Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study

نویسندگان

چکیده

As face presentation attacks (PAs) are realistic threats for unattended verification systems, attack detection (PAD) has been intensively investigated in past years, and the recent advances PAD have significantly reduced success rate of such attacks. In this article, an empirical study on a novel effective impostor PA is made. proposed PA, facial artifact created by using most vulnerable components, which optimally selected based vulnerability analysis different components to PAs. An attacker can launch presenting his or her own real face. With collected database containing various types artifacts instruments (PAIs), experimental results show that poses more serious threat systems compared with print, replay, mask Moreover, generalization ability regard commercial also evaluating unknown real-world systems. It provides new paradigm

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Addressing the Vulnerabilities of Likelihood-Ratio-Based Face Verification

Anti-spoofing protection of biometric systems is always a serious issue in real-life applications of an automatic personal verification system. Despite the fact that face image is the most common way of identifying persons and one of the most popular modalities in automatic biometric authentication, little attention has been given to the spoof resistance of face verification algorithms. In this...

متن کامل

Iris Based Identity Verification Robust to Sample Presentation Security Attacks

Iris based identity verification is highly reliable but it can also be subject to attacks. Pupil dilation or constriction stimulated by the application of drugs are examples of sample presentation security attacks which can lead to higher false rejection rates. Suspects on a watch list can potentially circumvent the iris based system using such methods. This paper investigates a new approach us...

متن کامل

Verification of Uncertain Knowledge-Based Systems: An Empirical Verification Approach

Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your perso...

متن کامل

What Do Firewalls Protect? An Empirical Study of Firewalls, Vulnerabilities, and Attacks

Firewalls are a cornerstone of how sites implement “defense in depth.” Many security policies assume that outside attackers must first penetrate a firewall configured to block their access. This paper examines what firewalls protect against, and whether those protections are sufficient to warrant placing the current level of trust in firewalls.

متن کامل

Facial Expression Recognition Based on Anatomical Structure of Human Face

Automatic analysis of human facial expressions is one of the challenging problems in machine vision systems. It has many applications in human-computer interactions such as, social signal processing, social robots, deceit detection, interactive video and behavior monitoring. In this paper, we develop a new method for automatic facial expression recognition based on facial muscle anatomy and hum...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM transactions on privacy and security

سال: 2021

ISSN: ['2471-2574', '2471-2566']

DOI: https://doi.org/10.1145/3491199