Accurate and Robust Neural Networks for Security Related Applications Exampled by Face Morphing Attacks

06/11/2018
by   Clemens Seibold, et al.
4

Artificial neural networks tend to learn only what they need for a task. A manipulation of the training data can counter this phenomenon. In this paper, we study the effect of different alterations of the training data, which limit the amount and position of information that is available for the decision making. We analyze the accuracy and robustness against semantic and black box attacks on the networks that were trained on different training data modifications for the particular example of morphing attacks. A morphing attack is an attack on a biometric facial recognition system where the system is fooled to match two different individuals with the same synthetic face image. Such a synthetic image can be created by aligning and blending images of the two individuals that should be matched with this image.

READ FULL TEXT

page 4

page 8

page 11

page 13

page 14

research
07/05/2018

Reflection Analysis for Face Morphing Attack Detection

A facial morph is a synthetically created image of a face that looks sim...
research
06/16/2021

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

As the curation of data for machine learning becomes increasingly automa...
research
12/09/2019

Amora: Black-box Adversarial Morphing Attack

Nowadays, digital facial content manipulation has become ubiquitous and ...
research
01/08/2023

Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons

In this paper we describe how to plant novel types of backdoors in any f...
research
04/23/2023

An Efficient Ensemble Explainable AI (XAI) Approach for Morphed Face Detection

The extensive utilization of biometric authentication systems have emana...
research
03/01/2021

Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack

Recently, significant advancements have been made in face recognition te...
research
07/30/2021

Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

Deep neural networks represent a powerful option for many real-world app...

Please sign up or login with your details

Forgot password? Click here to reset