Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability

被引:35
作者
Zhang, Bowen [1 ]
Tondi, Benedetta [2 ]
Barni, Mauro [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, 266 Xinglong Sect Xifeng Rd, Xian 710126, Shaanxi, Peoples R China
[2] Univ Siena, Dept Informat Engn & Math, Via Roma 56, I-53100 Siena, Italy
关键词
Adversarial examples; Anti-spoofing; Physical domain adversarial examples; Presentation attack; Face authentication;
D O I
10.1016/j.cviu.2020.102988
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the race of arms between attackers, trying to build more and more realistic face replay attacks, and defenders, deploying spoof detection modules with ever-increasing capabilities, CNN-based methods have shown outstanding detection performance thus raising the bar for the construction of realistic replay attacks against face-based authentication systems. Rather than trying to rebroadcast even more realistic faces, we show that attackers can successfully fool a face authentication system equipped with a deep learning spoof detection module, by exploiting the vulnerabilities of CNNs to adversarial perturbations. We first show that mounting such an attack is not a trivial task due to the unique features of spoofing detection modules. Then, we propose a method to craft adversarial images that can be successfully exploited to build an effective replay attack. Experiments conducted on the REPLAY-MOBILE database demonstrate that our attacked images achieve good performance against a face recognition system equipped with CNN-based anti-spoofing, in that they are able to pass the face detection, spoof detection and face recognition modules of the authentication chain.
引用
收藏
页数:10
相关论文
共 45 条
  • [1] Agarwal S, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), P1997, DOI 10.1109/ICASSP.2018.8462205
  • [2] Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    [J]. IEEE ACCESS, 2018, 6 : 14410 - 14430
  • [3] [Anonymous], 2016, P INT C BIOMETRICS S
  • [4] [Anonymous], 2014, ABS14085601 CORR
  • [5] [Anonymous], 2017, Agonistic Mourning: Political Dissidence and the Women in Black
  • [6] [Anonymous], 1985, SOURCE BOOK MATH
  • [7] [Anonymous], 2017, 2017 19 INT C TRANSP, DOI [DOI 10.1109/ICTON.2017.8024849, 10.1109/ICTON.2017.8024849]
  • [8] Atoum Y, 2017, 2017 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB), P319, DOI 10.1109/BTAS.2017.8272713
  • [9] Bengio S., 2017, P ICLR
  • [10] Bethge M, 2017, P REL MACH LEARN WIL, DOI DOI 10.21105/JOSS.02607