Stegano-Morphing: Concealing Attacks on Face Identification Algorithms

被引:3
|
作者
Carabe, Luis [1 ]
Cermeno, Eduardo [2 ]
机构
[1] Autonomous Univ Madrid UAM, Dept Comp Sci, Madrid 28049, Spain
[2] Vaelsys, Dept Res, Madrid 28043, Spain
关键词
Face recognition; Feature extraction; Databases; Deep learning; Lighting; Three-dimensional displays; Generative adversarial networks; Access control; ArcFace; biometrics; deep learning; FaceNet; face recognition; identification; morphing; security; spoofing attack; RECOGNITION; NETWORKS; SYSTEMS;
D O I
10.1109/ACCESS.2021.3088786
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject's image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects' images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously.
引用
收藏
页码:100851 / 100867
页数:17
相关论文
共 46 条
  • [1] Face Morphing Attacks: A Threat to eLearning?
    Rathgeb, Christian
    Poeppelmann, Katrin
    Busch, Christoph
    PROCEEDINGS OF THE 2021 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON), 2021, : 1155 - 1160
  • [2] Generation and Detection of Face Morphing Attacks
    Hamza, Muhammad
    Tehsin, Samabia
    Karamti, Hanen
    Alghamdi, Norah Saleh
    IEEE ACCESS, 2022, 10 : 72557 - 72576
  • [3] Hierarchical Generative Network for Face Morphing Attacks
    He, Zuyuan
    Deng, Zongyong
    He, Qiaoyun
    Zhao, Qijun
    2024 IEEE 18TH INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION, FG 2024, 2024,
  • [4] Detection of Face Morphing Attacks by Deep Learning
    Seibold, Clemens
    Samek, Wojciech
    Hilsmann, Anna
    Eisert, Peter
    DIGITAL FORENSICS AND WATERMARKING, 2017, 10431 : 107 - 120
  • [5] Preventing face morphing attacks by using legacy face images
    Batskos, Ilias
    de Wit, Florens F.
    Spreeuwers, Luuk J.
    Veldhuis, Raymond J.
    IET BIOMETRICS, 2021, 10 (04) : 430 - 440
  • [6] Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality
    Fu, Biying
    Damer, Naser
    IET BIOMETRICS, 2022, 11 (05) : 359 - 382
  • [7] Face morphing attacks: Investigating detection with humans and computers
    Kramer, Robin S. S.
    Mireku, Michael O.
    Flack, Tessa R.
    Ritchie, Kay L.
    COGNITIVE RESEARCH-PRINCIPLES AND IMPLICATIONS, 2019, 4 (1)
  • [8] Detecting Morphing Attacks through Face Geometry Features
    Autherith, Stephanie
    Pasquini, Cecilia
    JOURNAL OF IMAGING, 2020, 6 (11)
  • [9] Quadruplet Loss For Improving the Robustness to Face Morphing Attacks
    Medvedev, Iurii
    Goncalves, Nuno
    12TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS, IWBF 2024, 2024,
  • [10] Detection of Face Morphing Attacks Based on PRNU Analysis
    Scherhag U.
    Debiasi L.
    Rathgeb C.
    Busch C.
    Uhl A.
    IEEE Transactions on Biometrics, Behavior, and Identity Science, 2019, 1 (04): : 302 - 317