TO SPOOFING MASK ATTACKS
    Kose, Neslihan
    Dugelay, Jean-Luc
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 2357 - 2361