Poisoning attacks on face authentication systems by using the generative deformation model

被引:2
|
作者
Chan, Chak-Tong [1 ]
Huang, Szu-Hao [2 ]
Choy, Patrick Puiyui [2 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Inst Informat Management, 1001 Univ Rd, Hsinchu 300, Taiwan
[2] Natl Yang Ming Chiao Tung Univ, Dept Informat Management & Finance, 1001 Univ Rd, Hsinchu 300, Taiwan
关键词
Facial recognition; Adversarial attack; Poisoning attack; Computer vision; Image deformation; Information security;
D O I
10.1007/s11042-023-14695-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various studies have revealed the vulnerabilities of machine learning algorithms. For example, a hacker can poison a deep learning facial recognition system by impersonating an administrator and obtaining confidential information. According to studies, poisoning attacks are typically implemented based on the optimization conditions of the machine learning algorithm. However, neural networks, because of their complexity, are typically unsuited for these attacks. Although several poisoning strategies have been developed against deep facial recognition systems, poor image qualities and unrealistic assumptions remain the drawbacks of these strategies. Therefore, we proposed a black-box poisoning attack strategy against facial recognition systems, which works by injecting abnormal data generated by using elastic transformation to deform the facial components. We demonstrated the performance of the proposed strategy using the VGGFace2 data set to attack various facial extractors. The proposed strategy outperformed its counterparts in the literature. The contributions of the study lie in 1) providing a novel method of attack against a nonoverfitting facial recognition system with fewer injections, 2) applying a new image transformation technique to compose malicious samples, and 3) formulating a method that leaves no trace of modification to the human eye.
引用
收藏
页码:29457 / 29476
页数:20
相关论文
共 50 条
  • [41] Face authentication using a hybrid approach
    Struc, Vitomir
    Mihelic, France
    Pavesic, Nikola
    JOURNAL OF ELECTRONIC IMAGING, 2008, 17 (01)
  • [42] Person Authentication Using Face Detection
    Vaidehi, V.
    Vasuhi, S.
    Kayalvizhi, R.
    Mariammal, K.
    Raghuraman, M. B.
    Sundara, Raman, V
    Meenakshi, L.
    Anupriyadharshini, V
    Thangamani, T.
    WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2008, : 1166 - 1171
  • [43] Face authentication using the trace transform
    Srisuk, S
    Petrou, M
    Kurutach, W
    Kadyrov, A
    2003 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2003, : 305 - 312
  • [44] Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
    Shan, Shawn
    Ding, Wenxin
    Passananti, Josephine
    Wu, Stanley
    Zheng, Haitao
    Zhao, Ben Y.
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 807 - 825
  • [45] Data Poisoning and Backdoor Attacks on Audio Intelligence Systems
    Ge, Yunjie
    Wang, Qian
    Yu, Jiayuan
    Shen, Chao
    Li, Qi
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (12) : 176 - 182
  • [46] Poisoning Attacks to Graph-Based Recommender Systems
    Fang, Minghong
    Yang, Guolei
    Gong, Neil Zhenqiang
    Liu, Jia
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 381 - 392
  • [47] Data Poisoning Attacks Against Federated Learning Systems
    Tolpegin, Vale
    Truex, Stacey
    Gursoy, Mehmet Emre
    Liu, Ling
    COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 480 - 501
  • [48] Towards Data Poisoning Attacks in Crowd Sensing Systems
    Miao, Chenglin
    Li, Qi
    Xiao, Houping
    Jiang, Wenjun
    Huai, Mengdi
    Su, Lu
    PROCEEDINGS OF THE 2018 THE NINETEENTH INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC '18), 2018, : 111 - 120
  • [49] Multi Model Personal Authentication Using Finger Vein and Face Images (MPAFFI)
    Manjunathswamy, B. E.
    Thriveni, J.
    Venugopal, K. R.
    Patnaik, L. M.
    2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 339 - 344
  • [50] Detecting Poisoning Attacks on Hierarchical Malware Classification Systems
    Guralnik, Dan P.
    Moran, Bill
    Pezeshki, Ali
    Arslan, Omur
    CYBER SENSING 2017, 2017, 10185