Stegano-Morphing: Concealing Attacks on Face Identification Algorithms

被引:3
作者
Carabe, Luis [1 ]
Cermeno, Eduardo [2 ]
机构
[1] Autonomous Univ Madrid UAM, Dept Comp Sci, Madrid 28049, Spain
[2] Vaelsys, Dept Res, Madrid 28043, Spain
关键词
Face recognition; Feature extraction; Databases; Deep learning; Lighting; Three-dimensional displays; Generative adversarial networks; Access control; ArcFace; biometrics; deep learning; FaceNet; face recognition; identification; morphing; security; spoofing attack; RECOGNITION; NETWORKS; SYSTEMS;
D O I
10.1109/ACCESS.2021.3088786
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject's image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects' images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously.
引用
收藏
页码:100851 / 100867
页数:17
相关论文
共 72 条
  • [1] Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
  • [2] Agrawal A., 2016, INT J COMPUT APPL TE, V5, P156
  • [3] Evaluation of Face Recognition Methods in Unconstrained Environments
    Agrawal, Amrit Kumar
    Singh, Yogendra Narain
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 644 - 651
  • [4] Face description with local binary patterns:: Application to face recognition
    Ahonen, Timo
    Hadid, Abdenour
    Pietikainen, Matti
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2006, 28 (12) : 2037 - 2041
  • [5] [Anonymous], HKU U ARTS UTRECHT
  • [6] [Anonymous], 2006, CVPRW '06: Proc. 2006 CVPR Workshops, DOI DOI 10.1109/CVPRW.2006.149
  • [7] Face recognition by independent component analysis
    Bartlett, MS
    Movellan, JR
    Sejnowski, TJ
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2002, 13 (06): : 1450 - 1464
  • [8] Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection
    Belhumeur, PN
    Hespanha, JP
    Kriegman, DJ
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1997, 19 (07) : 711 - 720
  • [9] Bradski G., 2008, Learning OpenCV: Computer vision with the OpenCV library
  • [10] VGGFace2: A dataset for recognising faces across pose and age
    Cao, Qiong
    Shen, Li
    Xie, Weidi
    Parkhi, Omkar M.
    Zisserman, Andrew
    [J]. PROCEEDINGS 2018 13TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE & GESTURE RECOGNITION (FG 2018), 2018, : 67 - 74