Luma Omar
Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks
Omar, Luma; Ivrissimtzis, Ioannis
Authors
Dr Ioannis Ivrissimtzis ioannis.ivrissimtzis@durham.ac.uk
Associate Professor
Contributors
Xianghua Xie
Editor
Mark W. Jones
Editor
Gary K. L. Tam
Editor
Abstract
This paper presents an experiment designed to test the resilience of several user verification systems based on face recognition technology against simple identity spoofing methods, such as trying to gain access to the system by using mobile camera shots of the users, their ID cards, or social media photos of them that are available online. We also aim at identifying the compression threshold above which a photo can be used to gain access to the system. Four major user verification tools were tested: Keyemon and Luxand Blink on Windows and Android Face Unlock and FaceLock on Android. The results show all tested systems to be vulnerable to even very crude attacks, indicating that the technology is not ready yet for adoption in applications where security rather than user convenience is the main concern.
Citation
Omar, L., & Ivrissimtzis, I. (2015). Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks. In X. Xie, M. W. Jones, & G. K. L. Tam (Eds.), Proceedings of the 7th UK Computer Vision Student Workshop (BMVW) (5.1-5.9). https://doi.org/10.5244/c.29.bmvw.5
Presentation Conference Type | Conference Paper (Published) |
---|---|
Conference Name | 7th UK Computer Vision Student Workshop (BMVW) |
Acceptance Date | Jul 30, 2015 |
Publication Date | Sep 1, 2015 |
Deposit Date | Apr 18, 2016 |
Publicly Available Date | Apr 28, 2016 |
Pages | 5.1-5.9 |
Book Title | Proceedings of the 7th UK Computer Vision Student Workshop (BMVW). |
DOI | https://doi.org/10.5244/c.29.bmvw.5 |
Public URL | https://durham-repository.worktribe.com/output/1150498 |
Files
Published Conference Proceeding
(664 Kb)
PDF
You might also like
Designing a facial spoofing database for processed image attacks
(2016)
Presentation / Conference Contribution
Resilience of Luminance based Liveness Tests under Attacks with Processed Imposter Images
(2016)
Presentation / Conference Contribution
Anomaly Detection with Transformers in Face Anti-spoofing
(2023)
Presentation / Conference Contribution
Bivariate non-uniform subdivision schemes based on L-systems
(2023)
Journal Article
Downloadable Citations
About Durham Research Online (DRO)
Administrator e-mail: dro.admin@durham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search