Stegano-Morphing: Concealing Attacks on Face Identification Algorithms

被引:3
|
作者
Carabe, Luis [1 ]
Cermeno, Eduardo [2 ]
机构
[1] Autonomous Univ Madrid UAM, Dept Comp Sci, Madrid 28049, Spain
[2] Vaelsys, Dept Res, Madrid 28043, Spain
关键词
Face recognition; Feature extraction; Databases; Deep learning; Lighting; Three-dimensional displays; Generative adversarial networks; Access control; ArcFace; biometrics; deep learning; FaceNet; face recognition; identification; morphing; security; spoofing attack; RECOGNITION; NETWORKS; SYSTEMS;
D O I
10.1109/ACCESS.2021.3088786
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject's image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects' images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously.
引用
收藏
页码:100851 / 100867
页数:17
相关论文
共 46 条
  • [31] MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
    Damer, Naser
    Saladie, Alexandra Mosegui
    Braun, Andreas
    Kuijper, Arjan
    2018 IEEE 9TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2018,
  • [32] Realistic Dreams: Cascaded Enhancement of GAN-generated Images with an Example in Face Morphing Attacks
    Damer, Naser
    Boutros, Fadi
    Saladie, Alexandra Mosegui
    Kirchbuchner, Florian
    Kuijper, Arjan
    2019 IEEE 10TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2019,
  • [33] Hybrid algorithms of the person identification by face image
    Fazilov, Sh Kh
    Mirzaev, N. M.
    Radjabov, S. S.
    Mirzaeva, G. R.
    INTERNATIONAL CONFERENCE: INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY, 2019, 1333
  • [34] Time Attendance Using FELE Face Identification Algorithms
    Munlin, Mudarmeen
    2022 9TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ICEEE 2022), 2022, : 325 - 329
  • [35] Face Identification based Bio-Inspired Algorithms
    Ghouzali, Sanaa
    Larabi, Souad
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2020, 17 (01) : 118 - 127
  • [36] Potential advantages and limitations of using information fusion in media forensics—a discussion on the example of detecting face morphing attacks
    Christian Kraetzer
    Andrey Makrushin
    Jana Dittmann
    Mario Hildebrandt
    EURASIP Journal on Information Security, 2021
  • [37] Potential advantages and limitations of using information fusion in media forensics-a discussion on the example of detecting face morphing attacks
    Kraetzer, Christian
    Makrushin, Andrey
    Dittmann, Jana
    Hildebrandt, Mario
    EURASIP JOURNAL ON INFORMATION SECURITY, 2021, 2021 (01)
  • [38] Head poses and grimaces: Challenges for automated face identification algorithms?
    Urbanova, Petra
    Goldmann, Tomas
    Cerny, Dominik
    Drahansky, Martin
    SCIENCE & JUSTICE, 2024, 64 (04) : 421 - 442
  • [39] A Comparative Analysis of Face Recognition Algorithms in Solving the Problem of Visual Identification
    Vladimir, Gorbunov
    Dmitriy, Bobrikov
    Thet Naing Win
    Nyan Win Htet
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 666 - 668
  • [40] A unified framework for improving the accuracy of all holistic face identification algorithms
    Chen, Liang
    Tokuda, Naoyuki
    ARTIFICIAL INTELLIGENCE REVIEW, 2010, 33 (1-2) : 107 - 122