狠狠撸

狠狠撸Share a Scribd company logo
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #1
Is Face Recognition Safe from
Realizable Attacks?
Sanjay Saha (presenting), Terence Sim
National University of Singapore
{sanjaysaha, tsim}@comp.nus.edu.sg
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #2
Motivation
? Face recognition is a highly used biometric.
? A common target to various attacks.
? State-of-the-art FRSs are vulnerable to previous
attacks.
Source: link M. Sharif, L. Bauer, and M. K. Reiter, “Accessorize to a
Crime : Real and Stealthy Attacks on State-of-the-Art
Face Recognition,” pp. 1528–1540, 2016.
Source: link
Our goal is to examine vulnerability of FRSs in
Black-box settings
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #3
Realizable Attack on Face Recognition
Systems
? FRS is used to authenticate users of the building.
? FRS is attended by a security guard.
? The Attacker wants to get into the building by fooling the FRS.
? He also must try not raise suspicion of the security guard.
? The attacker does not know (black-box) the internal
structure of the FRS.
Main requirements of a
Realizable Attack on FRS.
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #4
Proposed Method
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #5
Attack Scheme
Attack Gallery Victim(s)
Break-in
Attacker is NOT
IN the gallery No specific Victim
Impersonation
Attacker is NOT
IN the gallery
One, selected by
Attacker
Evasion
Attacker is IN
the gallery
No specific Victim if
it is not the Attacker
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #7
Face Synthesizer
? Main focus is to generate realizable face images
so that it can be replicated in real-world scenarios.
? We use the MMDA Face Synthesizer1
? Capable of generating realistic-looking faces from the given different
variations of training face images.
? = ?1, ?2
???? ????
?1, ?2, ?3
????
?1, ?2
????????
?1, ?2
??????????
? MMDA because it is easy to train and it produces good quality realistic
images.
1Terence Sim and Li Zhang. Controllable face privacy. In 2015 11th IEEE International Conference
and Workshops on Automatic Face and Gesture Recognition (FG), volume 4, pages 1–8. IEEE, 2015
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #9
Training the Face Synthesizer
Two other attackers
72 combinations of
Attacker 1
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #10
Results
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #11
Successful Attacks (1)
Successful Break-in attacks
AttackersBroke-inas
Generated faces
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #12
Successful Attacks (2)
Successful Impersonation attacks
AttackersTargetedas
Generated faces
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #13
Realizing the attacks
Generated face Real Face
Attackers
Victims
Generated faceReal Face
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #14
Unsuccessful Attacks
? When the ‘gallery’ is built with faces from different race, gender, etc.
? Evasion attacks
Attacker 1 Attacker 2
Failed Impersonation attack by Attacker 1, and Attacker 2
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #15
Findings – Variation of Galleries
Counting successful attacks for different galleries with varying difficulties
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #16
Findings – Different Gallery Sizes
Increasing gallery sizes increases chance of successful attacks
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #17
Summary
? Approximately 21.8% of the attacks (Break-in and
Impersonation) were successful for all the attackers.
? Real perturbations of the attackers’ face succeed in
break-in and impersonation attacks.
? Impersonation attacks depend on the similarity between the Attacker
and the Victim.
? Good initial parameter vector also plays an important role.
? Our work makes a clarion call for urgent research to address these
vulnerabilities in FRS. We hope other researchers will take up this
challenge.
Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #18

More Related Content

Similar to Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, Terence Sim (20)

PDF
Facial Recognition Presentation Mar 1.pdf
firstjob4
?
PDF
RealNetworks - SAFR Platform Whitepaper
Dony Riyanto
?
PDF
IJECET_13_02_003.pdf
IAEME Publication
?
PDF
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
mlaij
?
PDF
Research on White-Box Counter-Attack Method based on Convolution Neural Netwo...
IJCI JOURNAL
?
PDF
2108.08191v1 (1)
VISHALRai661033
?
PDF
Image Based Facial Recognition
ijtsrd
?
PDF
Ijarcce 27
Smriti Tikoo
?
PDF
Bo Li-they’ve created images that reliably fool neural network
GeekPwn Keen
?
PDF
Face Recognition Techniques - An evaluation Study
Eswar Publications
?
PPTX
Sit powerpoint
dkeane01
?
PPTX
face recognition
Swetha Swethu
?
PPTX
Deep fakes and beyond
Arpitha Gurumurthy
?
PDF
Hl2413221328
IJERA Editor
?
PDF
Ijetcas14 435
Iasir Journals
?
PDF
DEF CON 27 - workshop - YACIN NADJI - hands on adverserial machine learning
Felipe Prado
?
PDF
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
IAEME Publication
?
PPTX
Face detection By Abdul Hanan
Abdul Hanan
?
PDF
Facial expression recognition using pca and gabor with jaffe database 11748
EditorIJAERD
?
PDF
Face Recognition System and its Applications
IRJET Journal
?
Facial Recognition Presentation Mar 1.pdf
firstjob4
?
RealNetworks - SAFR Platform Whitepaper
Dony Riyanto
?
IJECET_13_02_003.pdf
IAEME Publication
?
A COMPREHENSIVE STUDY ON OCCLUSION INVARIANT FACE RECOGNITION UNDER FACE MASK...
mlaij
?
Research on White-Box Counter-Attack Method based on Convolution Neural Netwo...
IJCI JOURNAL
?
2108.08191v1 (1)
VISHALRai661033
?
Image Based Facial Recognition
ijtsrd
?
Ijarcce 27
Smriti Tikoo
?
Bo Li-they’ve created images that reliably fool neural network
GeekPwn Keen
?
Face Recognition Techniques - An evaluation Study
Eswar Publications
?
Sit powerpoint
dkeane01
?
face recognition
Swetha Swethu
?
Deep fakes and beyond
Arpitha Gurumurthy
?
Hl2413221328
IJERA Editor
?
Ijetcas14 435
Iasir Journals
?
DEF CON 27 - workshop - YACIN NADJI - hands on adverserial machine learning
Felipe Prado
?
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
IAEME Publication
?
Face detection By Abdul Hanan
Abdul Hanan
?
Facial expression recognition using pca and gabor with jaffe database 11748
EditorIJAERD
?
Face Recognition System and its Applications
IRJET Journal
?

