Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
نویسندگان
چکیده
As face presentation attacks (PAs) are realistic threats for unattended verification systems, attack detection (PAD) has been intensively investigated in past years, and the recent advances PAD have significantly reduced success rate of such attacks. In this article, an empirical study on a novel effective impostor PA is made. proposed PA, facial artifact created by using most vulnerable components, which optimally selected based vulnerability analysis different components to PAs. An attacker can launch presenting his or her own real face. With collected database containing various types artifacts instruments (PAIs), experimental results show that poses more serious threat systems compared with print, replay, mask Moreover, generalization ability regard commercial also evaluating unknown real-world systems. It provides new paradigm
منابع مشابه
Addressing the Vulnerabilities of Likelihood-Ratio-Based Face Verification
Anti-spoofing protection of biometric systems is always a serious issue in real-life applications of an automatic personal verification system. Despite the fact that face image is the most common way of identifying persons and one of the most popular modalities in automatic biometric authentication, little attention has been given to the spoof resistance of face verification algorithms. In this...
متن کاملIris Based Identity Verification Robust to Sample Presentation Security Attacks
Iris based identity verification is highly reliable but it can also be subject to attacks. Pupil dilation or constriction stimulated by the application of drugs are examples of sample presentation security attacks which can lead to higher false rejection rates. Suspects on a watch list can potentially circumvent the iris based system using such methods. This paper investigates a new approach us...
متن کاملVerification of Uncertain Knowledge-Based Systems: An Empirical Verification Approach
Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your perso...
متن کاملWhat Do Firewalls Protect? An Empirical Study of Firewalls, Vulnerabilities, and Attacks
Firewalls are a cornerstone of how sites implement “defense in depth.” Many security policies assume that outside attackers must first penetrate a firewall configured to block their access. This paper examines what firewalls protect against, and whether those protections are sufficient to warrant placing the current level of trust in firewalls.
متن کاملFacial Expression Recognition Based on Anatomical Structure of Human Face
Automatic analysis of human facial expressions is one of the challenging problems in machine vision systems. It has many applications in human-computer interactions such as, social signal processing, social robots, deceit detection, interactive video and behavior monitoring. In this paper, we develop a new method for automatic facial expression recognition based on facial muscle anatomy and hum...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM transactions on privacy and security
سال: 2021
ISSN: ['2471-2574', '2471-2566']
DOI: https://doi.org/10.1145/3491199