Filters








68,407 Hits in 3.4 sec

Master Face Attacks on Face Recognition Systems [article]

Huy H. Nguyen, Sébastien Marcel, Junichi Yamagishi, Isao Echizen
2021 arXiv   pre-print
We run an LVE algorithm for various scenarios and with more than one database and/or face recognition system to study the properties of the master faces and to understand in which conditions strong master  ...  Previous work has proven the existence of master faces, i.e., faces that match multiple enrolled templates in face recognition systems, and their existence extends the ability of presentation attacks.  ...  Amir Mohammadi of the Biometrics Security and Privacy (BSP) group at the Idiap Research Institute for providing the pre-trained face recognition systems and for their support with the Bob toolkit.  ... 
arXiv:2109.03398v1 fatcat:unrp5tkh3nbibnpzlu2su2p47y

Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems [article]

Huy H. Nguyen, Junichi Yamagishi, Isao Echizen, Sébastien Marcel
2020 arXiv   pre-print
In this work, we demonstrated that wolf (generic) faces, which we call "master faces," can also compromise face recognition systems and that the master face concept can be generalized in some cases.  ...  Experiments demonstrated that even attackers with limited resources using only pre-trained models available on the Internet can initiate master face attacks.  ...  Amir Mohammadi from Biometrics Security and Privacy (BSP) group at Idiap for providing the pre-trained face recognition systems and for their supports on Bob toolkit.  ... 
arXiv:2006.08376v1 fatcat:nke4tkpwkfadrjp4gb2sr7j3le

Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems

Huy H. Nguyen, Junichi Yamagishi, Isao Echizen, Sebastien Marcel
2020 2020 IEEE International Joint Conference on Biometrics (IJCB)  
In this work, we demonstrated that wolf (generic) faces, which we call "master faces," can also compromise face recognition systems and that the master face concept can be generalized in some cases.  ...  Experiments demonstrated that even attackers with limited resources using only pre-trained models available on the Internet can initiate master face attacks.  ...  Amir Mohammadi from Biometrics Security and Privacy (BSP) group at Idiap for providing the pre-trained face recognition systems and for their supports on Bob toolkit.  ... 
doi:10.1109/ijcb48548.2020.9304893 fatcat:3vnkziaz4nacpiuse3ied4audq

Anti Facial Spoof By Using Lytro's LFC

T. Silpasree, N.Dilip Kumar
2016 IOSR Journal of Engineering  
The liability of the face recognition systems in the biometrics is a growing concern today, as still it remains vulnerable to the various sophisticated attacks that in determined the reliability of biometric  ...  In this paper, we present a novel approach which accurately detects and mitigates the spoof attacks on the face by introducing a new Lytro called light field camera (LFC), also known as Plenoptic camera  ...  This approach introduces three biometric techniques which are face recognition, fingerprint recognition, and the iris recognition and also introduces the attacks on the system and by using Image Quality  ... 
doi:10.9790/3021-067023540 fatcat:pjtpvtiukzhq7odpbyxqszvfqq

Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution [article]

Ron Shmelkin, Tomer Friedlander, Lior Wolf
2021 arXiv   pre-print
The results we present demonstrate that it is possible to obtain a high coverage of the LFW identities (over 40%) with less than 10 master faces, for three leading deep face recognition systems.  ...  A master face is a face image that passes face-based identity-authentication for a large portion of the population.  ...  INTRODUCTION In dictionary attacks, one attempts to pass an authentication system by sequentially trying multiple inputs.  ... 
arXiv:2108.01077v3 fatcat:7zrgwu4r3bdlto5hpw6qhwxlta

Universal Adversarial Spoofing Attacks against Face Recognition [article]

Takuma Amada, Seng Pei Liew, Kazuya Kakizaki, Toshinori Araki
2021 arXiv   pre-print
Our results indicate that a multiple-identity attack is a real threat and should be taken into account when deploying face recognition systems.  ...  We assess the vulnerabilities of deep face recognition systems for images that falsify/spoof multiple identities simultaneously.  ...  Attacks on face recognition. Security issues of face recognition have attracted much attention. For example, Sharif et al.  ... 
arXiv:2110.00708v1 fatcat:6fou4zag4jdc7pnaaydwhdpcxm

AdvFaces: Adversarial Face Synthesis [article]

Debayan Deb, Jianbang Zhang, Anil K. Jain
2019 arXiv   pre-print
Such adversarial images can lead state-of-the-art face recognition systems to falsely reject a genuine subject (obfuscation attack) or falsely match to an impostor (impersonation attack).  ...  Face recognition systems have been shown to be vulnerable to adversarial examples resulting from adding small perturbations to probe images.  ...  Adversarial Attacks on Face Recognition In literature, studies on generating adversarial examples in the face recognition domain are relatively limited.  ... 
arXiv:1908.05008v1 fatcat:rt7clegasvbhxiwz5effsfutqq

Unsupervised Enhancement of Soft-biometric Privacy with Negative Face Recognition [article]

Philipp Terhörst, Marco Huber, Naser Damer, Florian Kirchbuchner, Arjan Kuijper
2020 arXiv   pre-print
In this work, we present Negative Face Recognition (NFR), a novel face recognition approach that enhances the soft-biometric privacy on the template-level by representing face templates in a complementary  ...  Experiments are conducted on two publicly available datasets captured under controlled and uncontrolled scenarios on three privacy-sensitive attributes.  ...  Discussion about the gain of privacy Our negative face recognition approach makes a face recognition system less vulnerable to function creep attacks in cases where attackers get access to the stored data  ... 
arXiv:2002.09181v1 fatcat:l4dept7yendb3bwwrsyfnn62sq

