Stegano-Morphing: Concealing Attacks on Face Identification Algorithms

Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to b...

Full description

Bibliographic Details
Main Authors: Luis Carabe, Eduardo Cermeno
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9453757/
id doaj-1c272e8a8ee54c6cb93c6adddd81a19f
record_format Article
spelling doaj-1c272e8a8ee54c6cb93c6adddd81a19f2021-07-21T23:00:34ZengIEEEIEEE Access2169-35362021-01-01910085110086710.1109/ACCESS.2021.30887869453757Stegano-Morphing: Concealing Attacks on Face Identification AlgorithmsLuis Carabe0https://orcid.org/0000-0002-7556-8093Eduardo Cermeno1https://orcid.org/0000-0002-4936-6404Department of Computer Science, Autonomous University of Madrid (UAM), Madrid, SpainDepartment of Research, Vaelsys, Madrid, SpainFace identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject’s image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects’ images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously.https://ieeexplore.ieee.org/document/9453757/Access controlArcFacebiometricsdeep learningFaceNetface recognition
collection DOAJ
language English
format Article
sources DOAJ
author Luis Carabe
Eduardo Cermeno
spellingShingle Luis Carabe
Eduardo Cermeno
Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
IEEE Access
Access control
ArcFace
biometrics
deep learning
FaceNet
face recognition
author_facet Luis Carabe
Eduardo Cermeno
author_sort Luis Carabe
title Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
title_short Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
title_full Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
title_fullStr Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
title_full_unstemmed Stegano-Morphing: Concealing Attacks on Face Identification Algorithms
title_sort stegano-morphing: concealing attacks on face identification algorithms
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2021-01-01
description Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject’s image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects’ images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously.
topic Access control
ArcFace
biometrics
deep learning
FaceNet
face recognition
url https://ieeexplore.ieee.org/document/9453757/
work_keys_str_mv AT luiscarabe steganomorphingconcealingattacksonfaceidentificationalgorithms
AT eduardocermeno steganomorphingconcealingattacksonfaceidentificationalgorithms
_version_ 1721292260821172224