Poisoning attacks on face authentication systems by using the generative deformation model

被引:2
|
作者
Chan, Chak-Tong [1 ]
Huang, Szu-Hao [2 ]
Choy, Patrick Puiyui [2 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Inst Informat Management, 1001 Univ Rd, Hsinchu 300, Taiwan
[2] Natl Yang Ming Chiao Tung Univ, Dept Informat Management & Finance, 1001 Univ Rd, Hsinchu 300, Taiwan
关键词
Facial recognition; Adversarial attack; Poisoning attack; Computer vision; Image deformation; Information security;
D O I
10.1007/s11042-023-14695-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various studies have revealed the vulnerabilities of machine learning algorithms. For example, a hacker can poison a deep learning facial recognition system by impersonating an administrator and obtaining confidential information. According to studies, poisoning attacks are typically implemented based on the optimization conditions of the machine learning algorithm. However, neural networks, because of their complexity, are typically unsuited for these attacks. Although several poisoning strategies have been developed against deep facial recognition systems, poor image qualities and unrealistic assumptions remain the drawbacks of these strategies. Therefore, we proposed a black-box poisoning attack strategy against facial recognition systems, which works by injecting abnormal data generated by using elastic transformation to deform the facial components. We demonstrated the performance of the proposed strategy using the VGGFace2 data set to attack various facial extractors. The proposed strategy outperformed its counterparts in the literature. The contributions of the study lie in 1) providing a novel method of attack against a nonoverfitting facial recognition system with fewer injections, 2) applying a new image transformation technique to compose malicious samples, and 3) formulating a method that leaves no trace of modification to the human eye.
引用
收藏
页码:29457 / 29476
页数:20
相关论文
共 50 条
  • [21] Client authentication model using duplicated authentication server systems
    Lee, JW
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 655 - 662
  • [22] Few pixels attacks with generative model
    Li, Yang
    Pan, Quan
    Feng, Zhaowen
    Cambria, Erik
    PATTERN RECOGNITION, 2023, 144
  • [23] Attacks on state-of-the-art face recognition using attentional adversarial attack generative network
    Yang, Lu
    Song, Qing
    Wu, Yingqi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (01) : 855 - 875
  • [24] Attacks on state-of-the-art face recognition using attentional adversarial attack generative network
    Lu Yang
    Qing Song
    Yingqi Wu
    Multimedia Tools and Applications, 2021, 80 : 855 - 875
  • [25] Generative Adversarial Attacks on Fingerprint Recognition Systems
    Kwon, Hee Won
    Nam, Jea-Won
    Kim, Joongheon
    Lee, Youn Kyu
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 483 - 485
  • [26] Securing Distributed Network Digital Twin Systems Against Model Poisoning Attacks
    Zhang, Zifan
    Fang, Minghong
    Chen, Mingzhe
    Li, Gaolei
    Lin, Xi
    Liu, Yuchen
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 34312 - 34324
  • [27] Attacks and defenses in user authentication systems: A survey
    Wang, Xuerui
    Yan, Zheng
    Zhang, Rui
    Zhang, Peng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 188
  • [28] Generative Adversarial Attacks Against Intrusion Detection Systems Using Active Learning
    Shu, Dule
    Leslie, Nandi O.
    Kamhoua, Charles A.
    Tucker, Conrad S.
    PROCEEDINGS OF THE 2ND ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2020, 2020, : 1 - 6
  • [29] Continuous Authentication Using EEG and Face Images for Trusted Autonomous Systems
    Wang, Min
    Abbass, Hussein A.
    Hu, Jiankun
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [30] A Generative Model of Cultural Face Attractiveness
    Zhan, Jiayu
    Liu, Meng
    Garrod, Oliver G. B.
    Jack, Rachael E.
    Schyns, Philippe G.
    PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON INTELLIGENT VIRTUAL AGENTS (ACM IVA 2020), 2020,