Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks
Luma Omar and Ioannis Ivrissimtzis
Abstract
This paper presents an experiment designed to test the resilience of several user verification systems based on face recognition technology against simple identity spoofing methods, such as trying to gain access to the system by using mobile camera shots of the users, their ID cards, or social media photos of them that are available online. We also aim at identifying the compression threshold above which a photo can be used to gain access to the system. Four major user verification tools were tested: Keyemon and Luxand Blink on Windows and Android Face Unlock and FaceLock on Android. The results show all tested systems to be vulnerable to even very crude attacks, indicating that the technology is not ready yet for adoption in applications where security rather than user convenience is the main concern.
Session
Workshop: 7th UK Computer Vision Student Workshop (BMVW 2015)
Files
Paper (PDF, 637K)
DOI
10.5244/C.29.BMVW.5
https://dx.doi.org/10.5244/C.29.BMVW.5
Citation
Luma Omar and Ioannis Ivrissimtzis. Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks. In Gary K. L. Tam, editor, Proceedings of the 7th UK Computer Vision Student Workshop (BMVW), pages 5.1-5.9. BMVA Press, September 2015.
Bibtex
@inproceedings{BMVW2015_5,
title={Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks},
author={Luma Omar and Ioannis Ivrissimtzis},
year={2015},
month={September},
pages={5.1-5.9},
articleno={5},
numpages={9},
booktitle={Proceedings of the 7th UK Computer Vision Student Workshop (BMVW)},
publisher={BMVA Press},
editor={Gary K. L. Tam},
doi={10.5244/C.29.BMVW.5},
isbn={1-901725-58-8},
url={https://dx.doi.org/10.5244/C.29.BMVW.5}
}