Papers
Topics
Authors
Recent
Search
2000 character limit reached

AdvHat: Real-world adversarial attack on ArcFace Face ID system

Published 23 Aug 2019 in cs.CV | (1908.08705v1)

Abstract: In this paper we propose a novel easily reproducible technique to attack the best public Face ID system ArcFace in different shooting conditions. To create an attack, we print the rectangular paper sticker on a common color printer and put it on the hat. The adversarial sticker is prepared with a novel algorithm for off-plane transformations of the image which imitates sticker location on the hat. Such an approach confuses the state-of-the-art public Face ID model LResNet100E-IR, ArcFace@ms1m-refine-v2 and is transferable to other Face ID models.

Citations (257)

Summary

  • The paper demonstrates that a simple adversarial sticker can reduce face verification similarity scores by over 0.5 in diverse real-world scenarios.
  • The paper introduces a novel off-plane transformation algorithm that accurately models sticker positioning on hats to ensure robust perturbations under varying lighting and angles.
  • The paper shows that the attack is transferable across different facial recognition models, raising significant security concerns for current AI systems.

AdvHat: Real-world Adversarial Attack on ArcFace Face ID System

The paper "AdvHat: Real-world adversarial attack on ArcFace Face ID system" presents an innovative and practical method for crafting adversarial attacks against facial recognition systems, specifically targeting the ArcFace Face ID model. This research enhances our understanding of how to effectively disrupt highly sophisticated neural networks in real-world settings through novel adversarial methods.

This work primarily introduces a straightforward yet effective strategy for generating adversarial examples by crafting a rectangular paper sticker (advhat) that, when attached to a hat, confuses the ArcFace neural network. The researchers utilize a new algorithm that simulates off-plane transformations to account for the positioning of the sticker on the hat, thus generating perturbations robust against variations in shooting conditions such as lighting and angles.

Main Contributions

  • Adversarial Sticker Development: The authors create a simple-to-reproduce adversarial sticker that drastically decreases the similarity score of face verification, effectively misleading the state-of-the-art ArcFace Face ID system.
  • Novel Transformation Technique: The study introduces an off-plane transformation algorithm that accurately models the real-world position of a sticker on a hat, aiding in the creation of realistic adversarial images.
  • Transferability: A vital aspect of the research is the transferable nature of the attack across different face recognition neural networks, which poses critical security concerns as adversarial examples created for ArcFace also affect other models.

Numerical Outcomes and Results

Throughout the experiments, the adversarial stickers substantially reduced the cosine similarity between the ground truth facial embeddings and the adversarially altered images, showcasing the efficiency of the attack. Notably, the attack achieved reductions in similarity scores by more than 0.5 on average for most individuals, even under varying angles and lighting conditions. This demonstrates the method’s robustness and applicability in diverse real-world scenarios.

Implications and Future Directions

The implications of this research are significant for both the security and robustness of facial recognition technologies. The paper highlights the vulnerabilities of current AI models to adversarial attacks, demanding more robust training and defense techniques. Future work may involve developing advanced methods for detecting or preventing adversarial attacks on face recognition systems.

Moreover, as the attack is reproducible and uses accessible methods, it emphasizes the necessity of developing more reliable AI systems that are immune to such perturbations. The research opens pathways for future studies focusing on the deployment of adversarial learning and detection techniques, aiming to bolster the security of facial recognition models against real-world adversarial threats.

In summary, the AdvHat study serves as a compelling example of adversarial attack methodologies, reflecting the urgent need to address these vulnerabilities within AI-driven facial recognition frameworks. This work paves the way for future enhancements in the robustness of AI systems and contributes to the ongoing discourse on the security of neural networks in real-world applications.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.