Dodging Attack Using Carefully Crafted Natural Makeup [article]

Nitzan Guetta and Asaf Shabtai and Inderjeet Singh and Satoru Momiyama and Yuval Elovici
2021 arXiv   pre-print
The evaluation results show that in the digital domain, the face recognition system was unable to identify all of the participants, while in the physical domain, the face recognition system was able to  ...  In this study, we present a novel black-box AML attack which carefully crafts natural makeup, which, when applied on a human participant, prevents the participant from being identified by facial recognition  ...  image the attacker is recognized by the face recognition (FR) system.  ... 
arXiv:2109.06467v1 fatcat:2c5hnqemsjbybceylzyua4tunu

PUBLIC AND AUTOMATED FUNCTIONAL TESTING (CAPTCHA) WITH ANIMATIONS BASED ON FACIAL EXPRESSIONS

RODOLFO ROMERO-HERRERA, MANUEL OSWALDO LÓPEZ MARÍN, JOSÉ FÉLIX SERRANO TALAMANTES
2021 Zenodo  
(CATPCHA Completely Automated Public Turing test to tell Computers and Humans Apart), one of the most varied and preferred methods to achieve this goal.  ...  The growing need to avoid the generation of false information on the internet forces service providers to have options, the reverse test being completely automatic to distinguish computers from humans  ...  INTRODUCTION Attackers on the Internet use different methods and means to steal information; for example, bots are used to compromise and control computer systems and thus increase attack capacity [1]  ... 
doi:10.5281/zenodo.5353626 fatcat:kbcjbb7oeva3fcp4rhb7ueoj7y

Masquerade Attack Analysis for Secured Face Biometric System

Sanjeeva Kumar M. Hatture, Department of Computer Science and Engineering, Basaveshwar Engineering College, Bagalkot, Visvesvaraya Technological University, Belagavi ( Karnataka), India., Shweta Policepatil, Pursuing, Master Degree, Department of Computer Science and Engineering, Basaveshwar Engineering College (Autonomous), Bagalkot, Visvesvaraya Technological University, Belagavi ( Karnataka), India.
2021 International journal of recent technology and engineering  
But face recognition systems are susceptible to spoof attacks made by nonreal faces mainly known as masquerade attack.  ...  Biometrics systems are mostly used to establish an automated way for validating or recognising a living or nonliving person's identity based on physiological and behavioural features.  ...  In face recognition system, the intruder tries to impersonating others with photographs, videos or masks form the brunt of spoofing attacks.  ... 
doi:10.35940/ijrte.b6309.0710221 fatcat:v2ichq64izbrdbu4gx6i6kpv4i

Transferable face image privacy protection based on federated learning and ensemble models

Jingjing Yang, Jiaxing Liu, Runkai Han, Jinzhao Wu
2021 Complex & Intelligent Systems  
On the client side, a local facial recognition model was obtained by local face data training and used as the input of PcadvGAN to train PcadvGAN for several rounds.  ...  Targeted attack and non-targeted attack experiments demonstrated that the proposed method can generate high-quality, transferable, robust, private face images with only minor perturbations more effectively  ...  An adversarial example attack on a potential facial recognition model is, essentially, a black-box attack.  ... 
doi:10.1007/s40747-021-00399-6 fatcat:khp2ufrz6raw7h4s4pkldmlvya

A Novel Authentication Scheme for Multi-Server Environment of Industrial Internet

Yu Zhang, Guangmin Sun
2021 Converter  
The method of verifying face is the face recognition based on singular value decomposition.  ...  During the key agreement phase, only four dot multiplication operations based on elliptic curve cryptography is used to realize one-time key for cryptograph transmission and mutual authentication.  ...  Related theory Face recognition based on singular value decomposition Tai et al.  ... 
doi:10.17762/converter.105 fatcat:eh6p2ftxjrcoxczmobtdbaz334

Face Antispoofing Using Shearlets: An Empirical Study

Dustin Terence van der Haar
2019 SAIEE Africa Research Journal  
Face recognition -A promise made to the modern technologists as the ultimate access control or surveillance technology.  ...  on modest computer hardware, but requires further improvement to beat the current state of the art for basic face antispoofing efforts, such as the photo, cut and video attacks.  ...  However, as technology and methods have progressed for face recognition, so have the attacks to subvert face recognition systems.  ... 
doi:10.23919/saiee.2019.8732799 fatcat:gphmpblp4ffztfuazsgzvqwati

Face Detection Opencv Based ATM Security System

Priyadharshini R, Priyadharshini V, Vijeletchumi R, Beaulah David
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Its one among the ways utilized to guard the image of users from malicious attacks and hackers.  ...  Face recognition technology helps the machine to spot each and every user unambiguously.  ...  The system is enforced on the master card size with extended capability of open supply pc vision (OpenCV) software package that is employed for image process operation.  ... 
doi:10.32628/cseit2062121 fatcat:ammye6owhvhl5m5on3tnj6iwui
« Previous Showing results 1 — 15 out of 68,407 results