2,189
Views
5
CrossRef citations to date
0
Altmetric
Research Article

Attack Analysis of Face Recognition Authentication Systems Using Fast Gradient Sign Method

, & ORCID Icon
Pages 1346-1360 | Received 30 Apr 2021, Accepted 27 Aug 2021, Published online: 16 Sep 2021

References

  • Albawi, S., T. A. Mohammed, and S. Al-Zawi. 2017. Understanding of a convolutional neural network. In 2017 International Conference on Engineering and Technology (ICET), 1–6.
  • Andress, J. 2011. Chapter 2 - identification and authentication. In The basics of information security, ed. J. Andress, 17–31. Boston: Syngress.
  • DanB. 2017. 5 celebrity faces dataset. https://www.kaggle.com/dansbecker/5-celebrity-faces-dataset
  • Dong, Y., H. Su, B. Wu, Z. Li, W. Liu, T. Zhang, and J. Zhu. 2019. Efficient decision-based black-box adversarial attacks on face recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR): 7706-7714. doi:https://doi.org/10.1109/CVPR.2019.00790.
  • George, A., Z. Mostaani, D. Geissenbuhler, O. Nikisins, A. Anjos, and S. Marcel. 2019. Biometric face presentation attack detection with multi-channel convolutional neural network. IEEE Transactions on Information Forensics and Security 15: 42-55. doi:https://doi.org/10.1109/TIFS.2019.2916652.
  • Gill, R., A. Pandey, H. Gill, and V. Gupta. 2019. Security of message transmission using hand biometric features. International Journal of Computer Engineering and Applications (IJCEA). Volume XII, Special Issue, April- ICITDA 18, pp.1-4.
  • Goodfellow, I., J. Shlens, and C. Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv 1412.6572. December.
  • Goswami, G., N. Ratha, A. Agarwal, R. Singh, and M. Vatsa. 2018. Unravelling robustness of deep learning based face recognition against adversarial attacks. Proceedings of the AAAI Conference on Artificial Intelligence 32(1):6829-6836. https://ojs.aaai.org/index.php/AAAI/article/view/12341/12200.
  • He, K., X. Zhang, S. Ren, and J. Sun. 2016. Deep residual learning for image recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770-778, doi:https://doi.org/10.1109/CVPR.2016.90.
  • Kaspersky. (2019). Biometric data processing and storage system threats.
  • Krizhevsky, A., I. Sutskever, and G. Hinton. 2012. Imagenet classification with deep convolutional neural networks. Neural Information Processing Systems 25. January, pp. 1097–1105.
  • Lecun, Y., L. Bottou, Y. Bengio, and P. Haffner. 1998. Gradient-based learning applied to document recognition. Proceedings of the IEEE 86:2278–324. December. doi:https://doi.org/10.1109/5.726791.
  • Li, Y., Z. Wang, Y. Li, X. Zhao, and H. Huang. 2020. Design of face recognition system based on cnn. Journal of Physics: Conference Series 1601:052011. August.
  • Massoli, F. V., F. Carrara, G. Amato, and F. Falchi. 2021. Detection of face recognition adversarial attacks. Computer Vision and Image Understanding 202:103103. January. doi:https://doi.org/10.1016/j.cviu.2020.103103.
  • Mori, K., M. Matsugu, and T. Suzuki. 2005. Face recognition using SVM fed with intermediate output of CNN for face detection. In Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2005), 410–13. Tsukuba Science City, Japan, May 16-18
  • Rao, C., J. Cao, R. Zeng, Q. Chen, H. Fu, Y. Xu, and M. Tan. 2020. A thorough comparison study on adversarial attacks and defenses for common thorax disease classification in chest x-rays. ArXiv abs/2003.13969.
  • Ren, K., T. Zheng, Z. Qin, and X. Liu. 2020. Adversarial attacks and defenses in deep learning. Engineering 6 (3):346–60. doi:https://doi.org/10.1016/j.eng.2019.12.012.
  • Simonyan, K., and A. Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv 1409.1556. September.
  • Srivastava, N., G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov. 2014. Dropout: A simple way to prevent neural networks from overfitting. Journal of Machine Learning Research 15 (56):1929–58.
  • Szegedy, C., W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich. 2015. Going deeper with convolutions. In 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, 1–9.
  • Wang, F., L. Leng, A. B. J. Teoh, and J. Chu. 2020. Palmprint false acceptance attack with a generative adversarial network (gan). Applied Sciences 10 (23):8547. doi:https://doi.org/10.3390/app10238547.
  • Xue, J., Y. Yang, and D. Jing. 2019. Deceiving face recognition neural network with samples generated by deepfool. Journal of Physics: Conference Series 1302 022059. August.
  • Yuan, X., P. He, Q. Zhu, and X. Li. 2019. Adversarial examples: Attacks and defenses for deep learning. IEEE Transactions on Neural Networks and Learning Systems 30 (9):2805–24. doi:https://doi.org/10.1109/TNNLS.2018.2886017.
  • Zulfiqar, M., F. Syed, M. Khan, and K. Khurshid. 2019. Deep face recognition for biometric authentication. In 2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), pp. 1-6, doi: https://doi.org/10.1109/ICECCE47252.2019.8940725.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.