Multiple-Identity Image Attacks Against Face-based Identity Verification

06/20/2019
by   Jerone T. A. Andrews, et al.
7

Facial verification systems are vulnerable to poisoning attacks that make use of multiple-identity images (MIIs)---face images stored in a database that resemble multiple persons, such that novel images of any of the constituent persons are verified as matching the identity of the MII. Research on this mode of attack has focused on defence by detection, with no explanation as to why the vulnerability exists. New quantitative results are presented that support an explanation in terms of the geometry of the representations spaces used by the verification systems. In the spherical geometry of those spaces, the angular distance distributions of matching and non-matching pairs of face representations are only modestly separated, approximately centred at 90 and 40-60 degrees, respectively. This is sufficient for open-set verification on normal data but provides an opportunity for MII attacks. Our analysis considers ideal MII algorithms, demonstrating that, if realisable, they would deliver faces roughly 45 degrees from their constituent faces, thus classed as matching them. We study the performance of three methods for MII generation---gallery search, image space morphing, and representation space inversion---and show that the latter two realise the ideal well enough to produce effective attacks, while the former could succeed but only with an implausibly large gallery to search. Gallery search and inversion MIIs depend on having access to a facial comparator, for optimisation, but our results show that these attacks can still be effective when attacking disparate comparators, thus securing a deployed comparator is an insufficient defence.

READ FULL TEXT

page 1

page 4

page 9

research
04/26/2022

The Influence of the Other-Race Effect on Susceptibility to Face Morphing Attacks

Facial morphs created between two identities resemble both of the faces ...
research
09/12/2023

Generalized Attacks on Face Verification Systems

Face verification (FV) using deep neural network models has made tremend...
research
05/29/2023

Towards minimizing efforts for Morphing Attacks – Deep embeddings for morphing pair selection and improved Morphing Attack Detection

Face Morphing Attacks pose a threat to the security of identity document...
research
01/23/2010

SVM-based Multiview Face Recognition by Generalization of Discriminant Analysis

Identity verification of authentic persons by their multiview faces is a...
research
08/23/2021

PW-MAD: Pixel-wise Supervision for Generalized Face Morphing Attack Detection

A face morphing attack image can be verified to multiple identities, mak...
research
02/27/2020

Face Verification Using 60 GHz 802.11 waveforms

Verification of an identity based on the human face radar signature in m...

Please sign up or login with your details

Forgot password? Click here to reset