研究生: |
林奕奇 Lin, Yi-Chi |
---|---|
論文名稱: |
以生成圖片變形針對人臉防偽辨識進行智能展示攻擊 Intelligent Presentation Attack Against Face Anti-spoofing Based on Generative Image Morphing |
指導教授: |
賴尚宏
Lai, Shang-Hong 黃思皓 Huang, Szu-Hao |
口試委員: |
帥宏翰
Shuai, Hong-Han 何宗易 Ho, Tsung-Yi 江振國 Chiang, Chen-Kuo |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2021 |
畢業學年度: | 109 |
語文別: | 英文 |
論文頁數: | 47 |
中文關鍵詞: | 深度學習 、人臉防偽辨識 、對抗例攻擊 、影像變形 |
外文關鍵詞: | Deep learning, Face anti-spoofing, Adversarial attack, Image morphing |
相關次數: | 點閱:4 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
人臉防偽辨識對於人臉辨識系統的安全性至關重要,已經有許多基於卷積神經網路的防偽方法被提出,而且這些方法都表現出了良好的性能。儘管取得了這些成功,但卷積神經網路對於對抗樣本的脆弱性讓這些防偽方法容易受到攻擊。
在這項研究中,對抗性雜訊被用於為幾種防偽方法製作對抗樣本,多種攻擊方法被應用於多幀防偽方法以研究其脆弱性。我們證明即便是傳統方法也有機會可以成功攻擊這些防偽模型。然而,在一些困難的攻擊對象如多幀防偽模型,以這些方法所生成的攻擊圖片在攻擊過程中通常會嚴重失真且容易被人眼識別。由於需要大量的雜訊來欺騙模型,這些雜訊方法可能不適合用於攻擊多幀防偽模型。因此,我們提出了一種新的智能展示攻擊以生成變形圖片來有效地攻擊反偽方法。
我們方法的泛化性透過對四個公開可使用的數據集進行多次實驗來驗證,實驗結果證實我們的方法表現良好,並且使用該方法所產生的攻擊圖片比使用傳統雜訊方法的圖片失真更少。此外,我們證明了使用元學習訓練並具有較強域泛化能力的防偽模型也容易受到這些攻擊。
Face anti-spoofing critically contributes to the security of face recognition systems. Numerous anti-spoofing approaches based on convolutional neural networks (CNNs) have been proposed, and they have shown promising performance. Despite these successes, the vulnerability of CNNs to adversarial examples leaves these anti-spoofing methods vulnerable to attacks.
In this study, adversarial noise is used to craft adversarial examples for several anti-spoofing methods, and various attack methods are applied to investigate the vulnerability of the multi-frame anti-spoofing approach. We demonstrate that even conventional methods can possibly attack these anti-spoofing models successfully. However, in some difficult attack targets such as a multi-frame anti-spoofing model, the attack image generated by these methods is typically heavily distorted during the attack process and can easily be distinguished by human eyes. Because a large amount of noise is needed to deceive the model, these noise methods may be unsuitable for attacking a multi-frame anti-spoofing model. Thus, we proposed a new intelligent face presentation attack approach to generate morph images to effectively attack anti-spoofing approaches.
The generalization of our methodology was validated through several experiments on four publicly available datasets. The experimental results showed that the proposed method performed promisingly, and the attack images generated using this method appeared less distorted than those produced using conventional noise methods. Moreover, we demonstrated that an anti-spoofing model trained using meta-learning and having strong domain generalizability is also vulnerable to these attacks.
[1] Naveed Akhtar and Ajmal Mian. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access, 6:14410–14430, 2018.
[2] Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. Face antispoofing using speededup robust features and fisher vector encoding. IEEE Signal Processing Letters, 24(2):141–145, 2016.
[3] Zinelabidine Boulkenafet, Jukka Komulainen, and Abdenour Hadid. Face
spoofing detection using colour texture analysis. IEEE Transactions on Information Forensics and Security, 11(8):1818–1830, 2016.
[4] Zinelabinde Boulkenafet, Jukka Komulainen, Lei Li, Xiaoyi Feng, and Abdenour Hadid. Oulunpu: A mobile face presentation attack database with realworld variations. In 2017 12th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2017), pages 612–618. IEEE, 2017.
[5] Nicholas Carlini and David Wagner. Towards evaluating the robustness of neural networks. In 2017 ieee symposium on security and privacy (sp), pages 39–57. IEEE, 2017.
[6] Ivana Chingovska, André Anjos, and Sébastien Marcel. On the effectiveness of local binary patterns in face antispoofing. In 2012 BIOSIGproceedings of the international conference of biometrics special interest group (BIOSIG), pages 1–7. IEEE, 2012.
