Face Pasting Attack

10/17/2022
by   Niklas Bunzel, et al.
0

Cujo AI and Adversa AI hosted the MLSec face recognition challenge. The goal was to attack a black box face recognition model with targeted attacks. The model returned the confidence of the target class and a stealthiness score. For an attack to be considered successful the target class has to have the highest confidence among all classes and the stealthiness has to be at least 0.5. In our approach we paste the face of a target into a source image. By utilizing position, scaling, rotation and transparency attributes we reached 3rd place. Our approach took approximately 200 queries per attack for the final highest score and about  7.7 queries minimum for a successful attack. The code is available at https://github.com/bunni90/FacePastingAttack .

READ FULL TEXT

page 2

page 4

research
07/04/2022

RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries

Recent successful adversarial attacks on face recognition show that, des...
research
04/03/2022

Faces: AI Blitz XIII Solutions

AI Blitz XIII Faces challenge hosted on www.aicrowd.com platform consist...
research
07/27/2020

Black-Box Face Recovery from Identity Features

In this work, we present a novel algorithm based on an it-erative sampli...
research
08/23/2020

Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack

Rounding confidence score is considered trivial but a simple and effecti...
research
06/23/2022

What makes you, you? Analyzing Recognition by Swapping Face Parts

Deep learning advanced face recognition to an unprecedented accuracy. Ho...
research
06/10/2021

Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation

Boundary based blackbox attack has been recognized as practical and effe...
research
11/10/2022

Robust Smart Home Face Recognition under Starving Federated Data

Over the past few years, the field of adversarial attack received numero...

Please sign up or login with your details

Forgot password? Click here to reset