Robustness of Facial Recognition to GAN-based Face-morphing Attacks

12/18/2020
by   Richard T. Marriott, et al.
0

Face-morphing attacks have been a cause for concern for a number of years. Striving to remain one step ahead of attackers, researchers have proposed many methods of both creating and detecting morphed images. These detection methods, however, have generally proven to be inadequate. In this work we identify two new, GAN-based methods that an attacker may already have in his arsenal. Each method is evaluated against state-of-the-art facial recognition (FR) algorithms and we demonstrate that improvements to the fidelity of FR algorithms do lead to a reduction in the success rate of attacks provided morphed images are considered when setting operational acceptance thresholds.

READ FULL TEXT

page 1

page 2

page 3

page 5

page 6

page 7

page 8

research
02/03/2023

MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders

Investigating new methods of creating face morphing attacks is essential...
research
11/19/2018

FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image

Face morphing attack is proved to be a serious threat to the existing fa...
research
08/20/2021

ReGenMorph: Visibly Realistic GAN Generated Face Morphing Attacks by Attack Re-generation

Face morphing attacks aim at creating face images that are verifiable to...
research
11/30/2021

Using a GAN to Generate Adversarial Examples to Facial Image Recognition

Images posted online present a privacy concern in that they may be used ...
research
11/02/2022

Dormant Neural Trojans

We present a novel methodology for neural network backdoor attacks. Unli...
research
06/25/2020

Backdoor Attacks on Facial Recognition in the Physical World

Backdoor attacks embed hidden malicious behaviors inside deep neural net...
research
01/08/2023

Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons

In this paper we describe how to plant novel types of backdoors in any f...

Please sign up or login with your details

Forgot password? Click here to reset