Stegano-Morphing: Concealing Attacks on Face Identification Algorithms

被引:3
|
作者
Carabe, Luis [1 ]
Cermeno, Eduardo [2 ]
机构
[1] Autonomous Univ Madrid UAM, Dept Comp Sci, Madrid 28049, Spain
[2] Vaelsys, Dept Res, Madrid 28043, Spain
关键词
Face recognition; Feature extraction; Databases; Deep learning; Lighting; Three-dimensional displays; Generative adversarial networks; Access control; ArcFace; biometrics; deep learning; FaceNet; face recognition; identification; morphing; security; spoofing attack; RECOGNITION; NETWORKS; SYSTEMS;
D O I
10.1109/ACCESS.2021.3088786
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject's image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects' images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously.
引用
收藏
页码:100851 / 100867
页数:17
相关论文
共 46 条
  • [21] Optimal-Landmark-Guided Image Blending for Face Morphing Attacks
    He, Qiaoyun
    Deng, Zongyong
    He, Zuyuan
    Zhao, Qijun
    2023 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS, IJCB, 2023,
  • [22] Evaluation of the Algorithms of Face Identification
    Hashemi, Seyyed Mohammad Reza
    Faridpour, Maryam
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1049 - 1052
  • [23] On the Robustness of Face Recognition Algorithms Against Attacks and Bias
    Singh, Richa
    Agarwal, Akshay
    Singh, Maneet
    Nagpal, Shruti
    Vatsa, Mayank
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 13583 - 13589
  • [24] Face morphing attack detection and attacker identification based on a watchlist
    Peng, Fei
    Qin, Le
    Long, Min
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2022, 107
  • [25] MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders
    Damer, Naser
    Fang, Meiling
    Siebke, Patrick
    Kolf, Jan Niklas
    Huber, Marco
    Boutros, Fadi
    2023 11TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS, IWBF, 2023,
  • [26] Detection of Face Morphing Attacks Based on Patch-Level Features and Lightweight Networks
    Long, Min
    Zhao, Xuan
    Zhang, Le-Bing
    Peng, Fei
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [27] Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation
    Qin L.
    Peng F.
    Venkatesh S.
    Ramachandra R.
    Long M.
    Busch C.
    IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 3 (01): : 72 - 88
  • [28] On the Generalization of Detecting Face Morphing Attacks as Anomalies: Novelty vs. Outlier Detection
    Damer, Naser
    Grebe, Jonas Henry
    Zienert, Steffen
    Kirchbuchner, Florian
    Kuijper, Arjan
    2019 IEEE 10TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2019,
  • [29] A Multi-detector Solution Towards an Accurate and Generalized Detection of Face Morphing Attacks
    Damer, Naser
    Zienert, Steffen
    Wainakh, Yaza
    Saladie, Alexandra Mosegui
    Kirchbuchner, Florian
    Kuijper, Arjan
    2019 22ND INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION 2019), 2019,
  • [30] ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation
    Damer, Naser
    Raja, Kiran
    Suessmilch, Marius
    Venkatesh, Sushma
    Boutros, Fadi
    Fang, Meiling
    Kirchbuchner, Florian
    Ramachandra, Raghavendra
    Kuijper, Arjan
    ADVANCES IN VISUAL COMPUTING (ISVC 2021), PT I, 2021, 13017 : 251 - 264