[7] Naser Damer, Alexandra Mosegui Saladie, Andreas Braun, and Arjan Kuijper. Morgan: Recognition vulnerability and attack detectability of face morphing attacks created by generative adversarial network. In 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS), pages 1–10. IEEE, 2018.
[8] Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, and Jianguo Li. Boosting adversarial attacks with momentum. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 9185–9193, 2018.
[9] Yinpeng Dong, Tianyu Pang, Hang Su, and Jun Zhu. Evading defenses to transferable adversarial examples by translationinvariant attacks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 4312–4321, 2019.
[10] Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati,
Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, and Dawn Song. Robust
physicalworld attacks on deep learning visual classification. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1625–1634, 2018.
[11] Matteo Ferrara, Annalisa Franco, and Davide Maltoni. The magic passport. In IEEE International Joint Conference on Biometrics, pages 1–7. IEEE, 2014.
[12] Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572, 2014.
[13] Diego Gragnaniello, Giovanni Poggi, Carlo Sansone, and Luisa Verdoliva. An investigation of local descriptors for biometric spoofing detection. IEEE transactions on information forensics and security, 10(4):849–863, 2015.
[14] Jukka Komulainen, Abdenour Hadid, and Matti Pietikäinen. Context based face antispoofing. In 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pages 1–8. IEEE, 2013.
[15] Iryna Korshunova, Wenzhe Shi, Joni Dambre, and Lucas Theis. Fast faceswap using convolutional neural networks. In Proceedings of the IEEE International Conference on Computer Vision, pages 3677–3685, 2017.
[16] Alexey Kurakin, Ian Goodfellow, and Samy Bengio. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533, 2016.
[17] Haoliang Li, Wen Li, Hong Cao, Shiqi Wang, Feiyue Huang, and Alex C Kot. Unsupervised domain adaptation for face antispoofing. IEEE Transactions on Information Forensics and Security, 13(7):1794–1809, 2018.
[18] Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, and John E Hopcroft.
Nesterov accelerated gradient and scale invariance for adversarial attacks. arXiv preprint arXiv:1908.06281, 2019.
[19] Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. Learning deep models for face antispoofing: Binary or auxiliary supervision. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 389–398, 2018.
[20] Oeslle Lucena, Amadeu Junior, Vitor Moia, Roberto Souza, Eduardo Valle, and Roberto Lotufo. Transfer learning using convolutional neural networks for face antispoofing. In International Conference Image Analysis and Recognition, pages 27–34. Springer, 2017.
[21] Jukka Määttä, Abdenour Hadid, and Matti Pietikäinen. Face spoofing detection from single images using microtexture analysis. In 2011 international joint conference on Biometrics (IJCB), pages 1–7. IEEE, 2011.
[22] Nicolas Papernot, Ian Goodfellow, Ryan Sheatsley, Reuben Feinman, and
Patrick McDaniel. cleverhans v2. 0.0: an adversarial machine learning library. arXiv preprint arXiv:1610.00768, 10, 2016.
[23] Keyurkumar Patel, Hu Han, and Anil K Jain. Secure face unlock: Spoof detection on smartphones. IEEE transactions on information forensics and security, 11(10):2268–2283, 2016.
[24] Olaf Ronneberger, Philipp Fischer, and Thomas Brox. Unet: Convolutional networks for biomedical image segmentation. In International Conference on Medical image computing and computerassisted intervention, pages 234–241. Springer, 2015.
[25] Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, et al. Imagenet large scale visual recognition challenge. International journal of computer vision, 115(3):211–252, 2015.
[26] Ulrich Scherhag, Christian Rathgeb, Johannes Merkle, Ralph Breithaupt, and Christoph Busch. Face recognition systems under morphing attacks: A survey. IEEE Access, 7:23012–23026, 2019.
[27] Florian Schroff, Dmitry Kalenichenko, and James Philbin. Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 815–823, 2015.
[28] Rui Shao, Xiangyuan Lan, Jiawei Li, and Pong C Yuen. Multiadversarial
discriminative deep domain generalization for face presentation attack detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 10023–10031, 2019.
[29] Rui Shao, Xiangyuan Lan, and Pong C Yuen. Regularized finegrained meta face antispoofing. In AAAI, pages 11974–11981, 2020.
[30] Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199, 2013.
[31] Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan
Boneh, and Patrick McDaniel. Ensemble adversarial training: Attacks and
defenses. arXiv preprint arXiv:1705.07204, 2017.
