2023
DOI: 10.1109/access.2023.3282780
|View full text |Cite
|
Sign up to set email alerts
|

Attacking Face Recognition With T-Shirts: Database, Vulnerability Assessment, and Detection

Abstract: Face recognition systems are widely deployed for biometric authentication. Despite this, it is well-known that, without any safeguards, face recognition systems are highly vulnerable to presentation attacks. In response to this security issue, several promising methods for detecting presentation attacks have been proposed which show high performance on existing benchmarks. However, an ongoing challenge is the generalization of presentation attack detection methods to unseen and new attack types. To this end, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 50 publications
0
0
0
Order By: Relevance
“…Adv-hat [31] utilized a printed sticker with a pattern that is applied to a hat to attack face recognition models. Ibsen et al [32] printed specially crafted facial images on T-shirts to confuse face recognition systems. Digital domain attacks involve directly modifying digital images using computer programs.…”
Section: Adversarial Attacks For Face Recognitionmentioning
confidence: 99%
“…Adv-hat [31] utilized a printed sticker with a pattern that is applied to a hat to attack face recognition models. Ibsen et al [32] printed specially crafted facial images on T-shirts to confuse face recognition systems. Digital domain attacks involve directly modifying digital images using computer programs.…”
Section: Adversarial Attacks For Face Recognitionmentioning
confidence: 99%
“…Additionally, the system will think about using face recognition-based deep learning with sparse representation. M. Ibsen et al states in [2] that with the development of deep learning and the availability of big face databases, face recognition has become more common. In spite of this, it is evident that these systems are susceptible to presentation assaults, which need for strong detection techniques in order to prevent a facial recognition system's security from being compromised.…”
Section: Introductionmentioning
confidence: 99%