Method and system for detecting camouflage attack resistance of face recognition system

A technology of face recognition system and recognition system, which is applied in the field of detection of face recognition system against camouflage attacks, and can solve the problems of inability to guarantee face recognition system attacks, only applicable, low applicability, etc.

Pending Publication Date: 2021-03-16
GUANGZHOU UNIVERSITY +1
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing adversarial sample generation method for Rosenbrock-PSO is only used to find the adversarial samples that make the face recognition system go wrong, and it cannot guarantee that the face recognition system can resist the attack of directed camouflaged adversarial samples, that is, the adversarial samples generated by this method The samples conduct confrontational training on the face recognition system, and any face recognition system obtained after training is still unable to detect the ability to resist the adversarial sample attack generated by the face image disguised for a specific target
Moreover, the face recognition attack defense method based on Rosenbrock-PSO is only a way of adding confusing data to the training set. By interfering with the training process of the machine learning model, the machine learning model has more wrong predictions, but this method has the defect of low applicability , the attacker generally cannot obtain and interfere with the source of the training set of the target model algorithm, and is generally only applicable to the experimental environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting camouflage attack resistance of face recognition system
  • Method and system for detecting camouflage attack resistance of face recognition system
  • Method and system for detecting camouflage attack resistance of face recognition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] see figure 1 , a method for detecting face recognition systems against masquerading attacks, comprising:

[0040] S11, acquiring face image X and face image Y; wherein, face image X corresponds to classification number M, and face image Y corresponds to classification number N; before step S1, it includes: collecting face image data, and processing face image data Perform preprocessing to obtain a face dataset M including face images X and Y.

[0041]Furthermore, the preprocessing of the face image data includes: locating the face in the face image data, extracting the face area and feature points, aligning and saving all the faces according to the feature points, and obtaining the aligned face Face dataset M; After face alignment, the 68 checkpoints of all face images in the face dataset M are distributed in the same position.

[0042] S12, using an iterative attack method based on gradient and momentum to add noise Z to the face image X that can disguise the face im...

Embodiment 2

[0070] The difference between Embodiment 2 and Embodiment 1 is that the iterative attack method based on gradient and momentum is used to add noise Z to the face image X to misclassify the face image X. In terms of the judgment of the face recognition system to be detected, if the face recognition system to be detected determines that the face image G and the face image X are not the same person, the face recognition system to be detected fails to resist the directional camouflage attack; if the face recognition system to be detected If the system determines that the face image G and the face image X are the same person, the face recognition system to be detected succeeds in resisting masquerade.

[0071] In summary, the present invention has the following beneficial effects:

[0072] 1. The present invention uses an iterative attack method based on gradient and momentum, which can add disturbances in the shape of glasses, hats, headscarves, scarves, etc. to the face picture, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for detecting camouflage attack resistance of a face recognition system. The method comprises the following steps that a face image X and a face image Y are acquired; wherein the face image X corresponds to a classification number M, and the face image Y corresponds to a classification number N; noise Z is added to the face image X by using an iterative attack method based on gradient and momentum, the noise Z is masked into the shape of a wearable article, and a face image G containing noise is obtained; the face image G attacks the to-be-detectedface recognition system, and if the output classification number is N, it is indicated that the to-be-detected face recognition system fails to resist the directional camouflage attack; and if the output classification number is M, it is indicated that the to-be-detected face recognition system successfully resists the camouflage attack. The face recognition system is attacked by using the generated wearable decorative article with the camouflage characteristic, whether the face recognition system has the capacity of resisting the camouflage countermeasure sample can be detected, and the safety of the face recognition system is evaluated.

Description

technical field [0001] The invention relates to the field of computer vision and the field of deep learning technology, in particular to a method and system for detecting a face recognition system against masquerading attacks. Background technique [0002] With the rapid development of computer vision and artificial intelligence technology, face recognition technology has become more and more widely used, such as face recognition access control attendance, electronic passports and ID cards, self-service entry at high-speed rail stations, etc. However, with the development of technology, the risk of face recognition system being attacked by spoofing is increasing day by day. For example, in the face recognition system widely used in video surveillance and access control, if some adversarial samples are input into the face recognition system, the face recognition system will be misled by the adversarial samples, and the face recognition will be wrong, thereby threatening perso...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
CPCG06V40/172G06V40/161G06V40/168
Inventor 顾钊铨王新刚王玥天张川京廖续鑫方滨兴贾焰王乐
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products