Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack

08/23/2020
by   Hadi Mansourifar, et al.
0

Rounding confidence score is considered trivial but a simple and effective countermeasure to stop gradient descent based image reconstruction attacks. However, its capability in the face of more sophisticated reconstruction attacks is an uninvestigated research area. In this paper, we prove that, the face reconstruction attacks based on composite faces can reveal the inefficiency of rounding policy as countermeasure. We assume that, the attacker takes advantage of face composite parts which helps the attacker to get access to the most important features of the face or decompose it to the independent segments. Afterwards, decomposed segments are exploited as search parameters to create a search path to reconstruct optimal face. Face composition parts enable the attacker to violate the privacy of face recognition models even with a blind search. However, we assume that, the attacker may take advantage of random search to reconstruct the target face faster. The algorithm is started with random composition of face parts as initial face and confidence score is considered as fitness value. Our experiments show that, since the rounding policy as countermeasure can't stop the random search process, current face recognition systems are extremely vulnerable against such sophisticated attacks. To address this problem, we successfully test Face Detection Score Filtering (FDSF) as a countermeasure to protect the privacy of training data against proposed attack.

READ FULL TEXT
research
03/02/2017

Face Image Reconstruction from Deep Templates

State-of-the-art face recognition systems are based on deep (convolution...
research
09/21/2023

Vulnerability of 3D Face Recognition Systems to Morphing Attacks

In recent years face recognition systems have been brought to the mainst...
research
10/17/2022

Face Pasting Attack

Cujo AI and Adversa AI hosted the MLSec face recognition challenge. The ...
research
03/13/2018

Invisible Mask: Practical Attacks on Face Recognition with Infrared

Accurate face recognition techniques make a series of critical applicati...
research
07/04/2022

RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries

Recent successful adversarial attacks on face recognition show that, des...
research
04/28/2022

Morphing Attack Potential

In security systems the risk assessment in the sense of common criteria ...
research
02/03/2023

MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders

Investigating new methods of creating face morphing attacks is essential...

Please sign up or login with your details

Forgot password? Click here to reset