Luma Omar
Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks
Omar, Luma; Ivrissimtzis, Ioannis
Authors
Dr Ioannis Ivrissimtzis ioannis.ivrissimtzis@durham.ac.uk
Associate Professor
Contributors
Xianghua Xie
Editor
Mark W. Jones
Editor
Gary K. L. Tam
Editor
Abstract
This paper presents an experiment designed to test the resilience of several user verification systems based on face recognition technology against simple identity spoofing methods, such as trying to gain access to the system by using mobile camera shots of the users, their ID cards, or social media photos of them that are available online. We also aim at identifying the compression threshold above which a photo can be used to gain access to the system. Four major user verification tools were tested: Keyemon and Luxand Blink on Windows and Android Face Unlock and FaceLock on Android. The results show all tested systems to be vulnerable to even very crude attacks, indicating that the technology is not ready yet for adoption in applications where security rather than user convenience is the main concern.
Citation
Omar, L., & Ivrissimtzis, I. (2015). Evaluating the Resilience of Face Recognition Systems Against Malicious Attacks. In X. Xie, M. W. Jones, & G. K. L. Tam (Eds.), Proceedings of the 7th UK Computer Vision Student Workshop (BMVW) (5.1-5.9). https://doi.org/10.5244/c.29.bmvw.5
Conference Name | 7th UK Computer Vision Student Workshop (BMVW) |
---|---|
Conference Location | Swansea, UK |
Acceptance Date | Jul 30, 2015 |
Publication Date | Sep 1, 2015 |
Deposit Date | Apr 18, 2016 |
Publicly Available Date | Mar 29, 2024 |
Pages | 5.1-5.9 |
Book Title | Proceedings of the 7th UK Computer Vision Student Workshop (BMVW). |
DOI | https://doi.org/10.5244/c.29.bmvw.5 |
Public URL | https://durham-repository.worktribe.com/output/1150498 |
Files
Published Conference Proceeding
(664 Kb)
PDF
You might also like
Designing a facial spoofing database for processed image attacks
(2016)
Conference Proceeding
Resilience of Luminance based Liveness Tests under Attacks with Processed Imposter Images
(2016)
Conference Proceeding
Bivariate non-uniform subdivision schemes based on L-systems
(2023)
Journal Article
Big data for human security: The case of COVID-19
(2022)
Journal Article
Quality perception and discrimination thresholds in quantised triangle meshes
(2021)
Conference Proceeding
Downloadable Citations
About Durham Research Online (DRO)
Administrator e-mail: dro.admin@durham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search