Digital and Physical Face Attacks: Reviewing and One Step Further

09/29/2022
by   Chenqi Kong, et al.
0

With the rapid progress over the past five years, face authentication has become the most pervasive biometric recognition method. Thanks to the high-accuracy recognition performance and user-friendly usage, automatic face recognition (AFR) has exploded into a plethora of practical applications over device unlocking, checking-in, and financial payment. In spite of the tremendous success of face authentication, a variety of face presentation attacks (FPA), such as print attacks, replay attacks, and 3D mask attacks, have raised pressing mistrust concerns. Besides physical face attacks, face videos/images are vulnerable to a wide variety of digital attack techniques launched by malicious hackers, causing potential menace to the public at large. Due to the unrestricted access to enormous digital face images/videos and disclosed easy-to-use face manipulation tools circulating on the internet, non-expert attackers without any prior professional skills are able to readily create sophisticated fake faces, leading to numerous dangerous applications such as financial fraud, impersonation, and identity theft. This survey aims to build the integrity of face forensics by providing thorough analyses of existing literature and highlighting the issues requiring further attention. In this paper, we first comprehensively survey both physical and digital face attack types and datasets. Then, we review the latest and most advanced progress on existing counter-attack methodologies and highlight their current limits. Moreover, we outline possible future research directions for existing and upcoming challenges in the face forensics community. Finally, the necessity of joint physical and digital face attack detection has been discussed, which has never been studied in previous surveys.

READ FULL TEXT

page 1

page 2

page 3

page 6

page 8

research
12/14/2022

A Novel Active Solution for Two-Dimensional Face Presentation Attack Detection

Identity authentication is the process of verifying one's identity. Ther...
research
02/25/2022

Security Attacks and Solutions for Digital Twins

Digital twins, being the virtual replicas of their physical counterparts...
research
06/15/2020

Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems

Due to its convenience, biometric authentication, especial face authenti...
research
02/18/2022

Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches

Biometric data, such as face images, are often associated with sensitive...
research
07/25/2023

Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation

Although face recognition starts to play an important role in our daily ...
research
01/06/2018

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections

Face authentication systems are becoming increasingly prevalent, especia...
research
11/03/2020

Face Morphing Attack Generation Detection: A Comprehensive Survey

The vulnerability of Face Recognition System (FRS) to various kind of at...

Please sign up or login with your details

Forgot password? Click here to reset