[32] Guoqing Wang, Hu Han, Shiguang Shan, and Xilin Chen. Unsupervised adversarial domain adaptation for crossdomain face presentation attack detection. IEEE Transactions on Information Forensics and Security, 16:56–69, 2020.
[33] Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G Ororbia II, Xinyu Xing, Xue Liu, and C Lee Giles. Learning adversaryresistant deep neural networks. arXiv preprint arXiv:1612.01401, 2016.
[34] Run Wang, Felix JuefeiXu, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma,
and Yang Liu. Amora: Blackbox adversarial morphing attack. In Proceedings
of the 28th ACM International Conference on Multimedia, pages 1376–1385,
2020.
[35] Zezheng Wang, Zitong Yu, Chenxu Zhao, Xiangyu Zhu, Yunxiao Qin,
Qiusheng Zhou, Feng Zhou, and Zhen Lei. Deep spatial gradient and temporal depth learning for face antispoofing. In Proceedings of the IEEE/CVF
Conference on Computer Vision and Pattern Recognition, pages 5042–5051,
2020.
[36] Zezheng Wang, Chenxu Zhao, Yunxiao Qin, Qiusheng Zhou, Guojun Qi, Jun
Wan, and Zhen Lei. Exploiting temporal and depth information for multiframe face antispoofing. arXiv preprint arXiv:1811.05118, 2018.
[37] Di Wen, Hu Han, and Anil K Jain. Face spoof detection with image distortion analysis. IEEE Transactions on Information Forensics and Security, 10(4):746–761, 2015.
[38] Cihang Xie, Jianyu Wang, Zhishuai Zhang, Yuyin Zhou, Lingxi Xie, and Alan Yuille. Adversarial examples for semantic segmentation and object detection. In Proceedings of the IEEE International Conference on Computer Vision, pages 1369–1378, 2017.
[39] Cihang Xie, Zhishuai Zhang, Yuyin Zhou, Song Bai, Jianyu Wang, Zhou Ren, and Alan L Yuille. Improving transferability of adversarial examples with input diversity. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 2730–2739, 2019.
[40] Jianwei Yang, Zhen Lei, and Stan Z Li. Learn convolutional neural network for face antispoofing. arXiv preprint arXiv:1408.5601, 2014.
[41] Zhiwei Zhang, Junjie Yan, Sifei Liu, Zhen Lei, Dong Yi, and Stan Z Li. A face antispoofing database with diverse attacks. In 2012 5th IAPR international conference on Biometrics (ICB), pages 26–31. IEEE, 2012.
[42] I Standard. Information technology—biometric presentation attack detection—part 1: Framework. ISO: Geneva, Switzerland, 2016.
[43] Jiankang Deng, Jia Guo, Niannan Xue, and Stefanos Zafeiriou. Arcface: Additive angular margin loss for deep face recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages
4690–4699, 2019.
[44] Omkar M Parkhi, Andrea Vedaldi, and Andrew Zisserman. Deep face recognition. 2015.
[45] Sefik Ilkin Serengil and Alper Ozpinar. Lightface: A hybrid deep face recognition framework. In 2020 Innovations in Intelligent Systems and Applications Conference (ASYU), pages 23–27. IEEE, 2020.
[46] Yi Sun, Xiaogang Wang, and Xiaoou Tang. Deep learning face representation from predicting 10,000 classes. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1891–1898, 2014.
[47] Yaniv Taigman, Ming Yang, Marc’Aurelio Ranzato, and Lior Wolf. Deepface: Closing the gap to humanlevel performance in face verification. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1701–1708, 2014.
[48] Yousef Atoum, Yaojie Liu, Amin Jourabloo, and Xiaoming Liu. Face antispoofing using patch and depthbased cnns. In 2017 IEEE International Joint Conference on Biometrics (IJCB), pages 319–328. IEEE, 2017.
[49] Bowen Zhang, Benedetta Tondi, and Mauro Barni. Adversarial examples for replay attacks against cnnbased face recognition with antispoofing capability. Computer Vision and Image Understanding, 197:102988, 2020.
[50] Jeremy Cohen, Elan Rosenfeld, and Zico Kolter. Certified adversarial robustness via randomized smoothing. In International Conference on Machine Learning, pages 1310–1320. PMLR, 2019.
[51] Zihao Liu, Qi Liu, Tao Liu, Nuo Xu, Xue Lin, Yanzhi Wang, and Wujie Wen. Feature distillation: Dnnoriented jpeg compression against adversarial examples. In 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 860–868. IEEE, 2019.