• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Dong, X. (Dong, X..) [1] | Miao, Z. (Miao, Z..) [2] | Ma, L. (Ma, L..) [3] | Shen, J. (Shen, J..) [4] | Jin, Z. (Jin, Z..) [5] | Guo, Z. (Guo, Z..) [6] | Teoh, A.B.J. (Teoh, A.B.J..) [7]

Indexed by:

Scopus

Abstract:

Face recognition based on deep convolutional neural networks (CNN) shows superior accuracy performance attributed to the high discriminative features extracted. Yet, the security and privacy of the extracted features from deep learning models (deep features) have often been overlooked. This paper proposes the reconstruction of face images from deep features without accessing the CNN network configurations as a constrained optimization problem. Such optimization minimizes the distance between the features extracted from the original face image and the reconstructed face image. Instead of directly solving the optimization problem in the image space, we innovatively reformulate the problem by looking for a latent vector of a generative adversarial networks (GAN) generator, then use it to generate the face image. The GAN generator serves a dual role in this novel framework, i.e., face distribution constraint of the optimization goal and a face generator. To solve this optimization problem, We present an optimization approach based on a Genetic Algorithm. On top of the novel optimization task, we also propose an attack pipeline to impersonate the target user based on the generated face image. Our results show that the generated face images can achieve a state-of-the-art successful attack rate of 99.33% on Labeled Faces in the Wild (LFW) under type-I attack at a false accept rate of 0.1%. Our work sheds light on biometric deployment to meet privacy-preserving and security policies. © 2022 Elsevier Ltd

Keyword:

Deep networks Deep templates Distribution constraint Face recognition GAN Template security

Community:

  • [ 1 ] [Dong, X.]Yonsei University, Seoul, South Korea
  • [ 2 ] [Miao, Z.]Fuzhou University, Fuzhou, China
  • [ 3 ] [Ma, L.]TCL AI Lab, Shenzhen, China
  • [ 4 ] [Shen, J.]TCL AI Lab, Shenzhen, China
  • [ 5 ] [Jin, Z.]Anhui University, Hefei, China
  • [ 6 ] [Guo, Z.]Tsinghua Shenzhen International Graduate School, Shenzhen, China
  • [ 7 ] [Teoh, A.B.J.]Yonsei University, Seoul, South Korea

Reprint 's Address:

  • [Teoh, A.B.J.]Yonsei UniversitySouth Korea

Show more details

Related Keywords:

Related Article:

Source :

Computers and Security

ISSN: 0167-4048

Year: 2023

Volume: 125

4 . 8

JCR@2023

4 . 8 0 0

JCR@2023

ESI HC Threshold:32

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:2191/10993290
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1