Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability

被引:41
作者
Zhang, Bowen [1 ]
Tondi, Benedetta [2 ]
Barni, Mauro [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, 266 Xinglong Sect Xifeng Rd, Xian 710126, Shaanxi, Peoples R China
[2] Univ Siena, Dept Informat Engn & Math, Via Roma 56, I-53100 Siena, Italy
关键词
Adversarial examples; Anti-spoofing; Physical domain adversarial examples; Presentation attack; Face authentication;
D O I
10.1016/j.cviu.2020.102988
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the race of arms between attackers, trying to build more and more realistic face replay attacks, and defenders, deploying spoof detection modules with ever-increasing capabilities, CNN-based methods have shown outstanding detection performance thus raising the bar for the construction of realistic replay attacks against face-based authentication systems. Rather than trying to rebroadcast even more realistic faces, we show that attackers can successfully fool a face authentication system equipped with a deep learning spoof detection module, by exploiting the vulnerabilities of CNNs to adversarial perturbations. We first show that mounting such an attack is not a trivial task due to the unique features of spoofing detection modules. Then, we propose a method to craft adversarial images that can be successfully exploited to build an effective replay attack. Experiments conducted on the REPLAY-MOBILE database demonstrate that our attacked images achieve good performance against a face recognition system equipped with CNN-based anti-spoofing, in that they are able to pass the face detection, spoof detection and face recognition modules of the authentication chain.
引用
收藏
页数:10
相关论文
共 45 条
[1]  
Agarwal S, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), P1997, DOI 10.1109/ICASSP.2018.8462205
[2]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[3]  
[Anonymous], 2016, P INT C BIOMETRICS S
[4]  
[Anonymous], 2015, ARXIV151106292, DOI 10.48550/arXiv.1511.06292
[5]  
[Anonymous], 2014, ABS14085601 CORR
[6]  
[Anonymous], 2017, 2017 19 INT C TRANSP, DOI [DOI 10.1109/ICTON.2017.8024849, 10.1109/ICTON.2017.8024849]
[7]  
Athalye A, 2017, ARXIV PREPRINT ARXIV
[8]  
Atoum Y, 2017, 2017 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB), P319, DOI 10.1109/BTAS.2017.8272713
[9]   Wild patterns: Ten years after the rise of adversarial machine learning [J].
Biggio, Battista ;
Roli, Fabio .
PATTERN RECOGNITION, 2018, 84 :317-331
[10]  
Carlini N., 2017, P AISEC, P3