scispace - formally typeset
Open AccessJournal ArticleDOI

Stegano-Morphing: Concealing Attacks on Face Identification Algorithms

Luis Carabe, +1 more
- 14 Jun 2021 - 
- Vol. 9, pp 100851-100867
TLDR
This paper presents a comparison of the identification rate and behavior of six recognizers against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target, and presents a new morphing method that works as an iterative process of gradualTraditional morphing, combining the originalsubject with all the subjects’ images in a database.
Abstract
Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject’s image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects’ images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data

TL;DR: The submitted solutions presented innovations that led to out-performing the considered baseline in many experimental settings and are presented at the 2022 International Joint Conference on Biometrics (IJCB 2022).
Proceedings ArticleDOI

SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data

TL;DR: A summary of the competition on face morphing attack detection based on Privacy-aware Synthetic Training Data (SYN-MAD) held at the 2022 International Joint Conference on Biometrics (IJCB 2022) can be found in this article .
References
More filters
Journal Article

Scikit-learn: Machine Learning in Python

TL;DR: Scikit-learn is a Python module integrating a wide range of state-of-the-art machine learning algorithms for medium-scale supervised and unsupervised problems, focusing on bringing machine learning to non-specialists using a general-purpose high-level language.
Journal ArticleDOI

Eigenfaces vs. Fisherfaces: recognition using class specific linear projection

TL;DR: A face recognition algorithm which is insensitive to large variation in lighting direction and facial expression is developed, based on Fisher's linear discriminant and produces well separated classes in a low-dimensional subspace, even under severe variations in lighting and facial expressions.
Proceedings ArticleDOI

TensorFlow: a system for large-scale machine learning

TL;DR: TensorFlow as mentioned in this paper is a machine learning system that operates at large scale and in heterogeneous environments, using dataflow graphs to represent computation, shared state, and the operations that mutate that state.
Proceedings ArticleDOI

FaceNet: A unified embedding for face recognition and clustering

TL;DR: A system that directly learns a mapping from face images to a compact Euclidean space where distances directly correspond to a measure offace similarity, and achieves state-of-the-art face recognition performance using only 128-bytes perface.
Related Papers (5)
Trending Questions (1)
How do face morphing attacks affect face recognition systems?

Face morphing attacks can deceive face recognition systems by altering the features of an original subject's image to make it appear as someone else, minimizing the probability of being detected.