Skip to main content

Target Identity Attacks on Facial Recognition Systems

  • Conference paper
  • First Online:
Advances in Digital Forensics XVI (DigitalForensics 2020)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 589))

Included in the following conference series:

  • 535 Accesses

Abstract

Advancements in digital technology have significantly increased the number of cases involving the counterfeiting of identity documents. One example is exam fraud, where a counterfeiter creates a composite morphed photograph of the real candidate and an imposter, and attaches it to the examination admit card. Automated facial recognition systems are beginning to be deployed at examination centers to match candidates’ faces against their official facial images. While the need to perform manual matches is eliminated, the vulnerabilities of these automated systems are a major concern.

This chapter evaluates the vulnerability of an automated facial recognition system to input image manipulation via a target identity attack. The attack manipulates a facial image so that it looks similar to the real candidate, but outputs the identity feature representation of the imposter. This chapter also evaluates the performance of facial recognition models with regard to impersonator recognition. Experiments using image databases demonstrate the effectiveness of target identity attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. I. Batskos, A. Macarulla Rodriguez and Z. Geradts, Face morphing detection, Proceedings of the Twentieth Irish Machine Vision and Image Processing Conference, pp. 162–172, 2018.

    Google Scholar 

  2. N. Damer, V. Boller, Y. Wainakh, F. Boutros, P. Terhorst, A. Braun and A. Kuijper, Detecting face morphing attacks by analyzing the directed distances of facial landmark shifts, Proceedings of the German Conference on Pattern Recognition, pp. 518–534, 2018.

    Google Scholar 

  3. N. Damer, A. Saladie, A. Braun and A. Kuijper, MorGAN: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial networks, Proceedings of the Ninth IEEE International Conference on Biometrics Theory, Applications and Systems, 2018.

    Google Scholar 

  4. L. Debiasi, C. Rathgeb, U. Scherhag, A. Uhl and C. Busch, PRNU variance analysis for morphed face image detection, Proceedings of the Ninth IEEE International Conference on Biometrics Theory, Applications and Systems, 2018.

    Google Scholar 

  5. M. Ferrara, R. Cappelli and D. Maltoni, On the feasibility of creating double-identity fingerprints, IEEE Transactions on Information Forensics and Security, vol. 12(4), pp. 892–900, 2017.

    Google Scholar 

  6. G. Huang, M. Mattar, T. Berg and E. Learned-Miller, Labeled faces in the wild: A database for studying face recognition in unconstrained environments, presented at the Workshop on Faces in Real-Life Images: Detection, Alignment and Recognition, 2008.

    Google Scholar 

  7. I. Korshunova, W. Shi, J. Dambre and L. Theis, Fast face-swap using convolutional neural networks, Proceedings of the IEEE International Conference on Computer Vision, pp. 3697–3705, 2017.

    Google Scholar 

  8. A. Krizhevsky, I. Sutskever and G. Hinton, ImageNet classification with deep convolutional neural networks, Proceedings of the Twenty-Sixth Annual Conference on Neural Information Processing Systems, pp. 1106–1114, 2012.

    Google Scholar 

  9. V. Kushwaha, M. Singh, R. Singh, M. Vatsa, N. Ratha and R. Chellappa, Disguised faces in the wild, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1–9, 2018.

    Google Scholar 

  10. A. Makrushin, C. Kraetzer, T. Neubert and J. Dittmann, Generalized Benford’s law for blind detection of morphed face images, Proceedings of the Sixth ACM Workshop on Information Hiding and Multimedia Security, pp. 49–54, 2018.

    Google Scholar 

  11. A. Makrushin, T. Neubert and J. Dittmann, Automatic generation and detection of visually faultless facial morphs, Proceedings of the Twelfth International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, pp. 39–50, 2017.

    Google Scholar 

  12. V. Mirjalili, S. Raschka and A. Ross, Gender privacy: An ensemble of semi adversarial networks for confounding arbitrary gender classifiers, Proceedings of the Ninth IEEE International Conference on Biometrics Theory, Applications and Systems, 2018.

    Google Scholar 

  13. T. Neubert, C. Kraetzer and J. Dittmann, A face morphing detection concept with a frequency and spatial domain feature space for images on eMRTD, Proceedings of the Seventh ACM Workshop on Information Hiding and Multimedia Security, pp. 95–100, 2019.

    Google Scholar 

  14. A. Othman and A. Ross, Privacy of facial soft biometrics: Suppressing gender but retaining identity, Proceedings of the Computer Vision – European Conference on Computer Vision 2014 Workshops, pp. 682–696, 2014.

    Google Scholar 

  15. R. Raghavendra, K. Raja, S. Venkatesh and C. Busch, Transferable deep-CNN features for detecting digital and print-scanned morphed face images, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1822–1830, 2017.

    Google Scholar 

  16. C. Rathgeb and C. Busch, On the feasibility of creating morphed iris codes, Proceedings of the IEEE International Joint Conference on Biometrics, pp. 152–157, 2017.

    Google Scholar 

  17. U. Scherhag, D. Budhrani, M. Gomez-Barrero and C. Busch, Detecting morphed face images using facial landmarks, Proceedings of the Eighth International Conference on Image and Signal Processing, pp. 444–452, 2018.

    Google Scholar 

  18. U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt and C. Busch, Face recognition systems under morphing attacks: A survey, IEEE Access, vol. 7, pp. 23012–23026, 2019.

    Google Scholar 

  19. C. Seibold, W. Samek, A. Hilsmann and P. Eisert, Detection of face morphing attacks by deep learning, Proceedings of the International Workshop on Digital Watermarking, pp. 107–120, 2017.

    Google Scholar 

  20. K. Simonyan and A. Zisserman, Very Deep Convolutional Networks for Large-Scale Image Recognition, arXiv: 1409.1556v6, 2015.

    Google Scholar 

  21. Staff Writer, 11 members of police exam cheating gang arrested in Jodhpur, The Pink City Post, July 12, 2018.

    Google Scholar 

  22. L. Wandzik, G. Kaeding and R. Vicente-Garcia, Morphing detection using a general purpose face recognition system, Proceedings of the Twenty-Sixth European Signal Processing Conference, pp. 1012–1016, 2018.

    Google Scholar 

  23. A. Yuhas, Chinese nationals charged with cheating by impersonation on US college tests, The Guardian, May 28, 2015.

    Google Scholar 

  24. L. Zhang, F. Peng and M. Long, Face morphing detection using the Fourier spectrum of sensor pattern noise, Proceedings of the IEEE International Conference on Multimedia and Expo, 2018.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chhabra, S., Banati, N., Gupta, G., Gupta, G. (2020). Target Identity Attacks on Facial Recognition Systems. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XVI. DigitalForensics 2020. IFIP Advances in Information and Communication Technology, vol 589. Springer, Cham. https://doi.org/10.1007/978-3-030-56223-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-56223-6_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-56222-9

  • Online ISBN: 978-3-030-56223-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics