Abstract
Advancements in digital technology have significantly increased the number of cases involving the counterfeiting of identity documents. One example is exam fraud, where a counterfeiter creates a composite morphed photograph of the real candidate and an imposter, and attaches it to the examination admit card. Automated facial recognition systems are beginning to be deployed at examination centers to match candidates’ faces against their official facial images. While the need to perform manual matches is eliminated, the vulnerabilities of these automated systems are a major concern.
This chapter evaluates the vulnerability of an automated facial recognition system to input image manipulation via a target identity attack. The attack manipulates a facial image so that it looks similar to the real candidate, but outputs the identity feature representation of the imposter. This chapter also evaluates the performance of facial recognition models with regard to impersonator recognition. Experiments using image databases demonstrate the effectiveness of target identity attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
I. Batskos, A. Macarulla Rodriguez and Z. Geradts, Face morphing detection, Proceedings of the Twentieth Irish Machine Vision and Image Processing Conference, pp. 162–172, 2018.
N. Damer, V. Boller, Y. Wainakh, F. Boutros, P. Terhorst, A. Braun and A. Kuijper, Detecting face morphing attacks by analyzing the directed distances of facial landmark shifts, Proceedings of the German Conference on Pattern Recognition, pp. 518–534, 2018.
N. Damer, A. Saladie, A. Braun and A. Kuijper, MorGAN: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial networks, Proceedings of the Ninth IEEE International Conference on Biometrics Theory, Applications and Systems, 2018.
L. Debiasi, C. Rathgeb, U. Scherhag, A. Uhl and C. Busch, PRNU variance analysis for morphed face image detection, Proceedings of the Ninth IEEE International Conference on Biometrics Theory, Applications and Systems, 2018.
M. Ferrara, R. Cappelli and D. Maltoni, On the feasibility of creating double-identity fingerprints, IEEE Transactions on Information Forensics and Security, vol. 12(4), pp. 892–900, 2017.
G. Huang, M. Mattar, T. Berg and E. Learned-Miller, Labeled faces in the wild: A database for studying face recognition in unconstrained environments, presented at the Workshop on Faces in Real-Life Images: Detection, Alignment and Recognition, 2008.
I. Korshunova, W. Shi, J. Dambre and L. Theis, Fast face-swap using convolutional neural networks, Proceedings of the IEEE International Conference on Computer Vision, pp. 3697–3705, 2017.
A. Krizhevsky, I. Sutskever and G. Hinton, ImageNet classification with deep convolutional neural networks, Proceedings of the Twenty-Sixth Annual Conference on Neural Information Processing Systems, pp. 1106–1114, 2012.
V. Kushwaha, M. Singh, R. Singh, M. Vatsa, N. Ratha and R. Chellappa, Disguised faces in the wild, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1–9, 2018.
A. Makrushin, C. Kraetzer, T. Neubert and J. Dittmann, Generalized Benford’s law for blind detection of morphed face images, Proceedings of the Sixth ACM Workshop on Information Hiding and Multimedia Security, pp. 49–54, 2018.
A. Makrushin, T. Neubert and J. Dittmann, Automatic generation and detection of visually faultless facial morphs, Proceedings of the Twelfth International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, pp. 39–50, 2017.
V. Mirjalili, S. Raschka and A. Ross, Gender privacy: An ensemble of semi adversarial networks for confounding arbitrary gender classifiers, Proceedings of the Ninth IEEE International Conference on Biometrics Theory, Applications and Systems, 2018.
T. Neubert, C. Kraetzer and J. Dittmann, A face morphing detection concept with a frequency and spatial domain feature space for images on eMRTD, Proceedings of the Seventh ACM Workshop on Information Hiding and Multimedia Security, pp. 95–100, 2019.
A. Othman and A. Ross, Privacy of facial soft biometrics: Suppressing gender but retaining identity, Proceedings of the Computer Vision – European Conference on Computer Vision 2014 Workshops, pp. 682–696, 2014.
R. Raghavendra, K. Raja, S. Venkatesh and C. Busch, Transferable deep-CNN features for detecting digital and print-scanned morphed face images, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 1822–1830, 2017.
C. Rathgeb and C. Busch, On the feasibility of creating morphed iris codes, Proceedings of the IEEE International Joint Conference on Biometrics, pp. 152–157, 2017.
U. Scherhag, D. Budhrani, M. Gomez-Barrero and C. Busch, Detecting morphed face images using facial landmarks, Proceedings of the Eighth International Conference on Image and Signal Processing, pp. 444–452, 2018.
U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt and C. Busch, Face recognition systems under morphing attacks: A survey, IEEE Access, vol. 7, pp. 23012–23026, 2019.
C. Seibold, W. Samek, A. Hilsmann and P. Eisert, Detection of face morphing attacks by deep learning, Proceedings of the International Workshop on Digital Watermarking, pp. 107–120, 2017.
K. Simonyan and A. Zisserman, Very Deep Convolutional Networks for Large-Scale Image Recognition, arXiv: 1409.1556v6, 2015.
Staff Writer, 11 members of police exam cheating gang arrested in Jodhpur, The Pink City Post, July 12, 2018.
L. Wandzik, G. Kaeding and R. Vicente-Garcia, Morphing detection using a general purpose face recognition system, Proceedings of the Twenty-Sixth European Signal Processing Conference, pp. 1012–1016, 2018.
A. Yuhas, Chinese nationals charged with cheating by impersonation on US college tests, The Guardian, May 28, 2015.
L. Zhang, F. Peng and M. Long, Face morphing detection using the Fourier spectrum of sensor pattern noise, Proceedings of the IEEE International Conference on Multimedia and Expo, 2018.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 IFIP International Federation for Information Processing
About this paper
Cite this paper
Chhabra, S., Banati, N., Gupta, G., Gupta, G. (2020). Target Identity Attacks on Facial Recognition Systems. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XVI. DigitalForensics 2020. IFIP Advances in Information and Communication Technology, vol 589. Springer, Cham. https://doi.org/10.1007/978-3-030-56223-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-56223-6_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-56222-9
Online ISBN: 978-3-030-56223-6
eBook Packages: Computer ScienceComputer Science (R0)