Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
EntityUAM. Departamento de Ingeniería Informática
PublisherInstitute of Electrical and Electronics Engineers Inc. (IEEE)
10.1109/ACCESS.2021.3088786L. Cárabe and E. Cermeño, "Stegano-Morphing: Concealing Attacks on Face Identification Algorithms," in IEEE Access, vol. 9, pp. 100851-100867, 2021
Funded byThis work was supported by the Consejería De Ciencia, Universidad e Innovación, Comunidad de Madrid
SubjectsAccess control; ArcFace; biometrics; deep learning; face recognition; FaceNet; identification; morphing; security; spoofing attack; Informática
Note© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works
Rights© The author(s)
Esta obra está bajo una Licencia Creative Commons Atribución 4.0 Internacional.
Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject's image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects' images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously
Google Scholar:Carabe, Luis - Cermeno, Eduardo
This item appears in the following Collection(s)
Showing items related by title, author, creator and subject.
Stegano-morphing: Concealing attacks on face identification algorithms Cárabe Fernández-Pedraza, Luis
Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm
Optimal serverless networks attacks, complexity and some approximate algorithms Aguirre, Carlos; Huerta, Ramón; Tsimring, Lev