Stegano-Morphing: Concealing Attacks on Face Identification Algorithms

被引:3
|
作者
Carabe, Luis [1 ]
Cermeno, Eduardo [2 ]
机构
[1] Autonomous Univ Madrid UAM, Dept Comp Sci, Madrid 28049, Spain
[2] Vaelsys, Dept Res, Madrid 28043, Spain
关键词
Face recognition; Feature extraction; Databases; Deep learning; Lighting; Three-dimensional displays; Generative adversarial networks; Access control; ArcFace; biometrics; deep learning; FaceNet; face recognition; identification; morphing; security; spoofing attack; RECOGNITION; NETWORKS; SYSTEMS;
D O I
10.1109/ACCESS.2021.3088786
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject's image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects' images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously.
引用
收藏
页码:100851 / 100867
页数:17
相关论文
共 46 条
  • [41] Comparison System of Face Identification Algorithms under Application-specific
    Zhao, Jian-feng
    Zeng, Wen-hua
    Liu, Min
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 2072 - +
  • [42] The relative use of fixated and peripheral information in face identification tasks: a gaze-contingent morphing approach.
    Van Belle, G.
    Laguesse, R.
    Rossion, B.
    PERCEPTION, 2014, 43 (01) : 73 - 73
  • [43] Adversarial Attacks on Face Detection Algorithms Using Anti-facial Recognition T-Shirts
    Lyko, Ewa
    Kedziora, Michal
    ADVANCES IN COMPUTATIONAL COLLECTIVE INTELLIGENCE (ICCCI 2021), 2021, 1463 : 266 - 277
  • [44] Microcontroller-Based Face Recognition Using Combinations of Morphing Algorithms of Beier-Neely, Delaunay Triangulation and Alpha Blending
    Balbin, Jessie R.
    Sejera, Marianne M.
    Halili, Mark P.
    Pontino, Angela A.
    Montealegre, Earl P.
    Ramirez, Glazy P.
    THIRD INTERNATIONAL WORKSHOP ON PATTERN RECOGNITION, 2018, 10828
  • [45] Face morph detection for unknown morphing algorithms and image sources: a multi-scale block local binary pattern fusion approach
    Scherhag, Ulrich
    Kunze, Jonas
    Rathgeb, Christian
    Busch, Christoph
    IET BIOMETRICS, 2020, 9 (06) : 278 - 289
  • [46] Application of back propagation algorithms in neural network based identification responses of AISI 316 face milling cryogenic machining technique
    Rao, Karthik M. C.
    Malghan, Rashmi L.
    Shettigar, Arun Kumar
    Rao, Shrikantha S.
    Herbert, Mervin A.
    AUSTRALIAN JOURNAL OF MECHANICAL ENGINEERING, 2022, 20 (03) : 698 - 705