Poisoning attacks on face authentication systems by using the generative deformation model

被引:2
|
作者
Chan, Chak-Tong [1 ]
Huang, Szu-Hao [2 ]
Choy, Patrick Puiyui [2 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Inst Informat Management, 1001 Univ Rd, Hsinchu 300, Taiwan
[2] Natl Yang Ming Chiao Tung Univ, Dept Informat Management & Finance, 1001 Univ Rd, Hsinchu 300, Taiwan
关键词
Facial recognition; Adversarial attack; Poisoning attack; Computer vision; Image deformation; Information security;
D O I
10.1007/s11042-023-14695-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various studies have revealed the vulnerabilities of machine learning algorithms. For example, a hacker can poison a deep learning facial recognition system by impersonating an administrator and obtaining confidential information. According to studies, poisoning attacks are typically implemented based on the optimization conditions of the machine learning algorithm. However, neural networks, because of their complexity, are typically unsuited for these attacks. Although several poisoning strategies have been developed against deep facial recognition systems, poor image qualities and unrealistic assumptions remain the drawbacks of these strategies. Therefore, we proposed a black-box poisoning attack strategy against facial recognition systems, which works by injecting abnormal data generated by using elastic transformation to deform the facial components. We demonstrated the performance of the proposed strategy using the VGGFace2 data set to attack various facial extractors. The proposed strategy outperformed its counterparts in the literature. The contributions of the study lie in 1) providing a novel method of attack against a nonoverfitting facial recognition system with fewer injections, 2) applying a new image transformation technique to compose malicious samples, and 3) formulating a method that leaves no trace of modification to the human eye.
引用
收藏
页码:29457 / 29476
页数:20
相关论文
共 50 条
  • [31] Targeted Poisoning Attacks on Social Recommender Systems
    Hu, Rui
    Guo, Yuanxiong
    Pan, Miao
    Gong, Yanmin
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [32] Data Poisoning Attacks and Defenses to Crowdsourcing Systems
    Fang, Minghong
    Sun, Minghao
    Li, Qi
    Gong, Neil Zhenqiang
    Tian, Jin
    Liu, Jia
    PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, : 969 - 980
  • [33] Invisible Threats in the Data: A Study on Data Poisoning Attacks in Deep Generative Models
    Yang, Ziying
    Zhang, Jie
    Wang, Wei
    Li, Huan
    APPLIED SCIENCES-BASEL, 2024, 14 (19):
  • [34] A Generative Model for Evasion Attacks in Smart Grid
    Madhavarapu, Venkata Praveen Kumar
    Bhattacharjee, Shameek
    Dasy, Sajal K.
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [35] Adversarial Attacks and Defense on an Aircraft Classification Model Using a Generative Adversarial Network
    Colter, Jamison
    Kinnison, Matthew
    Henderson, Alex
    Harbour, Steven
    2023 IEEE/AIAA 42ND DIGITAL AVIONICS SYSTEMS CONFERENCE, DASC, 2023,
  • [36] Face recognition using support vector model classifier for user authentication
    Lin, Wen-Hui
    Wang, Ping
    Tsai, Chen-Fang
    ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2016, 18 : 71 - 82
  • [37] Exploring Data and Model Poisoning Attacks to Deep Learning-Based NLP Systems
    Marulli, Fiammetta
    Verde, Laura
    Campanile, Lelio
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 3570 - 3579
  • [38] MPHM: Model poisoning attacks on federal learning using historical information momentum
    Lei Shi
    Zhen Chen
    Yucheng Shi
    Lin Wei
    Yongcai Tao
    Mengyang He
    Qingxian Wang
    Yuan Zhou
    Yufei Gao
    SecurityandSafety, 2023, 2 (04) : 6 - 18
  • [39] On the Vulnerability of Face Recognition Systems Towards Morphed Face Attacks
    Scherhag, Ulrich
    Raghavendra, R.
    Raja, K. B.
    Gomez-Barrero, M.
    Rathgeb, C.
    Busch, C.
    2017 5TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF 2017), 2017,
  • [40] A proposal of social graph analysis for nursery schools using face authentication systems
    Tomioka T.
    Abe S.
    Hasegawa M.
    Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2017, 71 (04): : J151 - J154