Abstract

Face identification is becoming a well-accepted technology for access control applications, both in the real or virtual world. Systems based on this technology must deal with the persistent challenges of classification algorithms and the impersonation attacks performed by people who do not want to be identified. Morphing is often selected to conduct such attacks since it allows the modification of the features of an original subject’s image to make it appear as someone else. Publications focus on impersonating this other person, usually someone who is allowed to get into a restricted place, building, or software app. However, there is no list of authorized people in many other applications, just a blacklist of people no longer allowed to enter, log in, or register. In such cases, the morphing target person is not relevant, and the main objective is to minimize the probability of being detected. In this paper, we present a comparison of the identification rate and behavior of six recognizers (Eigenfaces, Fisherfaces, LBPH, SIFT, FaceNet, and ArcFace) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target. We also present a new morphing method that works as an iterative process of gradual traditional morphing, combining the original subject with all the subjects’ images in a database. This method multiplies by four the chances of a successful and complete impersonation attack (from 4% to 16%), by deceiving both face identification and morphing detection algorithms simultaneously.

Highlights

  • We present a comparison of the identifcation rate and behavior of 5 recognizers (Eigenfaces, Fisherfaces, Local Binary Patterns Histogram (LBPH), Scale-invariant Feature Transform (SIFT), and FaceNet) against traditional morphing attacks, in which only two subjects are used to create the altered image: the original subject and the target

  • Our experiments show that some well-known methods like EigenFaces, FisherFaces, or SIFT completely fail in such a task

  • More recent techniques based on Deep Learning like FaceNet offer better results than the others

Read more

Summary

Introduction

Continuous improvements in this well-known research feld ( [1, 2, 10, 11, 26]) have led to an increasing number of commercial applications. Today face recognition algorithms are implemented in a wide range of products and solutions. Most mobile phones in the market have embedded technology to unlock them with a simple look at the device [4]. More and more websites implement "Know your Customer" policies by comparing a photo ID with real-time capture of the applicant [5]. Mobile phones or websites are just two examples of everyday life. We can think about access control in offces or airports, places where this technology is very welcome for its ease of use and low intrusiveness

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.