Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
Entity
UAM. Departamento de Ingeniería InformáticaPublisher
Institute of Electrical and Electronics Engineers Inc. (IEEE)Date
2021-06-14Citation
10.1109/ACCESS.2021.3088786
L. Cárabe and E. Cermeño, "Stegano-Morphing: Concealing Attacks on Face Identification Algorithms," in IEEE Access, vol. 9, pp. 100851-100867, 2021
ISSN
2169-3536 (online)DOI
10.1109/ACCESS.2021.3088786Funded by
This work was supported by the Consejería De Ciencia, Universidad e Innovación, Comunidad de MadridEditor's Version
https://doi.org/10.1109/ACCESS.2021.3088786Subjects
Access control; ArcFace; biometrics; deep learning; face recognition; FaceNet; identification; morphing; security; spoofing attack; InformáticaNote
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other worksRights
© The author(s)Abstract
Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject's image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects' images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously
Files in this item
Google Scholar:Carabe, Luis
-
Cermeno, Eduardo
This item appears in the following Collection(s)
Related items
Showing items related by title, author, creator and subject.
-
Stegano-morphing: Concealing attacks on face identification algorithms
Cárabe Fernández-Pedraza, Luis
2021-04 -
Optimal serverless networks attacks, complexity and some approximate algorithms
Aguirre, Carlos; Huerta, Ramón; Tsimring, Lev
2008-08-01