More from Sanjay Saha (7)

PDF
Face Recognition Basic Terminologies
Sanjay Saha
?
PDF
ResNet basics (Deep Residual Network for Image Recognition)
Sanjay Saha
?
PDF
Convolutional Deep Belief Nets by Lee. H. 2009
Sanjay Saha
?
PDF
IEEE_802.11e
Sanjay Saha
?
PPTX
Image Degradation & Resoration
Sanjay Saha
?
PPTX
Fault Tree Analysis
Sanjay Saha
?
PDF
Stack and Queue (brief)
Sanjay Saha
?
Face Recognition Basic Terminologies
Sanjay Saha
?
ResNet basics (Deep Residual Network for Image Recognition)
Sanjay Saha
?
Convolutional Deep Belief Nets by Lee. H. 2009
Sanjay Saha
?
IEEE_802.11e
Sanjay Saha
?
Image Degradation & Resoration
Sanjay Saha
?
Fault Tree Analysis
Sanjay Saha
?
Stack and Queue (brief)
Sanjay Saha
?
Ad

Recently uploaded (20)

PDF
Exploiting the Low Volatility Anomaly: A Low Beta Model Portfolio for Risk-Ad...
Bradley Norbom, CFA
?
PDF
TCU EVALUATION FACULTY TCU Taguig City 1st Semester 2017-2018
MELJUN CORTES
?
PPTX
一比一原版(罢鲍颁毕业证书)开姆尼茨工业大学毕业证如何办理
taqyed
?
PDF
NVIDIA Triton Inference Server, a game-changing platform for deploying AI mod...
Tamanna36
?
PDF
ilide.info-tg-understanding-culture-society-and-politics-pr_127f984d2904c57ec...
jed P
?
PPTX
Presentation by Tariq & Mohammed (1).pptx
AbooddSandoqaa
?
PPTX
25 items quiz for practical research 1 in grade 11
leamaydayaganon81
?
PPTX
Daily, Weekly, Monthly Report MTC March 2025.pptx
PanjiDewaPamungkas1
?
DOCX
Artigo - Playing to Win.planejamento docx
KellyXavier15
?
DOCX
Udemy - data management Luisetto Mauro.docx
M. Luisetto Pharm.D.Spec. Pharmacology
?
PPTX
ppt somu_Jarvis_AI_Assistant_presen.pptx
MohammedumarFarhan
?
PPT
Camuflaje Tipos Características Militar 2025.ppt
e58650738
?
DOCX
brigada_PROGRAM_25.docx the boys white house
RonelNebrao
?
PPTX
727325165-Unit-1-Data-Analytics-PPT-1.pptx
revathi148366
?
PPTX
english9quizw1-240228142338-e9bcf6fd.pptx
rossanthonytan130
?
PDF
Microsoft Power BI - Advanced Certificate for Business Intelligence using Pow...
Prasenjit Debnath
?
PDF
Orchestrating Data Workloads With Airflow.pdf
ssuserae5511
?
PPTX
@Reset-Password.pptx presentakh;kenvtion
MarkLariosa1
?
PPSX
PPT1_CB_VII_CS_Ch3_FunctionsandChartsinCalc.ppsx
animaroy81
?
PDF
SaleServicereport and SaleServicereport
2251330007
?
Exploiting the Low Volatility Anomaly: A Low Beta Model Portfolio for Risk-Ad...
Bradley Norbom, CFA
?
TCU EVALUATION FACULTY TCU Taguig City 1st Semester 2017-2018
MELJUN CORTES
?
一比一原版(罢鲍颁毕业证书)开姆尼茨工业大学毕业证如何办理
taqyed
?
NVIDIA Triton Inference Server, a game-changing platform for deploying AI mod...
Tamanna36
?
ilide.info-tg-understanding-culture-society-and-politics-pr_127f984d2904c57ec...
jed P
?
Presentation by Tariq & Mohammed (1).pptx
AbooddSandoqaa
?
25 items quiz for practical research 1 in grade 11
leamaydayaganon81
?
Daily, Weekly, Monthly Report MTC March 2025.pptx
PanjiDewaPamungkas1
?
Artigo - Playing to Win.planejamento docx
KellyXavier15
?
Udemy - data management Luisetto Mauro.docx
M. Luisetto Pharm.D.Spec. Pharmacology
?
ppt somu_Jarvis_AI_Assistant_presen.pptx
MohammedumarFarhan
?
Camuflaje Tipos Características Militar 2025.ppt
e58650738
?
brigada_PROGRAM_25.docx the boys white house
RonelNebrao
?
727325165-Unit-1-Data-Analytics-PPT-1.pptx
revathi148366
?
english9quizw1-240228142338-e9bcf6fd.pptx
rossanthonytan130
?
Microsoft Power BI - Advanced Certificate for Business Intelligence using Pow...
Prasenjit Debnath
?
Orchestrating Data Workloads With Airflow.pdf
ssuserae5511
?
@Reset-Password.pptx presentakh;kenvtion
MarkLariosa1
?
PPT1_CB_VII_CS_Ch3_FunctionsandChartsinCalc.ppsx
animaroy81
?
SaleServicereport and SaleServicereport
2251330007
?
Ad

Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, Terence Sim

  • 1. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #1 Is Face Recognition Safe from Realizable Attacks? Sanjay Saha (presenting), Terence Sim National University of Singapore {sanjaysaha, tsim}@comp.nus.edu.sg
  • 2. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #2 Motivation ? Face recognition is a highly used biometric. ? A common target to various attacks. ? State-of-the-art FRSs are vulnerable to previous attacks. Source: link M. Sharif, L. Bauer, and M. K. Reiter, “Accessorize to a Crime : Real and Stealthy Attacks on State-of-the-Art Face Recognition,” pp. 1528–1540, 2016. Source: link Our goal is to examine vulnerability of FRSs in Black-box settings
  • 3. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #3 Realizable Attack on Face Recognition Systems ? FRS is used to authenticate users of the building. ? FRS is attended by a security guard. ? The Attacker wants to get into the building by fooling the FRS. ? He also must try not raise suspicion of the security guard. ? The attacker does not know (black-box) the internal structure of the FRS. Main requirements of a Realizable Attack on FRS.
  • 4. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #4 Proposed Method
  • 5. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #5 Attack Scheme Attack Gallery Victim(s) Break-in Attacker is NOT IN the gallery No specific Victim Impersonation Attacker is NOT IN the gallery One, selected by Attacker Evasion Attacker is IN the gallery No specific Victim if it is not the Attacker
  • 6. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #7 Face Synthesizer ? Main focus is to generate realizable face images so that it can be replicated in real-world scenarios. ? We use the MMDA Face Synthesizer1 ? Capable of generating realistic-looking faces from the given different variations of training face images. ? = ?1, ?2 ???? ???? ?1, ?2, ?3 ???? ?1, ?2 ???????? ?1, ?2 ?????????? ? MMDA because it is easy to train and it produces good quality realistic images. 1Terence Sim and Li Zhang. Controllable face privacy. In 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), volume 4, pages 1–8. IEEE, 2015
  • 7. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #9 Training the Face Synthesizer Two other attackers 72 combinations of Attacker 1
  • 8. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #10 Results
  • 9. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #11 Successful Attacks (1) Successful Break-in attacks AttackersBroke-inas Generated faces
  • 10. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #12 Successful Attacks (2) Successful Impersonation attacks AttackersTargetedas Generated faces
  • 11. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #13 Realizing the attacks Generated face Real Face Attackers Victims Generated faceReal Face
  • 12. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #14 Unsuccessful Attacks ? When the ‘gallery’ is built with faces from different race, gender, etc. ? Evasion attacks Attacker 1 Attacker 2 Failed Impersonation attack by Attacker 1, and Attacker 2
  • 13. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #15 Findings – Variation of Galleries Counting successful attacks for different galleries with varying difficulties
  • 14. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #16 Findings – Different Gallery Sizes Increasing gallery sizes increases chance of successful attacks
  • 15. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #17 Summary ? Approximately 21.8% of the attacks (Break-in and Impersonation) were successful for all the attackers. ? Real perturbations of the attackers’ face succeed in break-in and impersonation attacks. ? Impersonation attacks depend on the similarity between the Attacker and the Victim. ? Good initial parameter vector also plays an important role. ? Our work makes a clarion call for urgent research to address these vulnerabilities in FRS. We hope other researchers will take up this challenge.
  • 16. Is Face Recognition Safe from Realizable Attacks? – Sanjay Saha*, Terence Sim IJCB 2020 | slide #18