Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector

04/12/2018
by   Huy H. Nguyen, et al.
0

Making computer-generated (CG) images more difficult to detect is an interesting problem in computer graphics and security. While most approaches focus on the image rendering phase, this paper presents a method based on increasing the naturalness of CG facial images from the perspective of spoofing detectors. The proposed method is implemented using a convolutional neural network (CNN) comprising two autoencoders and a transformer and is trained using a black-box discriminator without gradient information. Over 50 transformed CG images were not detected by three state-of-the-art spoofing detectors. This capability raises an alarm regarding the reliability of facial authentication systems, which are becoming widely used in daily life.

READ FULL TEXT

page 2

page 4

research
06/19/2018

On the Learning of Deep Local Features for Robust Face Spoofing Detection

Biometrics emerged as a robust solution for security systems. However, g...
research
02/01/2021

Aurora Guard: Reliable Face Anti-Spoofing via Mobile Lighting System

Face authentication on mobile end has been widely applied in various sce...
research
07/24/2023

Robust face anti-spoofing framework with Convolutional Vision Transformer

Owing to the advances in image processing technology and large-scale dat...
research
08/09/2023

Enhancing Mobile Privacy and Security: A Face Skin Patch-Based Anti-Spoofing Approach

As Facial Recognition System(FRS) is widely applied in areas such as acc...
research
06/10/2018

Smart Novel Computer-based Analytical Tool for Image Forgery Authentication

This paper presents an integration of image forgery detection with image...
research
10/23/2020

Detection of Replay Attacks to GNSS based on Partial Correlations and Authentication Data Unpredictability

Intentional interference, and in particular GNSS spoofing, is currently ...
research
06/09/2021

Eight Reasons Why Cybersecurity on Novel Generations of Brain-Computer Interfaces Must Be Prioritized

This article presents eight neural cyberattacks affecting spontaneous ne...

Please sign up or login with your details

Forgot password? Click here to reset